Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
book_lumm2.dat.exe

Overview

General Information

Sample name:book_lumm2.dat.exe
Analysis ID:1590142
MD5:3aa6c0c3e8a405028606f3bc293f0b74
SHA1:e8a6db0181e3c6839a306a4d7e01b69f98931061
SHA256:4674e4792d2b85b545d1f94442f8465e08412e220cd3eff119458f609c030a96
Tags:ClickFixexeFakeCaptchauser-abuse_ch
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected XWorm
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • book_lumm2.dat.exe (PID: 4816 cmdline: "C:\Users\user\Desktop\book_lumm2.dat.exe" MD5: 3AA6C0C3E8A405028606F3BC293F0B74)
  • cleanup
{"C2 url": ["92.255.57.112"], "Port": 4418, "Aes key": "P0WER", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
SourceRuleDescriptionAuthorStrings
book_lumm2.dat.exeJoeSecurity_XWormYara detected XWormJoe Security
    book_lumm2.dat.exerat_win_xworm_v3Finds XWorm (version XClient, v3) samples based on characteristic stringsSekoia.io
    • 0x9d2f:$str01: $VB$Local_Port
    • 0x9d53:$str02: $VB$Local_Host
    • 0x8515:$str03: get_Jpeg
    • 0x8b3b:$str04: get_ServicePack
    • 0xae6c:$str05: Select * from AntivirusProduct
    • 0xbe0d:$str06: PCRestart
    • 0xbe21:$str07: shutdown.exe /f /r /t 0
    • 0xbed3:$str08: StopReport
    • 0xbea9:$str09: StopDDos
    • 0xbf9f:$str10: sendPlugin
    • 0xc01f:$str11: OfflineKeylogger Not Enabled
    • 0xc177:$str12: -ExecutionPolicy Bypass -File "
    • 0xcc81:$str13: Content-length: 5235
    book_lumm2.dat.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0xcf41:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0xcfde:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0xd0f3:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0xcb9c:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1261619962.0000000000012000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      00000000.00000000.1261619962.0000000000012000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xcd41:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0xcdde:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0xcef3:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xc99c:$cnc4: POST / HTTP/1.1
      00000000.00000002.3730762071.00000000022D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        Process Memory Space: book_lumm2.dat.exe PID: 4816JoeSecurity_XWormYara detected XWormJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.book_lumm2.dat.exe.10000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
            0.0.book_lumm2.dat.exe.10000.0.unpackrat_win_xworm_v3Finds XWorm (version XClient, v3) samples based on characteristic stringsSekoia.io
            • 0x9d2f:$str01: $VB$Local_Port
            • 0x9d53:$str02: $VB$Local_Host
            • 0x8515:$str03: get_Jpeg
            • 0x8b3b:$str04: get_ServicePack
            • 0xae6c:$str05: Select * from AntivirusProduct
            • 0xbe0d:$str06: PCRestart
            • 0xbe21:$str07: shutdown.exe /f /r /t 0
            • 0xbed3:$str08: StopReport
            • 0xbea9:$str09: StopDDos
            • 0xbf9f:$str10: sendPlugin
            • 0xc01f:$str11: OfflineKeylogger Not Enabled
            • 0xc177:$str12: -ExecutionPolicy Bypass -File "
            • 0xcc81:$str13: Content-length: 5235
            0.0.book_lumm2.dat.exe.10000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0xcf41:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0xcfde:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0xd0f3:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0xcb9c:$cnc4: POST / HTTP/1.1
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-13T16:30:22.100906+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:30:33.191053+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:30:34.132867+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:30:46.427607+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:30:58.736159+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:31:03.185722+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:31:11.023477+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:31:23.319475+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:31:33.194864+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:31:34.744711+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:31:34.960456+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:31:44.019864+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:31:44.143601+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:31:51.917834+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:32:00.800940+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:32:00.928798+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:32:01.398005+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:32:03.194575+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:32:13.980526+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:32:15.820631+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:32:16.289090+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:32:22.882966+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:32:23.023687+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:32:33.197198+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:32:35.319544+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:32:36.289863+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:32:44.351061+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:32:49.995461+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:33:02.495496+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:33:03.245012+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:33:05.353210+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:33:16.495624+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:33:19.166089+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:33:27.665975+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:33:30.742201+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:33:33.249637+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:33:34.429766+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:33:45.569695+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:33:47.368149+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:33:50.211452+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:33:57.949632+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:34:01.268868+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:34:02.298495+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:34:02.431491+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:34:02.554490+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:34:03.312643+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:34:05.992537+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:34:12.913953+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:34:25.235168+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:34:33.283870+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            2025-01-13T16:34:37.507734+010028528701Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-13T16:30:22.198327+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:30:34.211561+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:30:34.508789+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:30:46.432225+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:30:58.737492+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:31:11.026244+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:31:23.323410+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:31:34.749922+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:31:34.963327+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:31:44.021595+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:31:44.145286+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:31:51.919695+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:32:00.803308+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:32:00.930546+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:32:01.399703+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:32:13.987756+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:32:15.827423+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:32:16.294393+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:32:22.884773+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:32:23.025555+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:32:35.321093+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:32:36.292861+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:32:44.352392+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:32:49.997232+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:33:02.499343+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:33:05.360824+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:33:16.496924+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:33:19.171222+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:33:27.667925+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:33:30.743483+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:33:34.431253+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:33:45.578586+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:33:47.371961+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:33:50.212952+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:33:57.950991+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:34:01.270814+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:34:02.300406+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:34:02.435338+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:34:02.555605+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:34:05.994018+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:34:12.914628+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:34:25.240261+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            2025-01-13T16:34:37.508452+010028529231Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-13T16:30:33.191053+010028588011Malware Command and Control Activity Detected92.255.57.1124418192.168.2.749699TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-13T16:32:13.259483+010028587991Malware Command and Control Activity Detected192.168.2.74969992.255.57.1124418TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: book_lumm2.dat.exeAvira: detected
            Source: book_lumm2.dat.exeMalware Configuration Extractor: Xworm {"C2 url": ["92.255.57.112"], "Port": 4418, "Aes key": "P0WER", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
            Source: book_lumm2.dat.exeVirustotal: Detection: 61%Perma Link
            Source: book_lumm2.dat.exeReversingLabs: Detection: 73%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: book_lumm2.dat.exeJoe Sandbox ML: detected
            Source: book_lumm2.dat.exeString decryptor: 92.255.57.112
            Source: book_lumm2.dat.exeString decryptor: 4418
            Source: book_lumm2.dat.exeString decryptor: P0WER
            Source: book_lumm2.dat.exeString decryptor: <Xwormmm>
            Source: book_lumm2.dat.exeString decryptor: XWorm
            Source: book_lumm2.dat.exeString decryptor: USB.exe
            Source: book_lumm2.dat.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: book_lumm2.dat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2858800 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.7:49699 -> 92.255.57.112:4418
            Source: Network trafficSuricata IDS: 2852870 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes : 92.255.57.112:4418 -> 192.168.2.7:49699
            Source: Network trafficSuricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.7:49699 -> 92.255.57.112:4418
            Source: Network trafficSuricata IDS: 2858801 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Command - Ping Inbound : 92.255.57.112:4418 -> 192.168.2.7:49699
            Source: Network trafficSuricata IDS: 2858799 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.7:49699 -> 92.255.57.112:4418
            Source: Malware configuration extractorURLs: 92.255.57.112
            Source: global trafficTCP traffic: 192.168.2.7:49699 -> 92.255.57.112:4418
            Source: Joe Sandbox ViewASN Name: TELSPRU TELSPRU
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.112
            Source: book_lumm2.dat.exe, 00000000.00000002.3730762071.00000000022D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            System Summary

            barindex
            Source: book_lumm2.dat.exe, type: SAMPLEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
            Source: book_lumm2.dat.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.0.book_lumm2.dat.exe.10000.0.unpack, type: UNPACKEDPEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
            Source: 0.0.book_lumm2.dat.exe.10000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000000.1261619962.0000000000012000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeCode function: 0_2_00007FFAAC5063060_2_00007FFAAC506306
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeCode function: 0_2_00007FFAAC5012150_2_00007FFAAC501215
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeCode function: 0_2_00007FFAAC50A2190_2_00007FFAAC50A219
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeCode function: 0_2_00007FFAAC5070B20_2_00007FFAAC5070B2
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeCode function: 0_2_00007FFAAC50A2190_2_00007FFAAC50A219
            Source: book_lumm2.dat.exe, 00000000.00000000.1261619962.0000000000012000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs book_lumm2.dat.exe
            Source: book_lumm2.dat.exeBinary or memory string: OriginalFilenameXClient.exe4 vs book_lumm2.dat.exe
            Source: book_lumm2.dat.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: book_lumm2.dat.exe, type: SAMPLEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
            Source: book_lumm2.dat.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.0.book_lumm2.dat.exe.10000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
            Source: 0.0.book_lumm2.dat.exe.10000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000000.1261619962.0000000000012000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@0/1
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeMutant created: NULL
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeMutant created: \Sessions\1\BaseNamedObjects\eBzUWjdTcEaHqPrC
            Source: book_lumm2.dat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: book_lumm2.dat.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: book_lumm2.dat.exeVirustotal: Detection: 61%
            Source: book_lumm2.dat.exeReversingLabs: Detection: 73%
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: book_lumm2.dat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: book_lumm2.dat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeMemory allocated: 2110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeMemory allocated: 1A2D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeWindow / User API: threadDelayed 9419Jump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeWindow / User API: threadDelayed 445Jump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exe TID: 7372Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exe TID: 7380Thread sleep count: 9419 > 30Jump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exe TID: 7380Thread sleep count: 445 > 30Jump to behavior
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: book_lumm2.dat.exe, 00000000.00000002.3729587620.00000000006AD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllrkflI

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess Stats: CPU usage > 42% for more than 60s
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeProcess token adjusted: DebugJump to behavior
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeQueries volume information: C:\Users\user\Desktop\book_lumm2.dat.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: C:\Users\user\Desktop\book_lumm2.dat.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: book_lumm2.dat.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.book_lumm2.dat.exe.10000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1261619962.0000000000012000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3730762071.00000000022D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: book_lumm2.dat.exe PID: 4816, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: book_lumm2.dat.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.book_lumm2.dat.exe.10000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1261619962.0000000000012000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3730762071.00000000022D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: book_lumm2.dat.exe PID: 4816, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            OS Credential Dumping211
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts232
            Virtualization/Sandbox Evasion
            LSASS Memory232
            Virtualization/Sandbox Evasion
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            DLL Side-Loading
            Security Account Manager1
            Application Window Discovery
            SMB/Windows Admin SharesData from Network Shared Drive1
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS13
            System Information Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            book_lumm2.dat.exe61%VirustotalBrowse
            book_lumm2.dat.exe74%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
            book_lumm2.dat.exe100%AviraHEUR/AGEN.1305769
            book_lumm2.dat.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            92.255.57.1120%Avira URL Cloudsafe
            No contacted domains info
            NameMaliciousAntivirus DetectionReputation
            92.255.57.112true
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namebook_lumm2.dat.exe, 00000000.00000002.3730762071.00000000022D1000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              92.255.57.112
              unknownRussian Federation
              42253TELSPRUtrue
              Joe Sandbox version:42.0.0 Malachite
              Analysis ID:1590142
              Start date and time:2025-01-13 16:29:09 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 6m 43s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:11
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Sample name:book_lumm2.dat.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@1/0@0/1
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 86%
              • Number of executed functions: 49
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.109.210.53
              • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target book_lumm2.dat.exe, PID 4816 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              TimeTypeDescription
              10:30:08API Interceptor14160278x Sleep call for process: book_lumm2.dat.exe modified
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              TELSPRUhttp://92.255.57.155/1/1.pngGet hashmaliciousUnknownBrowse
              • 92.255.57.155
              92.255.57.155.ps1Get hashmaliciousXWormBrowse
              • 92.255.57.155
              png2obj1_XClient.exeGet hashmaliciousXWormBrowse
              • 92.255.57.155
              Dm35sdidf3.exeGet hashmaliciousXWormBrowse
              • 92.255.57.155
              QP2uO3eN2p.ps1Get hashmaliciousXWormBrowse
              • 92.255.57.155
              WErY5oc4hl.ps1Get hashmaliciousXWormBrowse
              • 92.255.57.155
              NLXwvLjXPh.ps1Get hashmaliciousXWormBrowse
              • 92.255.57.155
              mhqxUdpe7V.ps1Get hashmaliciousXWormBrowse
              • 92.255.57.155
              MiGFg375KJ.exeGet hashmaliciousXWormBrowse
              • 92.255.57.155
              No context
              No context
              No created / dropped files found
              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):5.923417039945195
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              • Win32 Executable (generic) a (10002005/4) 49.75%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Windows Screen Saver (13104/52) 0.07%
              • Generic Win/DOS Executable (2004/3) 0.01%
              File name:book_lumm2.dat.exe
              File size:59'904 bytes
              MD5:3aa6c0c3e8a405028606f3bc293f0b74
              SHA1:e8a6db0181e3c6839a306a4d7e01b69f98931061
              SHA256:4674e4792d2b85b545d1f94442f8465e08412e220cd3eff119458f609c030a96
              SHA512:5aae425e56814a35ae55dd9bb35c2e2950aabb8abc42ceb330571deb01c5467c207f5ff2a4c2f10178e20acc61f4f11c415ae122cf999967bc840bc9a50ce048
              SSDEEP:1536:9y6f9D8gRkXeqSpMikbetK3Cfub+4KxOas5jX:9yeKJ+MikbEwDlKxOaQz
              TLSH:51436B183BF64126F1FF5FB509F13156D67AF2276412D6AF24C4029B0723A89CE816FA
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....x.g................................. ........@.. .......................@............@................................
              Icon Hash:00928e8e8686b000
              Entrypoint:0x40ff2e
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Time Stamp:0x678278FB [Sat Jan 11 13:58:19 2025 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xfed40x57.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x100000x4ce.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000xdf340xe000250de06110f577b575d19b6dacddc8aeFalse0.6152866908482143data6.0147607868244055IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rsrc0x100000x4ce0x600b6854ead75e0aea5a0ec3175723e462fFalse0.3736979166666667data3.7184457289766475IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x120000xc0x2004d3b23f5a21ea76fe7492fc0df5cac5fFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_VERSION0x100a00x244data0.4724137931034483
              RT_MANIFEST0x102e40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
              DLLImport
              mscoree.dll_CorExeMain
              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
              2025-01-13T16:30:21.624712+01002858800ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:30:22.100906+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:30:22.198327+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:30:33.191053+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:30:33.191053+01002858801ETPRO MALWARE Win32/XWorm CnC Command - Ping Inbound192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:30:34.132867+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:30:34.211561+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:30:34.508789+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:30:46.427607+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:30:46.432225+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:30:58.736159+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:30:58.737492+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:31:03.185722+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:31:11.023477+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:31:11.026244+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:31:23.319475+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:31:23.323410+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:31:33.194864+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:31:34.744711+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:31:34.749922+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:31:34.960456+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:31:34.963327+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:31:44.019864+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:31:44.021595+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:31:44.143601+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:31:44.145286+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:31:51.917834+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:31:51.919695+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:32:00.800940+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:32:00.803308+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:32:00.928798+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:32:00.930546+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:32:01.398005+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:32:01.399703+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:32:03.194575+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:32:13.259483+01002858799ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:32:13.980526+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:32:13.987756+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:32:15.820631+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:32:15.827423+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:32:16.289090+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:32:16.294393+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:32:22.882966+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:32:22.884773+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:32:23.023687+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:32:23.025555+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:32:33.197198+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:32:35.319544+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:32:35.321093+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:32:36.289863+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:32:36.292861+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:32:44.351061+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:32:44.352392+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:32:49.995461+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:32:49.997232+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:33:02.495496+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:33:02.499343+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:33:03.245012+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:33:05.353210+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:33:05.360824+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:33:16.495624+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:33:16.496924+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:33:19.166089+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:33:19.171222+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:33:27.665975+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:33:27.667925+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:33:30.742201+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:33:30.743483+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:33:33.249637+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:33:34.429766+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:33:34.431253+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:33:45.569695+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:33:45.578586+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:33:47.368149+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:33:47.371961+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:33:50.211452+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:33:50.212952+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:33:57.949632+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:33:57.950991+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:34:01.268868+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:34:01.270814+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:34:02.298495+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:34:02.300406+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:34:02.431491+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:34:02.435338+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:34:02.554490+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:34:02.555605+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:34:03.312643+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:34:05.992537+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:34:05.994018+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:34:12.913953+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:34:12.914628+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:34:25.235168+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:34:25.240261+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              2025-01-13T16:34:33.283870+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:34:37.507734+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes192.255.57.1124418192.168.2.749699TCP
              2025-01-13T16:34:37.508452+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.74969992.255.57.1124418TCP
              TimestampSource PortDest PortSource IPDest IP
              Jan 13, 2025 16:30:09.108458996 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:30:09.113389969 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:30:09.113651037 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:30:09.326963902 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:30:09.331809998 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:30:21.624711990 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:30:21.629532099 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:30:22.100905895 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:30:22.149328947 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:30:22.198327065 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:30:22.203202009 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:30:33.191052914 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:30:33.243158102 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:30:33.916732073 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:30:33.921762943 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:30:34.132867098 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:30:34.180658102 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:30:34.211560965 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:30:34.508789062 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:30:34.569317102 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:30:34.569376945 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:30:46.212265968 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:30:46.217099905 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:30:46.427607059 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:30:46.432224989 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:30:46.437041044 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:30:58.509300947 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:30:58.514435053 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:30:58.736159086 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:30:58.737492085 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:30:58.742317915 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:03.185722113 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:03.228075027 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:31:10.806171894 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:31:10.811631918 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:11.023477077 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:11.026243925 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:31:11.031227112 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:23.103240013 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:31:23.108192921 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:23.319474936 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:23.323410034 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:31:23.328284025 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:33.194864035 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:33.243446112 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:31:34.524993896 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:31:34.530035973 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:34.744710922 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:34.744790077 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:31:34.749675989 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:34.749922037 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:31:34.754812956 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:34.960455894 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:34.963326931 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:31:34.968236923 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:43.775300026 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:31:43.780364990 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:43.822339058 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:31:43.827841997 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:44.019864082 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:44.021595001 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:31:44.026439905 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:44.143600941 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:44.145286083 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:31:44.150660992 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:51.699395895 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:31:51.704510927 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:51.917834044 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:31:51.919694901 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:31:51.924855947 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:00.571949959 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:00.577790022 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:00.618951082 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:00.624917030 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:00.800940037 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:00.803308010 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:00.808212042 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:00.928797960 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:00.930546045 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:00.935439110 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:00.962511063 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:00.967333078 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:01.398005009 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:01.399703026 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:01.404660940 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:03.194575071 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:03.244921923 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:13.259483099 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:13.264342070 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:13.980525970 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:13.987756014 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:13.992527008 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:15.572484016 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:15.577265978 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:15.820631027 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:15.827423096 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:15.832190037 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:16.073189974 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:16.078351021 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:16.289089918 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:16.294393063 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:16.299808025 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:22.666029930 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:22.672108889 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:22.806500912 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:22.813148975 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:22.882966042 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:22.884773016 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:22.889631033 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:23.023686886 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:23.025554895 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:23.030358076 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:33.197197914 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:33.353166103 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:35.103519917 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:35.108453989 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:35.319544077 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:35.321093082 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:35.326531887 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:36.073967934 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:36.079154968 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:36.289863110 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:36.292860985 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:36.298021078 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:43.634598017 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:43.639830112 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:44.351061106 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:44.352391958 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:44.357213020 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:49.762116909 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:49.767267942 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:49.995460987 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:32:49.997231960 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:32:50.002635002 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:02.060264111 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:02.065665007 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:02.495496035 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:02.499342918 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:02.504146099 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:03.245012045 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:03.290764093 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:05.072303057 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:05.077343941 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:05.353209972 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:05.360824108 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:05.365600109 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:16.259787083 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:16.267483950 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:16.495624065 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:16.496923923 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:16.502114058 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:18.947438002 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:18.952806950 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:19.166089058 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:19.171221972 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:19.176517963 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:27.431761980 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:27.437047958 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:27.665975094 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:27.667924881 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:27.672821045 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:30.525541067 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:30.531533003 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:30.742201090 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:30.743483067 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:30.749588966 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:33.249636889 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:33.291239023 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:34.213047981 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:34.218137026 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:34.429765940 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:34.431252956 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:34.436292887 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:45.353904009 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:45.358805895 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:45.569694996 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:45.578586102 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:45.583962917 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:47.152214050 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:47.157150984 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:47.368149042 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:47.371961117 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:47.376863956 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:49.994437933 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:49.999634981 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:50.211452007 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:50.212951899 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:50.219480991 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:57.729474068 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:57.735603094 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:57.949631929 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:33:57.950990915 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:33:57.955935001 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:01.041250944 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:34:01.046314955 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:01.268867970 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:01.270813942 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:34:01.278603077 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:02.072649956 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:34:02.077930927 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:02.088217020 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:34:02.093055964 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:02.135010958 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:34:02.139892101 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:02.298495054 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:02.300405979 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:34:02.305495977 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:02.431490898 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:02.435338020 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:34:02.440265894 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:02.554490089 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:02.555604935 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:34:02.560702085 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:03.312643051 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:03.353569984 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:34:05.775680065 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:34:05.780587912 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:05.992537022 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:05.994018078 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:34:05.998887062 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:12.697635889 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:34:12.702955961 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:12.913953066 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:12.914628029 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:34:12.919552088 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:25.001843929 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:34:25.007008076 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:25.235167980 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:25.240261078 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:34:25.245276928 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:33.283869982 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:33.339348078 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:34:37.291460037 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:34:37.296787977 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:37.507734060 CET44184969992.255.57.112192.168.2.7
              Jan 13, 2025 16:34:37.508451939 CET496994418192.168.2.792.255.57.112
              Jan 13, 2025 16:34:37.513360977 CET44184969992.255.57.112192.168.2.7

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:10:30:04
              Start date:13/01/2025
              Path:C:\Users\user\Desktop\book_lumm2.dat.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\book_lumm2.dat.exe"
              Imagebase:0x10000
              File size:59'904 bytes
              MD5 hash:3AA6C0C3E8A405028606F3BC293F0B74
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.1261619962.0000000000012000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.1261619962.0000000000012000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.3730762071.00000000022D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              Reputation:low
              Has exited:false

              Reset < >
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID: 8e$`+
                • API String ID: 0-2433936501
                • Opcode ID: 526b264e4f952e9314e957e147e7afc148790cb5abd31837e42f876eec4e836e
                • Instruction ID: e8536fff112a4b74a69e566bb062931d51d498057294e76b2cc4d99b7ddcddea
                • Opcode Fuzzy Hash: 526b264e4f952e9314e957e147e7afc148790cb5abd31837e42f876eec4e836e
                • Instruction Fuzzy Hash: FCA15F53E4E7939FF35167BCA8161FA6F94DF42324708817BE18ECA593D804A84983D2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID: 0-3916222277
                • Opcode ID: 4d8f27cbc4b216dbc27deec721952ece81f48f95f88a8e649df6f606e055c919
                • Instruction ID: 6ece120b9d6a0b85a51ca01fa5fb70f30f30841c45ed49ad40a18dceea31a177
                • Opcode Fuzzy Hash: 4d8f27cbc4b216dbc27deec721952ece81f48f95f88a8e649df6f606e055c919
                • Instruction Fuzzy Hash: D5828170E5D90A9FFB94EB78C455A7D72D6EF99300F548578E40ED32C2DE28E8068781
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 501ba11e9893baddc9b9f3f59065b292464a3b95e40dec92880ac1bb080e990a
                • Instruction ID: bf397798b8b07e89a702816c3e5a2ea0dc5c5cf1bcbb2d8a593bc3357b475b7d
                • Opcode Fuzzy Hash: 501ba11e9893baddc9b9f3f59065b292464a3b95e40dec92880ac1bb080e990a
                • Instruction Fuzzy Hash: A9F19270909A4E8FEBA8DF28C8557E937D1FF55310F04827AE84EC7295CE34E9458B81
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a91898b7fa02d2cdf7c51206ee6176fe4bc06d2e833ce4a935f66f342fa7969f
                • Instruction ID: cfa5f739baa71ab2f02a4385590c09bf40e0888aac7ade40cf95ffe733ad322f
                • Opcode Fuzzy Hash: a91898b7fa02d2cdf7c51206ee6176fe4bc06d2e833ce4a935f66f342fa7969f
                • Instruction Fuzzy Hash: F1E1C070908A4E8FEBA8DF28C8557E977D1FB55351F14826EE84EC3291CF34A8848BC1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID: 6$r6$r6$r6
                • API String ID: 0-3926755054
                • Opcode ID: b44d222cd4685c74b897344802932106a3863b530223616c3f651ecfcc1e96fd
                • Instruction ID: 866bb6e7b70b14120c086d7b5b7c44816861af84b8e4f09e01b5f9ee69587311
                • Opcode Fuzzy Hash: b44d222cd4685c74b897344802932106a3863b530223616c3f651ecfcc1e96fd
                • Instruction Fuzzy Hash: DBD11971A5CA1ECFE799EF28C4986A877D1FF59304B5485B9E44EC729ACE24EC0187C0
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID: 0"$HB$r6
                • API String ID: 0-2729165795
                • Opcode ID: 0ef1b3301f567ced60a322d5aafeb0183a6d7791284c7ecc86a7118ad5b7de55
                • Instruction ID: d323ba5a49117c3fa1df30700b83745236b9657f74c5b1e62855b9e017243611
                • Opcode Fuzzy Hash: 0ef1b3301f567ced60a322d5aafeb0183a6d7791284c7ecc86a7118ad5b7de55
                • Instruction Fuzzy Hash: C0D16DA2E1DA4A8FF799973888252B97BD1FF96300F4441B9E04EC72D7DD289C0683C1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID: HB$/$/
                • API String ID: 0-2471025714
                • Opcode ID: 1d68acb56959517530c9df7e5998852d071e3f2eaccd29f49c100918e80b2399
                • Instruction ID: 6b014d9843067e986a0725226d7776e45cf338343858f901b03250fc381fd04b
                • Opcode Fuzzy Hash: 1d68acb56959517530c9df7e5998852d071e3f2eaccd29f49c100918e80b2399
                • Instruction Fuzzy Hash: 95614A30D4D6869FEB46D73484126AA7BA1EF57310F1842F9D05DC71E3DE68A806C792
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID: 8e$`+
                • API String ID: 0-2433936501
                • Opcode ID: 5218b770ecd092f7f96ee14ce11d7f6bb2f1a189e2c47b5766a3856d9a5232ab
                • Instruction ID: 5e26f579eb510288679fe6b8fc3038796c79b134758880fb2b7c5c40ca43a768
                • Opcode Fuzzy Hash: 5218b770ecd092f7f96ee14ce11d7f6bb2f1a189e2c47b5766a3856d9a5232ab
                • Instruction Fuzzy Hash: 2F813093D4E7C29FF3555778A8560FA6F98EF52364B08817FE18ECA593DC04A80983D2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID: 8e$`+
                • API String ID: 0-2433936501
                • Opcode ID: 0d9a7f268dd4f953b1fc36a44f491036d2dc6bbf7255e359bc1eb6ba98ffcab9
                • Instruction ID: 34629487cfb6dab66f87d4fe3666c225d336849f32f1d92a1928ff486243d7d2
                • Opcode Fuzzy Hash: 0d9a7f268dd4f953b1fc36a44f491036d2dc6bbf7255e359bc1eb6ba98ffcab9
                • Instruction Fuzzy Hash: BC713E93D4E7839FF34557B898560FA6F88EF52354B0881BAE08ECA593DC04E80983D2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID: 0D$0D
                • API String ID: 0-2892953775
                • Opcode ID: 7658e47b6029ca9b5001f7b048bcc8d081f1f1149e50b953a5b125195416aa8b
                • Instruction ID: 77812139c6fd02ce60e1d5230d37008ed901f676585a66cc875acc34da475bff
                • Opcode Fuzzy Hash: 7658e47b6029ca9b5001f7b048bcc8d081f1f1149e50b953a5b125195416aa8b
                • Instruction Fuzzy Hash: CC5115A1E59A4E5FEB84EB78C4695BD7FD6FF8A210B4084B9E00FC31D7DD2898058380
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID: M_^
                • API String ID: 0-921959145
                • Opcode ID: 48f734b8e97daa03836d5b5e5bb1f73722897c112ff896a40ebe5005bf458b35
                • Instruction ID: ade2e49dbee04791432fadfbbe7d6e615c48ddf0b6ac941e86587d8f64cb0ee7
                • Opcode Fuzzy Hash: 48f734b8e97daa03836d5b5e5bb1f73722897c112ff896a40ebe5005bf458b35
                • Instruction Fuzzy Hash: BA3121A294EB8E9FE38A9728D8651F87FF1FF42210F0446B6E04AC71D7DD18580A8780
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID: r6
                • API String ID: 0-2984296541
                • Opcode ID: d982a5535b4eef71b6944d6fe1fa511bf8809a8db34025f4f65add9f58d6c050
                • Instruction ID: 88b92d3f87c6137eda8093bbbb6cdc8d905e4a1b9ae41a4df02f9d3f5ebbb742
                • Opcode Fuzzy Hash: d982a5535b4eef71b6944d6fe1fa511bf8809a8db34025f4f65add9f58d6c050
                • Instruction Fuzzy Hash: 82411661B1DA890FE789AB7CD85A6797BD5DF8A214F0941FAE04EC7293CD189C068341
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID: r6
                • API String ID: 0-2984296541
                • Opcode ID: ec696cfe185d9c8314fcca27cad78d4982279e584916f137705a96d2933a6e55
                • Instruction ID: 7446efc86970d70655a2948c3b5fec50750a621f766f7c61f9a65c4800aa8f20
                • Opcode Fuzzy Hash: ec696cfe185d9c8314fcca27cad78d4982279e584916f137705a96d2933a6e55
                • Instruction Fuzzy Hash: 7231D362B189490FE798EB7CD85AB79A6C6EB99315F0445BEE00EC3293DD689C018380
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID: 6
                • API String ID: 0-1452363761
                • Opcode ID: 6afc7bdde811e6ceb608248271a3a53b7ff81903da93449a594eea696d76f738
                • Instruction ID: 70f1dff65bfcd83f26c156054bfa7ff272420959affd9746db81cc3a827c2783
                • Opcode Fuzzy Hash: 6afc7bdde811e6ceb608248271a3a53b7ff81903da93449a594eea696d76f738
                • Instruction Fuzzy Hash: 7031D452B58A4A5FF784B7BCD81A7BC67D6EB99751F0442BAE00EC3293DD18AC058381
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID: HB
                • API String ID: 0-408134297
                • Opcode ID: 22a78bd65b91637ffc30353e592ba286daf5aecdf859f61470698f915fbc0210
                • Instruction ID: c5cd10f834c97a1b08f6e185b715f41d0fa19a98a9b9829bd5de2dfa64d01586
                • Opcode Fuzzy Hash: 22a78bd65b91637ffc30353e592ba286daf5aecdf859f61470698f915fbc0210
                • Instruction Fuzzy Hash: E041E375E48A4E9FEB85EB78C4556AD7BF1FF99300F5444B5E04EC3286CD28A801CB80
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID: 6
                • API String ID: 0-1452363761
                • Opcode ID: 2edd11673aa86566cd015f510926f6599db361788319824f41c1ddc012fb35dc
                • Instruction ID: e58307e52c55bd8961484d760e2ee8dfa5fc0d2171652d23d430c9a51a44af18
                • Opcode Fuzzy Hash: 2edd11673aa86566cd015f510926f6599db361788319824f41c1ddc012fb35dc
                • Instruction Fuzzy Hash: 3F318252B58D0A5FFB84B7BCD81A7BD66D6EBD9752F00417AE40EC3292DD28AC4183C1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID: HB
                • API String ID: 0-408134297
                • Opcode ID: 1bc7cc90524423938692b3fa6018856663cfb91b1c422798a9456687937c8db9
                • Instruction ID: bf7412455c5eb730a79f331846d361482da099cf43e9c9aad2d125852cf75a9b
                • Opcode Fuzzy Hash: 1bc7cc90524423938692b3fa6018856663cfb91b1c422798a9456687937c8db9
                • Instruction Fuzzy Hash: 44310861E4E507AFF7D4A734C0122BA268ABF96350F148479F00EC61C3DE2CE84583D2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID: d
                • API String ID: 0-2564639436
                • Opcode ID: edb4c2ff45f5b20792301c23234956bb40863b8ce824e2bd9b6239587fa26413
                • Instruction ID: 114f779c6a2501ac2063001f9808b254e11ae4ef0269a254a6920b40bde2fbbd
                • Opcode Fuzzy Hash: edb4c2ff45f5b20792301c23234956bb40863b8ce824e2bd9b6239587fa26413
                • Instruction Fuzzy Hash: B521C531C4D296CFEB419BA4C8056F9BFE4EF46311F0541BAE44DD7292DA2CA84487D1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID: FO_H
                • API String ID: 0-2715392569
                • Opcode ID: ab2e93310c0efe59e3f2c0c6e2e7efed03c140b4e18f1a969f3f6ab002797cbe
                • Instruction ID: 4e77e9a95cd1bc6eca20e5a7f0a35a9589aa7d96fe8fdd8dd9030d1da8af3186
                • Opcode Fuzzy Hash: ab2e93310c0efe59e3f2c0c6e2e7efed03c140b4e18f1a969f3f6ab002797cbe
                • Instruction Fuzzy Hash: BE018B5588F6C6AEEB83577408200A67FA8AF43214B4884FBE08DCB193DA0C851AC382
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID: 8e
                • API String ID: 0-1620073548
                • Opcode ID: ac93a5f2816180ce60b7409d563adc35d926bd684151aa90f8c7bebc1700a887
                • Instruction ID: ad0c6e7139ffd7b831bf52c491baf4f5c4fa44d995558ad0f07c6ee6fa4ca060
                • Opcode Fuzzy Hash: ac93a5f2816180ce60b7409d563adc35d926bd684151aa90f8c7bebc1700a887
                • Instruction Fuzzy Hash: D601DD52D0EB954FF382A37858664793FE0DF8211170849A7E48ECA2E3DC08994943D3
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID: HB
                • API String ID: 0-408134297
                • Opcode ID: 27fcf7c42e34dbd361b7abba27b00e2e0184b5d15c338ec8bad5e0f791928589
                • Instruction ID: 3e61bdfdede60e61c37a20f681c2603b91039993c3ef472118b02efdc5424d92
                • Opcode Fuzzy Hash: 27fcf7c42e34dbd361b7abba27b00e2e0184b5d15c338ec8bad5e0f791928589
                • Instruction Fuzzy Hash: 77F0F491E4E6879FF794637884662792A86AF66301F0484F9F04EC61C3DD5CF8458383
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c32e3089b242a2392e5c2a80c4d2e1118e18f0d4fe727f45c2a4165f535f5e2e
                • Instruction ID: f325ae9e68d4d2029eba49413dc3ba73263cf52d027374231a1a1a73f8994581
                • Opcode Fuzzy Hash: c32e3089b242a2392e5c2a80c4d2e1118e18f0d4fe727f45c2a4165f535f5e2e
                • Instruction Fuzzy Hash: 20B1A270508A4E8FEBA8DF28D8557E93BD1FF55310F14827AE84EC7292CE3499458B82
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fc01e94d848db3d99b75252db369af1516b2b02a767a2400dd6a36c8bbbb8d07
                • Instruction ID: 998597c0b9b71c3925859bd8382e2ce68ce99e194c148b351dd9ea9275751232
                • Opcode Fuzzy Hash: fc01e94d848db3d99b75252db369af1516b2b02a767a2400dd6a36c8bbbb8d07
                • Instruction Fuzzy Hash: 453103A294EB8B9EF78A9768D8510F97FA0FF42210F0446B6E04AC7193DD19980A83C0
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b9ba25500de471741f23d68575eb7b5901c5a63490e23a60ee30452dd3cea479
                • Instruction ID: 03a2d90cc19f373abcd081ef849a7f612160c73a8c555634bd204e73795d9d30
                • Opcode Fuzzy Hash: b9ba25500de471741f23d68575eb7b5901c5a63490e23a60ee30452dd3cea479
                • Instruction Fuzzy Hash: F93101A294EB8B9EF78A9768D8611FD7FB1FF42210F0446B6E04AC71D7CD18580987C0
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4ff4d3bf44a1aa0023d81c2f1e77746224d42f2e88e3394ae404e15fb5c496a2
                • Instruction ID: eba047df1187bd3ed256c6c4e1857cb146fd2076aa5abe2bbac86ef5c5dc9d3d
                • Opcode Fuzzy Hash: 4ff4d3bf44a1aa0023d81c2f1e77746224d42f2e88e3394ae404e15fb5c496a2
                • Instruction Fuzzy Hash: F621F1A294EB8A9EF78A9768D8611F97FB1FF42210F0446B6E04AC71D7CD2858098780
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a454d8c8d7f10f06b9ff70f991fc8d555beeb8b9d7df5c592cd51acd19b10b41
                • Instruction ID: 5cbd413cd1af59753d24e96d1c1fe01f46329ca19f41b35353cf6b812689863e
                • Opcode Fuzzy Hash: a454d8c8d7f10f06b9ff70f991fc8d555beeb8b9d7df5c592cd51acd19b10b41
                • Instruction Fuzzy Hash: 312123A290EB8E9FF785A768C8611FD7FB1FF42200F0446B6E00AC71D3CD1858098780
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 072883d9f517e7cef5cc40ad034419cb8aeedbf54ca7b174a0538af2554a2c14
                • Instruction ID: 2e371f4b78fcbac2eb7f7d43b33cc617a7e6a4c8a46040f9b9d73a592ac1db34
                • Opcode Fuzzy Hash: 072883d9f517e7cef5cc40ad034419cb8aeedbf54ca7b174a0538af2554a2c14
                • Instruction Fuzzy Hash: 1E9116B1D4EA4B9FF798E738C446AA47BD4EF56310F0485B5E00DC7592DE28E84A83C1
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 11e73049009d57ac41fab06b57aa7af64368a7f59ccbda33116a2d21c8f402f9
                • Instruction ID: 36037dd8ca45f99e3df051a38bfcd123dd879a79841db2ede8183aef40c0805a
                • Opcode Fuzzy Hash: 11e73049009d57ac41fab06b57aa7af64368a7f59ccbda33116a2d21c8f402f9
                • Instruction Fuzzy Hash: 87710871E5D9499FEB98EB38D859AF977E5EF46310F0441BAE00ED3192CD289C45C780
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9b5b00035b57f5e4619fcb8419ef9ed8ead62d8e6e973240dd0da7a24d72bb69
                • Instruction ID: 1e846ec7d067b6c5f3acd456ddde58e0e49c07375682dbb5d52713d92a8ca1a0
                • Opcode Fuzzy Hash: 9b5b00035b57f5e4619fcb8419ef9ed8ead62d8e6e973240dd0da7a24d72bb69
                • Instruction Fuzzy Hash: 6C61967090860D8FEB98DF68D845BEDBBF5FF59311F1082AAD04DD7252CA34A946CB81
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: da998a00762762fefeca557004fcb3bc510564d5c7a3ea1d839ec18439bc9fc4
                • Instruction ID: 82bb1225accae1d21c2447e3900d2f7d3daabf50587a430504136b4db9e55913
                • Opcode Fuzzy Hash: da998a00762762fefeca557004fcb3bc510564d5c7a3ea1d839ec18439bc9fc4
                • Instruction Fuzzy Hash: 6051E771E5991E9FEB98EB28D855ABC77F5FF96300F0041B9E00DD7292CE28A845C780
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e93f2f349d3454f8c600a361aa555d818e279448c05340af99b6d5f8bf949516
                • Instruction ID: 7ab8c392d1cbd19ce57d332ccaf7c3e9b14419cde7835591a71ac3bc091ffcd5
                • Opcode Fuzzy Hash: e93f2f349d3454f8c600a361aa555d818e279448c05340af99b6d5f8bf949516
                • Instruction Fuzzy Hash: 5951A371E1890D8FEB98EB68C459ABDB7E5EF99310F1445B9E00ED3296CE24EC458780
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e51a22826ec49dad821aef10fa327b23289c28e14399f4c2e3df0bb6d293b577
                • Instruction ID: 59b43f90a3d0ad79018f125d2f5a62c23b1d65d724410c17e8f50727a0765c37
                • Opcode Fuzzy Hash: e51a22826ec49dad821aef10fa327b23289c28e14399f4c2e3df0bb6d293b577
                • Instruction Fuzzy Hash: E4517171908A1C8FDB58DB68D845BE9BBF1FF59310F1082AAD04DD3252DE34A9858B81
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 809eb1bbd225f7217624becd00035254e1649f64c1f1044593a70910c6a563c4
                • Instruction ID: f6d2cccad5020790d4eda3e05d51b8a9d17ede290879c83ad8a24a6e593d20c2
                • Opcode Fuzzy Hash: 809eb1bbd225f7217624becd00035254e1649f64c1f1044593a70910c6a563c4
                • Instruction Fuzzy Hash: 8651057090D64D9FE758DF68D855AB87BE0EF56311F04817EE04EC72A3DB28A8068B91
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3a6ad6f8145e4de5e36edefd3126196e007a53fced2ea961e62b2006c7ef1416
                • Instruction ID: 59ccadd4620896c56a5063bbdce4d2ea7a8717aa3dd2b6c98d7d45aee21f466e
                • Opcode Fuzzy Hash: 3a6ad6f8145e4de5e36edefd3126196e007a53fced2ea961e62b2006c7ef1416
                • Instruction Fuzzy Hash: 54519E74949A5D8FEB98DF28C459BA97BE0FF55301F00416EE04EC3692CB75D8458B81
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7f15662d4e8b890feda2381c69147db15568aa429bae11eaffed2204642c4137
                • Instruction ID: e1d8ef3e26901305ce530a56d1086d48accea6ef7878315d90c7e1b52bb42a83
                • Opcode Fuzzy Hash: 7f15662d4e8b890feda2381c69147db15568aa429bae11eaffed2204642c4137
                • Instruction Fuzzy Hash: 73410771D4990E9FEBC4EB68C859AFD7BF1FF89300B044079E40DD3692DE2898468790
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 46ff652aa9f1858bdb5fcc4cdbdc3be2cf4dc2c6659b2c7d28387450b57066ec
                • Instruction ID: 702a9ab821f69490ed3278e14218ca2aac8835dbdba305f32cc421c525b62b69
                • Opcode Fuzzy Hash: 46ff652aa9f1858bdb5fcc4cdbdc3be2cf4dc2c6659b2c7d28387450b57066ec
                • Instruction Fuzzy Hash: 2631FB71A4DA8A9FEB86EB3CC4959A97BE0FF5631170405F6D448C7292CE34E845CB81
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7f0e771d7dd24c15b3fe1525237b53d83f209461cdfec4e0cc6bb183c4ef15e0
                • Instruction ID: c31aadbbe03b2b2a6311f9440303101bb76980fd432f0f792e5c0f1aa4e89d30
                • Opcode Fuzzy Hash: 7f0e771d7dd24c15b3fe1525237b53d83f209461cdfec4e0cc6bb183c4ef15e0
                • Instruction Fuzzy Hash: A231A17040D7889FDB15DBA8D845AEABBF0FF56320F0482AFD08AC7562D764A806CB51
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0e23a9594f926b4c48b270a0375c050f06764e289b2b527f8643b809ed3c26d4
                • Instruction ID: 7f8efa018608980f6050f3f3562db3d0d8e365481b663842bb814160402ff436
                • Opcode Fuzzy Hash: 0e23a9594f926b4c48b270a0375c050f06764e289b2b527f8643b809ed3c26d4
                • Instruction Fuzzy Hash: 61212336E4CD4E8FEB90EB6898561ED7BE4FF89321F0402B2E40DC3192DE24985987C1
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b8c7895c7611bb68370449659ae899df6e428515e8fc841aa9001ed40e9e5631
                • Instruction ID: 13dca1e3a67ce4c866ea9e2fa21638214b5927c7fd795ec2b70804a4103ec960
                • Opcode Fuzzy Hash: b8c7895c7611bb68370449659ae899df6e428515e8fc841aa9001ed40e9e5631
                • Instruction Fuzzy Hash: 9D21F360A5C95A9FF784A7BCD426BAD77D6EB96300F5441B5F01EC32D3CC58A9048382
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9a00ec4935bdb3b3226360072af73dcd4903fa427a91266c13f6e2b0e317e9f0
                • Instruction ID: e142077f2a6a177f3fef39b3fda1a8868ed9de8dd4f92f264c0b8ff13248af35
                • Opcode Fuzzy Hash: 9a00ec4935bdb3b3226360072af73dcd4903fa427a91266c13f6e2b0e317e9f0
                • Instruction Fuzzy Hash: 5B113B21A8E58B5FF7869B6448116FA7BE5EFD7200F0480F6F08DC2583CD1C9C0A8391
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2353dc0f3aa43ca409e5f093209dab67ca0cf40f1eb1450b06ef1e0e801eafd9
                • Instruction ID: b1d6a0ff7f60b5b0d6b6e44c1b83ab4b8e11e19e22758e3a14297c489e14d69e
                • Opcode Fuzzy Hash: 2353dc0f3aa43ca409e5f093209dab67ca0cf40f1eb1450b06ef1e0e801eafd9
                • Instruction Fuzzy Hash: 9B0122B1C4878D8FE79DDF2884AA1B93FE0EB6A201F4440AFD48ED76A2DEB004108741
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 57de9ae89a6bb8ee980091910129618f0f65718e7bd1cef53020529f930bee34
                • Instruction ID: 851ffb2f7d14e61e9bc25d848bad33157d13b81939d8e7f3816f7bcd26a3e8a2
                • Opcode Fuzzy Hash: 57de9ae89a6bb8ee980091910129618f0f65718e7bd1cef53020529f930bee34
                • Instruction Fuzzy Hash: 3F016170E5D90B9EFB98AB2884026FA73D9FF99301F508479E44EC2686DD24EC5547C1
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6310a1a1f54fa033734d786136904f72c2600057455d7080906acdce774e403d
                • Instruction ID: 223f56a09f8a83c79923ff1f8e8aa63d99b6aff4140cd4d3ee1cd4a0a7e4a158
                • Opcode Fuzzy Hash: 6310a1a1f54fa033734d786136904f72c2600057455d7080906acdce774e403d
                • Instruction Fuzzy Hash: 7F0100B2D0AA8D8FDB91ABA8D85A1FD7BF1EF19211F4002E7D048C7192DE2898048781
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1694335edd7af6854de99b87c86f5c03bf0309be81ea4a426f501f34b8328066
                • Instruction ID: 272185c2cfd2b8b898a14e8af4b398f80ee5c00e5f314e24e538c23c9a0bf97a
                • Opcode Fuzzy Hash: 1694335edd7af6854de99b87c86f5c03bf0309be81ea4a426f501f34b8328066
                • Instruction Fuzzy Hash: 5501A2B1E19A075AF78CAB7888879B47280FF15311F404AB9E00FC24E3DE19F84A86C0
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4e4e92399404da7a88b4294a35977642ffaafc53c62d76078c2efb33386f017c
                • Instruction ID: c530f2f17d69c88b4dff0b2625961d49fa188b052fb43bd6d85add13d2c30410
                • Opcode Fuzzy Hash: 4e4e92399404da7a88b4294a35977642ffaafc53c62d76078c2efb33386f017c
                • Instruction Fuzzy Hash: EAF0D131C4D4079FF395DB28C0406B933A6BF92320F108635E00EC21C2DF28E84586C1
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4edf241b00b71f55a9fdb6f14c9026d52e880b9ad66b4bae7f9e3735e762a3a4
                • Instruction ID: 96095e9c5fd3d727eb662c046f7cc15fe4d692ae495ec57fdd12609e43201414
                • Opcode Fuzzy Hash: 4edf241b00b71f55a9fdb6f14c9026d52e880b9ad66b4bae7f9e3735e762a3a4
                • Instruction Fuzzy Hash: 2BE02632C4D3CA8FEB529B5458220D67F60EF16200F4501CBF40CC6143D610951843C3
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bd5d5816998c9f71cafebff230d7c82d6a6d04b40a78aa4d9cb1b96f0d3f3eba
                • Instruction ID: 7602e98d4c0f578fdf86151d00ae24fd50251e5e42e37fa7ecbd12fbe2872df1
                • Opcode Fuzzy Hash: bd5d5816998c9f71cafebff230d7c82d6a6d04b40a78aa4d9cb1b96f0d3f3eba
                • Instruction Fuzzy Hash: 7CE0867188F7CE9FEB5297245C210D97F60EF12200F4805DBE49CC6053D959822D83C2
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c4543ba48cad8328d3a84b1ebaeedb1f465cbd9892f5d05173ac5f92f47281ff
                • Instruction ID: c9d8abad62f8a7e977cc00929a38aad80a2047926e8c0b4d46bb7ad156a1db9a
                • Opcode Fuzzy Hash: c4543ba48cad8328d3a84b1ebaeedb1f465cbd9892f5d05173ac5f92f47281ff
                • Instruction Fuzzy Hash: 64C01235895D4EAEAB906B5058011EAB328FB05304F404556F81DD2041DB24E22856C2
                Memory Dump Source
                • Source File: 00000000.00000002.3733092430.00007FFAAC500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffaac500000_book_lumm2.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e0e2db2d7f4c4cf275796c3299af9ca9f12d8a0b7dc45977b3d1cab754005dde
                • Instruction ID: cea00d0c0333adc224de1f4548c2c2b1dfae2e3dd1924f78e1aa250fb9b52dd3
                • Opcode Fuzzy Hash: e0e2db2d7f4c4cf275796c3299af9ca9f12d8a0b7dc45977b3d1cab754005dde
                • Instruction Fuzzy Hash: C1D0C91088F7C24FE707637508554507EB09A43290B8F82DBE888CA493D68D498D8392