Edit tour

Windows Analysis Report
250427-xt4dsszrv3.bin.exe

Overview

General Information

Sample name:250427-xt4dsszrv3.bin.exe
Analysis ID:1675600
MD5:dd6e4da328dca0e94fa0bf263276ed44
SHA1:4f9e1cd25c1abe4c96a2a5db0893b153377f8695
SHA256:685b4307728abd92415c2d9c001761cfa0481b29689b35106f7a5ee1d1117c8a
Tags:user-UNP4CK
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Joe Sandbox ML detected suspicious sample
Protects its processes via BreakOnTermination flag
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • 250427-xt4dsszrv3.bin.exe (PID: 7744 cmdline: "C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exe" MD5: DD6E4DA328DCA0E94FA0BF263276ED44)
    • cmd.exe (PID: 7828 cmdline: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"' & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7836 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 7912 cmdline: schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"' MD5: 48C2FE20575769DE916F48EF0676A965)
    • cmd.exe (PID: 7844 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp7A0D.tmp.bat"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • timeout.exe (PID: 7924 cmdline: timeout 3 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • mantekaaaa.exe (PID: 8068 cmdline: "C:\Users\user\AppData\Roaming\mantekaaaa.exe" MD5: DD6E4DA328DCA0E94FA0BF263276ED44)
  • mantekaaaa.exe (PID: 7948 cmdline: C:\Users\user\AppData\Roaming\mantekaaaa.exe MD5: DD6E4DA328DCA0E94FA0BF263276ED44)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.AsyncRAT as delivered by MintsLoader includes a PowerShell module with a DGA. The DGA is similar to MintsLoader's DGA, but generates more domains and uses more than one TLD.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
No configs have been found
SourceRuleDescriptionAuthorStrings
250427-xt4dsszrv3.bin.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    250427-xt4dsszrv3.bin.exerat_win_asyncratDetect AsyncRAT based on specific stringsSekoia.io
    • 0x6ed9:$str01: get_ActivatePong
    • 0x7c2f:$str02: get_SslClient
    • 0x7c4b:$str03: get_TcpClient
    • 0x653e:$str04: get_SendSync
    • 0x65fc:$str05: get_IsConnected
    • 0x6c20:$str06: set_UseShellExecute
    • 0xa5c7:$str07: Pastebin
    • 0xa649:$str08: Select * from AntivirusProduct
    • 0xa3a1:$str10: timeout 3 > NUL
    • 0xa291:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
    • 0xa321:$str12: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
    250427-xt4dsszrv3.bin.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
    • 0xa323:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\mantekaaaa.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      C:\Users\user\AppData\Roaming\mantekaaaa.exerat_win_asyncratDetect AsyncRAT based on specific stringsSekoia.io
      • 0x6ed9:$str01: get_ActivatePong
      • 0x7c2f:$str02: get_SslClient
      • 0x7c4b:$str03: get_TcpClient
      • 0x653e:$str04: get_SendSync
      • 0x65fc:$str05: get_IsConnected
      • 0x6c20:$str06: set_UseShellExecute
      • 0xa5c7:$str07: Pastebin
      • 0xa649:$str08: Select * from AntivirusProduct
      • 0xa3a1:$str10: timeout 3 > NUL
      • 0xa291:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
      • 0xa321:$str12: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      C:\Users\user\AppData\Roaming\mantekaaaa.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xa323:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1129477830.00000000004B2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        00000000.00000000.1129477830.00000000004B2000.00000002.00000001.01000000.00000003.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
        • 0xa123:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
        00000000.00000002.1181310315.00000000038D6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          00000000.00000002.1181310315.00000000038D6000.00000004.00000800.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
          • 0xa833:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
          00000007.00000002.2383698510.000000000242C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
              0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.unpackrat_win_asyncratDetect AsyncRAT based on specific stringsSekoia.io
              • 0x50d9:$str01: get_ActivatePong
              • 0x5e2f:$str02: get_SslClient
              • 0x5e4b:$str03: get_TcpClient
              • 0x473e:$str04: get_SendSync
              • 0x47fc:$str05: get_IsConnected
              • 0x4e20:$str06: set_UseShellExecute
              • 0x87c7:$str07: Pastebin
              • 0x8849:$str08: Select * from AntivirusProduct
              • 0x85a1:$str10: timeout 3 > NUL
              • 0x8491:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
              • 0x8521:$str12: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
              0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
              • 0x8523:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
              0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpackrat_win_asyncratDetect AsyncRAT based on specific stringsSekoia.io
                • 0x6ed9:$str01: get_ActivatePong
                • 0x7c2f:$str02: get_SslClient
                • 0x7c4b:$str03: get_TcpClient
                • 0x653e:$str04: get_SendSync
                • 0x65fc:$str05: get_IsConnected
                • 0x6c20:$str06: set_UseShellExecute
                • 0xa5c7:$str07: Pastebin
                • 0xa649:$str08: Select * from AntivirusProduct
                • 0xa3a1:$str10: timeout 3 > NUL
                • 0xa291:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
                • 0xa321:$str12: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
                Click to see the 4 entries

                System Summary

                barindex
                Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exe", ParentImage: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exe, ParentProcessId: 7744, ParentProcessName: 250427-xt4dsszrv3.bin.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"' & exit, ProcessId: 7828, ProcessName: cmd.exe
                Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exe", ParentImage: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exe, ParentProcessId: 7744, ParentProcessName: 250427-xt4dsszrv3.bin.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"' & exit, ProcessId: 7828, ProcessName: cmd.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"' , CommandLine: schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"' , CommandLine|base64offset|contains: mj,, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"' & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7828, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"' , ProcessId: 7912, ProcessName: schtasks.exe
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 250427-xt4dsszrv3.bin.exeAvira: detected
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeAvira: detection malicious, Label: HEUR/AGEN.1360508
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeReversingLabs: Detection: 86%
                Source: 250427-xt4dsszrv3.bin.exeVirustotal: Detection: 77%Perma Link
                Source: 250427-xt4dsszrv3.bin.exeReversingLabs: Detection: 86%
                Source: Submited SampleNeural Call Log Analysis: 97.9%
                Source: 250427-xt4dsszrv3.bin.exeString decryptor: 12802
                Source: 250427-xt4dsszrv3.bin.exeString decryptor: 0.tcp.eu.ngrok.io
                Source: 250427-xt4dsszrv3.bin.exeString decryptor: 0.5.8
                Source: 250427-xt4dsszrv3.bin.exeString decryptor: true
                Source: 250427-xt4dsszrv3.bin.exeString decryptor: XaYVyizsO2Bz
                Source: 250427-xt4dsszrv3.bin.exeString decryptor: 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
                Source: 250427-xt4dsszrv3.bin.exeString decryptor: K34dL2g8m3roWyfEuo+ij2IuhFhNN9yriYY26x4P0HfoY39fj9ZhN2RefmqCVtQ9pn3t2OKMVDAoPG6KJjmLJiOhe0zjUBKBRDwPci1xefynR/GcKMYO+GKlV0qkEDRKBtxwh9A8DI4oD2klP/WmkRcWBrdJLJyBviFIGEc2M9WEGl1eIC9GuO1tjUVcEIJ4BUDjt20QpPkEv8Wks7jpQ70h4PqzQ1ABEuCxnr8WFLGaNRkikgKZ8RWmCwMg31073iILc+qHCe1JCW5jyIOF7rzrBMAt8wa5BF07q9kFYXxIjl5qudzp8NiVrlLqgIgkdf+eMmB8UplmtPIeSx+g1PuEPnxt2C2FNCZJlP5v34gQRRdUJZqMfQnc3XOp1qOA66i7kL2yDTO5DAXf/NSkPdqRcoP6vIV/K9S/p99wzykxDfHCOyrUzbr6HOqz1SxY6EqfXFKGe7QPuuqFzSt00E4WCLRMLKFbFqxBhUry1A5YW4KEVLLV6x71GjEzvbVVuewX+81SHmGGyGzfH73Qcc9iYAzc2HLbodgTOCdjOn210dpWJP8CujmdmqVAvYtmWu/DfUtrnK9hYp6Ea6dFb9IVku47p4tfdp3kjBvJiH43TACiEBSyctX9IeTZ0ICLnjRgM/RMWzKaZSs25paPSkgMm4Yvy7d55/Gd1PJH1Uo=
                Source: 250427-xt4dsszrv3.bin.exeString decryptor: null
                Source: 250427-xt4dsszrv3.bin.exeString decryptor: Default
                Source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpackString decryptor: 12802
                Source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpackString decryptor: 0.tcp.eu.ngrok.io
                Source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpackString decryptor: 0.5.8
                Source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpackString decryptor: true
                Source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpackString decryptor: XaYVyizsO2Bz
                Source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpackString decryptor: MIIE8jCCAtqgAwIBAgIQAJUIs5zUMjOTMx3DQgpiZTANBgkqhkiG9w0BAQ0FADAaMRgwFgYDVQQDDA9Bc3luY1JBVCBTZXJ2ZXIwIBcNMjUwNDI0MjEwNzAzWhgPOTk5OTEyMzEyMzU5NTlaMBoxGDAWBgNVBAMMD0FzeW5jUkFUIFNlcnZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJz5KpT+IeiomYVFpjqohlyaZ/vShAoclF7NWWYulof0lme8RYBY15P4TExXFVLI4qW3NHKl7AiA8lkpgm3ZM5EiRLlwTPBGi/BBGNSjRHPiWEszF1UI9FFz2GctP/ml32vgLIxm4nmVp4OFfHM+Swx6ud/d0ZiQvSsi0yLKCbceP45RKWiILbqTv322B+FTKStEyvdbkDTF3GR5dN01B34qZFDCYMDERRdRbu2+kXY55r9h/YTUR4XVWwrw92KpepbzEtYnCthbAaqFgVKxH54/NgHmvNUc3Ho4LGmPHbElC0h5rfsoRfKESWOjTtaqKkOcu65iwbD6z5sxxpuLm5yY65aR10M/kUP2si2HEZ5jeX5AU6frxXINUdPCQ/RYF6DiXNLb1IB+G2NjYaju48deu9Ux8p5odESgNuGLA6iybU24OH3O/+jUOfYuuk9J69lLaskdRRVDw0nUeYRX6RGdTj1slkyFfrnC+rJ1pEg2IMPWsdqPaG3Ynv6Wqa03epuUJutiBmlGLa5NPjxUDkfMzdreCV4LZp6aVYmnu7kiKfKA9c/EZsVxzvD6dLuuSnd/mT1gQS4gQADs2peZHzkRKfgs/9DmOVI50JG4XASZCBYwjw2bST1DTddvljSIfQ2APZ5CAXRc5AXIl/LkYgVEgK1BA61Dr2uDz8NROBHPAgMBAAGjMjAwMB0GA1UdDgQWBBQBT/jSXenFu0hFCO06ERalsbP5ajAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4ICAQA156gPZsCS8jLbZUOa7HCo3xD35eFrGDCPJVvpwp9eOijpaFCo2LzYNOzLQ4XTuLonzz+qQagA46R8vyZm1URt7JjbhwHhCYNA8m7OkVU+fXLaBbsBQmoLA6Je7QymbtHK4UJGopGiLORuN4tSkoUnoKBIauL2X7XoKxbiLSp9TGokbQIkz7u2E6iPQk1qeLJNEN0SSgdI5rrcv8u3g+VELJF9ltQU426+kTSYQ4V3BY1Qxbnym+NuD7tZWh0OAxyMA9l0kLysdXwscBxfpcvKsAgr7/iW1p1EGXLZoJi/OJ41PAhgKY7dSS8usjO2MQB2tEx6DVymbDAc8HKaEawLNzi04hUAI7j6bi/rRrtouRLQrGFRYxEquYCBRrqeKUo+1q/TbY83bUuAozkDC3H+fV6/CRFKDxelMQ9+NTEAahkacFjqUWzgAP/qfmUJvjbeUqc0fPL9jPrhvei7iz+ejcjD1qJjFiu7WHnv5916O3lX0JFx3ewZLiRqK7sV62MiMaoI0MK8SjMqr4HGxKz0t7rvIOEIN3u4K6UKG2S+S1DZhKmTlceGFpofy88V/ODiC4VxPZfo5psfa8zn/Af3dlpzb0fDLpftZN41PVflR3oiKfbz8ndFvZ1QrYXgIdNiynBqcEEMHogY6d1TUMBPbOJmDQZOJ759fjo/Jch3QA==
                Source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpackString decryptor: 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
                Source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpackString decryptor: true
                Source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpackString decryptor: null
                Source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpackString decryptor: true
                Source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpackString decryptor: Default
                Source: 250427-xt4dsszrv3.bin.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 250427-xt4dsszrv3.bin.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: global trafficTCP traffic: 192.168.2.4:49716 -> 18.192.31.30:12802
                Source: global trafficTCP traffic: 192.168.2.4:49730 -> 3.71.225.231:12802
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: 0.tcp.eu.ngrok.io
                Source: 250427-xt4dsszrv3.bin.exe, 00000000.00000002.1179987885.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, mantekaaaa.exe, 00000007.00000002.2383698510.000000000242C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 250427-xt4dsszrv3.bin.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1129477830.00000000004B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1181310315.00000000038D6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2383698510.000000000242C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1179987885.0000000002871000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 250427-xt4dsszrv3.bin.exe PID: 7744, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mantekaaaa.exe PID: 7948, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\mantekaaaa.exe, type: DROPPED

                Operating System Destruction

                barindex
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: 00 00 00 00 Jump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: 01 00 00 00 Jump to behavior

                System Summary

                barindex
                Source: 250427-xt4dsszrv3.bin.exe, type: SAMPLEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
                Source: 250427-xt4dsszrv3.bin.exe, type: SAMPLEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
                Source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
                Source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.raw.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
                Source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 00000000.00000000.1129477830.00000000004B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 00000000.00000002.1181310315.00000000038D6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 00000007.00000002.2383698510.000000000242C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 00000000.00000002.1179987885.0000000002871000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: Process Memory Space: 250427-xt4dsszrv3.bin.exe PID: 7744, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: Process Memory Space: mantekaaaa.exe PID: 7948, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exe, type: DROPPEDMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exe, type: DROPPEDMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeCode function: 0_2_00E340880_2_00E34088
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeCode function: 0_2_00E349580_2_00E34958
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeCode function: 0_2_00E35B200_2_00E35B20
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeCode function: 0_2_00E33D400_2_00E33D40
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeCode function: 7_2_007140887_2_00714088
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeCode function: 7_2_007149587_2_00714958
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeCode function: 7_2_00715B207_2_00715B20
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeCode function: 7_2_00713D407_2_00713D40
                Source: 250427-xt4dsszrv3.bin.exe, 00000000.00000000.1129477830.00000000004B2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDiscord.exe0 vs 250427-xt4dsszrv3.bin.exe
                Source: 250427-xt4dsszrv3.bin.exe, 00000000.00000002.1181310315.00000000038D6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDiscord.exe0 vs 250427-xt4dsszrv3.bin.exe
                Source: 250427-xt4dsszrv3.bin.exeBinary or memory string: OriginalFilenameDiscord.exe0 vs 250427-xt4dsszrv3.bin.exe
                Source: 250427-xt4dsszrv3.bin.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 250427-xt4dsszrv3.bin.exe, type: SAMPLEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
                Source: 250427-xt4dsszrv3.bin.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
                Source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
                Source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
                Source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 00000000.00000000.1129477830.00000000004B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 00000000.00000002.1181310315.00000000038D6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 00000007.00000002.2383698510.000000000242C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 00000000.00000002.1179987885.0000000002871000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: Process Memory Space: 250427-xt4dsszrv3.bin.exe PID: 7744, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: Process Memory Space: mantekaaaa.exe PID: 7948, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exe, type: DROPPEDMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 250427-xt4dsszrv3.bin.exe, lsvJXszuJGwU.csBase64 encoded string: 'ILFBodZFh/fSnaBngtFU9hQpU2+9bI+AeuNxYlGuYO7EzQAz3xCDHlcaQClpQbRgvZn9Lupwx9OXoTD+CZvKjw==', 'pH85q6E8+abQAKbMwc4fs06O2U/oafOXKwudd11ZqO94Ubqtbx9lSSMjUSsywBa3m61S6Ou3gG7bSzpArBuA6tA+IkCyGDFncuJIWAb0a4M=', 'SM78ltu98Ggo2i1QKX0+l1Uhspz9nD9eRi2Og2UaeNrwU4+rXMjcYYzcHIgTF+L2KRAHQ+IS7/HW2bIjpxrWuA==', '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', 's5I7ZSLUeBIHxVhBQW0FFx1F4zGSS8MMMiIlnQ2aQnzJa3VbOT3/ZKywRzJrFuGgSfDLCDmRTuHHhDzBsBCSxg==', 'jM88hDdsrBrd4Z6ZzXf+IcHqeuQhTR5zG6AMYM0nX6RJK6TWAixRkEeQEqluoimWYm+FYb+K6d8bPhxr1HW4Rw==', 'QBBlUt0alPeLrNkgj0KoIsSwobTV+3EsETS9YWCsVgcnS/XGKpRCsMf1p5tTJZRI3dWbv+2K0mumEFXxN4N3iQ=='
                Source: mantekaaaa.exe.0.dr, lsvJXszuJGwU.csBase64 encoded string: 'ILFBodZFh/fSnaBngtFU9hQpU2+9bI+AeuNxYlGuYO7EzQAz3xCDHlcaQClpQbRgvZn9Lupwx9OXoTD+CZvKjw==', 'pH85q6E8+abQAKbMwc4fs06O2U/oafOXKwudd11ZqO94Ubqtbx9lSSMjUSsywBa3m61S6Ou3gG7bSzpArBuA6tA+IkCyGDFncuJIWAb0a4M=', 'SM78ltu98Ggo2i1QKX0+l1Uhspz9nD9eRi2Og2UaeNrwU4+rXMjcYYzcHIgTF+L2KRAHQ+IS7/HW2bIjpxrWuA==', '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', 's5I7ZSLUeBIHxVhBQW0FFx1F4zGSS8MMMiIlnQ2aQnzJa3VbOT3/ZKywRzJrFuGgSfDLCDmRTuHHhDzBsBCSxg==', 'jM88hDdsrBrd4Z6ZzXf+IcHqeuQhTR5zG6AMYM0nX6RJK6TWAixRkEeQEqluoimWYm+FYb+K6d8bPhxr1HW4Rw==', 'QBBlUt0alPeLrNkgj0KoIsSwobTV+3EsETS9YWCsVgcnS/XGKpRCsMf1p5tTJZRI3dWbv+2K0mumEFXxN4N3iQ=='
                Source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.raw.unpack, lsvJXszuJGwU.csBase64 encoded string: 'ILFBodZFh/fSnaBngtFU9hQpU2+9bI+AeuNxYlGuYO7EzQAz3xCDHlcaQClpQbRgvZn9Lupwx9OXoTD+CZvKjw==', 'pH85q6E8+abQAKbMwc4fs06O2U/oafOXKwudd11ZqO94Ubqtbx9lSSMjUSsywBa3m61S6Ou3gG7bSzpArBuA6tA+IkCyGDFncuJIWAb0a4M=', 'SM78ltu98Ggo2i1QKX0+l1Uhspz9nD9eRi2Og2UaeNrwU4+rXMjcYYzcHIgTF+L2KRAHQ+IS7/HW2bIjpxrWuA==', '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', 's5I7ZSLUeBIHxVhBQW0FFx1F4zGSS8MMMiIlnQ2aQnzJa3VbOT3/ZKywRzJrFuGgSfDLCDmRTuHHhDzBsBCSxg==', 'jM88hDdsrBrd4Z6ZzXf+IcHqeuQhTR5zG6AMYM0nX6RJK6TWAixRkEeQEqluoimWYm+FYb+K6d8bPhxr1HW4Rw==', 'QBBlUt0alPeLrNkgj0KoIsSwobTV+3EsETS9YWCsVgcnS/XGKpRCsMf1p5tTJZRI3dWbv+2K0mumEFXxN4N3iQ=='
                Source: 250427-xt4dsszrv3.bin.exe, uLrDnYtvkZrQ.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 250427-xt4dsszrv3.bin.exe, uLrDnYtvkZrQ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.raw.unpack, uLrDnYtvkZrQ.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.raw.unpack, uLrDnYtvkZrQ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: mantekaaaa.exe.0.dr, uLrDnYtvkZrQ.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: mantekaaaa.exe.0.dr, uLrDnYtvkZrQ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 250427-xt4dsszrv3.bin.exe, 00000000.00000002.1179987885.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, mantekaaaa.exe, 00000007.00000002.2383698510.000000000244F000.00000004.00000800.00020000.00000000.sdmp, mantekaaaa.exe, 00000009.00000002.1252011105.0000000003091000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: .slNO
                Source: classification engineClassification label: mal100.troj.evad.winEXE@15/5@2/2
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeFile created: C:\Users\user\AppData\Roaming\mantekaaaa.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeMutant created: NULL
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeMutant created: \Sessions\1\BaseNamedObjects\XaYVyizsO2Bz
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7836:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7864:120:WilError_03
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7A0D.tmpJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp7A0D.tmp.bat""
                Source: 250427-xt4dsszrv3.bin.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 250427-xt4dsszrv3.bin.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: 250427-xt4dsszrv3.bin.exeVirustotal: Detection: 77%
                Source: 250427-xt4dsszrv3.bin.exeReversingLabs: Detection: 86%
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeFile read: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exe "C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exe"
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"' & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp7A0D.tmp.bat""
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"'
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\mantekaaaa.exe C:\Users\user\AppData\Roaming\mantekaaaa.exe
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\mantekaaaa.exe "C:\Users\user\AppData\Roaming\mantekaaaa.exe"
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"' & exitJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp7A0D.tmp.bat""Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"' Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\mantekaaaa.exe "C:\Users\user\AppData\Roaming\mantekaaaa.exe" Jump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                Source: 250427-xt4dsszrv3.bin.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: 250427-xt4dsszrv3.bin.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: 250427-xt4dsszrv3.bin.exe, qhnhGUdzrttQbB.csHigh entropy of concatenated method names: 'OnHxZqrMwvuofH', 'mAnFKyHvXi', 'hYWtZoNRWUh', 'EmldLKHeZkeGNn', 'EAcXeCVkIAtZG', 'qEGIAGKJISLqnmnv', 'tzYmpgMygEd', 'ZGpuyZXgLZxcU', 'aZTMRPiVqWc', 'DnctsskPlQQiBLj'
                Source: mantekaaaa.exe.0.dr, qhnhGUdzrttQbB.csHigh entropy of concatenated method names: 'OnHxZqrMwvuofH', 'mAnFKyHvXi', 'hYWtZoNRWUh', 'EmldLKHeZkeGNn', 'EAcXeCVkIAtZG', 'qEGIAGKJISLqnmnv', 'tzYmpgMygEd', 'ZGpuyZXgLZxcU', 'aZTMRPiVqWc', 'DnctsskPlQQiBLj'
                Source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.raw.unpack, qhnhGUdzrttQbB.csHigh entropy of concatenated method names: 'OnHxZqrMwvuofH', 'mAnFKyHvXi', 'hYWtZoNRWUh', 'EmldLKHeZkeGNn', 'EAcXeCVkIAtZG', 'qEGIAGKJISLqnmnv', 'tzYmpgMygEd', 'ZGpuyZXgLZxcU', 'aZTMRPiVqWc', 'DnctsskPlQQiBLj'
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeFile created: C:\Users\user\AppData\Roaming\mantekaaaa.exeJump to dropped file

                Boot Survival

                barindex
                Source: Yara matchFile source: 250427-xt4dsszrv3.bin.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1129477830.00000000004B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1181310315.00000000038D6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2383698510.000000000242C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1179987885.0000000002871000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 250427-xt4dsszrv3.bin.exe PID: 7744, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mantekaaaa.exe PID: 7948, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\mantekaaaa.exe, type: DROPPED
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"'
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 250427-xt4dsszrv3.bin.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1129477830.00000000004B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1181310315.00000000038D6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2383698510.000000000242C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1179987885.0000000002871000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 250427-xt4dsszrv3.bin.exe PID: 7744, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mantekaaaa.exe PID: 7948, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\mantekaaaa.exe, type: DROPPED
                Source: 250427-xt4dsszrv3.bin.exe, mantekaaaa.exe.0.drBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeMemory allocated: E30000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeMemory allocated: 2870000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeMemory allocated: 2780000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeMemory allocated: 710000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeMemory allocated: 2420000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeMemory allocated: 2360000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeMemory allocated: 1700000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeMemory allocated: 3090000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeMemory allocated: 5090000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeWindow / User API: threadDelayed 878Jump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exe TID: 7764Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exe TID: 8108Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: mantekaaaa.exe.0.drBinary or memory string: vmware
                Source: 250427-xt4dsszrv3.bin.exe, 00000000.00000002.1179266486.0000000000A32000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-
                Source: mantekaaaa.exe, 00000007.00000002.2386346122.00000000048CD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllV)
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess information queried: ProcessInformationJump to behavior

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeCode function: 0_2_00E32D4C CheckRemoteDebuggerPresent,0_2_00E32D4C
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeMemory allocated: page read and write | page guardJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"' & exitJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp7A0D.tmp.bat""Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"' Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\mantekaaaa.exe "C:\Users\user\AppData\Roaming\mantekaaaa.exe" Jump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeQueries volume information: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeQueries volume information: C:\Users\user\AppData\Roaming\mantekaaaa.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\mantekaaaa.exeQueries volume information: C:\Users\user\AppData\Roaming\mantekaaaa.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Lowering of HIPS / PFW / Operating System Security Settings

                barindex
                Source: Yara matchFile source: 250427-xt4dsszrv3.bin.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.250427-xt4dsszrv3.bin.exe.4b0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.250427-xt4dsszrv3.bin.exe.38d6510.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1129477830.00000000004B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1181310315.00000000038D6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2383698510.000000000242C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1179987885.0000000002871000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 250427-xt4dsszrv3.bin.exe PID: 7744, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mantekaaaa.exe PID: 7948, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\mantekaaaa.exe, type: DROPPED
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information1
                Scripting
                Valid Accounts1
                Windows Management Instrumentation
                2
                Scheduled Task/Job
                11
                Process Injection
                1
                Masquerading
                OS Credential Dumping321
                Security Software Discovery
                Remote Services1
                Archive Collected Data
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts2
                Scheduled Task/Job
                1
                Scripting
                2
                Scheduled Task/Job
                1
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop ProtocolData from Removable Media1
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt1
                DLL Side-Loading
                1
                DLL Side-Loading
                51
                Virtualization/Sandbox Evasion
                Security Account Manager51
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive1
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture1
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                Obfuscated Files or Information
                LSA Secrets1
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials23
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1675600 Sample: 250427-xt4dsszrv3.bin.exe Startdate: 27/04/2025 Architecture: WINDOWS Score: 100 34 0.tcp.eu.ngrok.io 2->34 40 Malicious sample detected (through community Yara rule) 2->40 42 Antivirus / Scanner detection for submitted sample 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 6 other signatures 2->46 8 250427-xt4dsszrv3.bin.exe 7 2->8         started        12 mantekaaaa.exe 2 2->12         started        signatures3 process4 dnsIp5 30 C:\Users\user\AppData\...\mantekaaaa.exe, PE32 8->30 dropped 32 C:\Users\...\250427-xt4dsszrv3.bin.exe.log, ASCII 8->32 dropped 48 Protects its processes via BreakOnTermination flag 8->48 50 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 8->50 15 cmd.exe 1 8->15         started        18 cmd.exe 1 8->18         started        36 0.tcp.eu.ngrok.io 18.192.31.30, 12802, 49716, 49722 AMAZON-02US United States 12->36 38 3.71.225.231, 12802, 49730, 49731 AMAZON-02US United States 12->38 52 Antivirus detection for dropped file 12->52 54 Multi AV Scanner detection for dropped file 12->54 file6 signatures7 process8 signatures9 56 Uses schtasks.exe or at.exe to add and modify task schedules 15->56 20 conhost.exe 15->20         started        22 schtasks.exe 1 15->22         started        24 mantekaaaa.exe 3 18->24         started        26 conhost.exe 18->26         started        28 timeout.exe 1 18->28         started        process10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                250427-xt4dsszrv3.bin.exe78%VirustotalBrowse
                250427-xt4dsszrv3.bin.exe86%ReversingLabsWin32.Backdoor.AsyncRat
                250427-xt4dsszrv3.bin.exe100%AviraHEUR/AGEN.1360508
                SAMPLE100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\mantekaaaa.exe100%AviraHEUR/AGEN.1360508
                C:\Users\user\AppData\Roaming\mantekaaaa.exe86%ReversingLabsWin32.Backdoor.AsyncRat
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches

                Download Network PCAP: filteredfull

                NameIPActiveMaliciousAntivirus DetectionReputation
                0.tcp.eu.ngrok.io
                18.192.31.30
                truetrue
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name250427-xt4dsszrv3.bin.exe, 00000000.00000002.1179987885.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, mantekaaaa.exe, 00000007.00000002.2383698510.000000000242C000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    18.192.31.30
                    0.tcp.eu.ngrok.ioUnited States
                    16509AMAZON-02UStrue
                    3.71.225.231
                    unknownUnited States
                    16509AMAZON-02USfalse
                    Joe Sandbox version:42.0.0 Malachite
                    Analysis ID:1675600
                    Start date and time:2025-04-27 21:14:18 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 4m 47s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:19
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:250427-xt4dsszrv3.bin.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@15/5@2/2
                    EGA Information:
                    • Successful, ratio: 66.7%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 32
                    • Number of non-executed functions: 1
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, sppsvc.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 184.29.183.29, 4.245.163.56
                    • Excluded domains from analysis (whitelisted): a-ring-fallback.msedge.net, fs.microsoft.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target mantekaaaa.exe, PID 8068 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    TimeTypeDescription
                    20:15:19Task SchedulerRun new task: mantekaaaa path: "C:\Users\user\AppData\Roaming\mantekaaaa.exe"
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    18.192.31.30YiWuyX184J.exeGet hashmaliciousNjratBrowse
                      r0FS3r7Ore.exeGet hashmaliciousNjratBrowse
                        OLHskBFtS1.exeGet hashmaliciousNjratBrowse
                          lXLWfHWHMd.exeGet hashmaliciousNjratBrowse
                            3.71.225.231r0FS3r7Ore.exeGet hashmaliciousNjratBrowse
                              4zeGOaTirn.exeGet hashmaliciousNjratBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                0.tcp.eu.ngrok.iosvchost pastebin actual.exeGet hashmaliciousXWormBrowse
                                • 18.153.198.123
                                resembleC2.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                • 18.153.198.123
                                CrSpoofer.exeGet hashmaliciousAsyncRATBrowse
                                • 3.78.28.71
                                7299_output.vbsGet hashmaliciousUnknownBrowse
                                • 3.78.28.71
                                Opera.exeGet hashmaliciousZTratBrowse
                                • 52.57.120.10
                                YiWuyX184J.exeGet hashmaliciousNjratBrowse
                                • 3.74.27.83
                                TLH3anP3lh.exeGet hashmaliciousNjratBrowse
                                • 52.57.120.10
                                r0FS3r7Ore.exeGet hashmaliciousNjratBrowse
                                • 3.74.27.83
                                OLHskBFtS1.exeGet hashmaliciousNjratBrowse
                                • 3.74.27.83
                                lXLWfHWHMd.exeGet hashmaliciousNjratBrowse
                                • 18.192.31.30
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                AMAZON-02USna.elfGet hashmaliciousPrometeiBrowse
                                • 13.214.182.154
                                zenmunet-bittery.exeGet hashmaliciousUnknownBrowse
                                • 65.8.165.71
                                GFController.exeGet hashmaliciousUnknownBrowse
                                • 18.154.131.104
                                sdc.exeGet hashmaliciousNjratBrowse
                                • 3.124.67.191
                                250427-vdxvzat1ex.bin.exeGet hashmaliciousNeconydBrowse
                                • 44.247.155.67
                                ppc.elfGet hashmaliciousUnknownBrowse
                                • 34.249.145.219
                                x86.elfGet hashmaliciousUnknownBrowse
                                • 34.243.160.129
                                250427-tnf5jawr13.bin.exeGet hashmaliciousFloodFix, GhostRatBrowse
                                • 35.161.60.101
                                250427-ta714awpt9.bin.exeGet hashmaliciousXRedBrowse
                                • 108.139.10.35
                                250427-ta714awpt9.bin.exeGet hashmaliciousXRedBrowse
                                • 108.139.10.29
                                AMAZON-02USna.elfGet hashmaliciousPrometeiBrowse
                                • 13.214.182.154
                                zenmunet-bittery.exeGet hashmaliciousUnknownBrowse
                                • 65.8.165.71
                                GFController.exeGet hashmaliciousUnknownBrowse
                                • 18.154.131.104
                                sdc.exeGet hashmaliciousNjratBrowse
                                • 3.124.67.191
                                250427-vdxvzat1ex.bin.exeGet hashmaliciousNeconydBrowse
                                • 44.247.155.67
                                ppc.elfGet hashmaliciousUnknownBrowse
                                • 34.249.145.219
                                x86.elfGet hashmaliciousUnknownBrowse
                                • 34.243.160.129
                                250427-tnf5jawr13.bin.exeGet hashmaliciousFloodFix, GhostRatBrowse
                                • 35.161.60.101
                                250427-ta714awpt9.bin.exeGet hashmaliciousXRedBrowse
                                • 108.139.10.35
                                250427-ta714awpt9.bin.exeGet hashmaliciousXRedBrowse
                                • 108.139.10.29
                                No context
                                No context
                                Process:C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):739
                                Entropy (8bit):5.348505694476449
                                Encrypted:false
                                SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhaWzAbDLI4MNldKZat92n4M6:ML9E4KlKDE4KhKiKhBsXE4qdK284j
                                MD5:A65F13C4355387C4645D260206AE915F
                                SHA1:F8857636BB3B50E634E96E7B0ECE6AD77656BA5F
                                SHA-256:DB8CA2E253F03395ABECD812505666B3BD5CE699B798E3F624D22EE605FB290E
                                SHA-512:0584E8911FD08CC0BB833C6373AE5D161D00CF40FB4533B5DD0D31F38CF1783BB25E34084995A2D116AFB01ABAD14005D62EE51A1D9B79E262EF28775B878AB6
                                Malicious:true
                                Reputation:moderate, very likely benign file
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Management\96012833bebd5f21714fc508603cda97\System.Management.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                Process:C:\Users\user\AppData\Roaming\mantekaaaa.exe
                                File Type:CSV text
                                Category:dropped
                                Size (bytes):425
                                Entropy (8bit):5.353683843266035
                                Encrypted:false
                                SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                                MD5:859802284B12C59DDBB85B0AC64C08F0
                                SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                                SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                                SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                Process:C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exe
                                File Type:DOS batch file, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):154
                                Entropy (8bit):4.989498228555358
                                Encrypted:false
                                SSDEEP:3:mKDDCMNqTtvL5ot+kiEaKC5V8iAZmqRDt+kiE2J5xAInTRI4eGZPy:hWKqTtT6wknaZ5V8iAZmq1wkn23fTZeN
                                MD5:111BFEDB2FE1184FCD5FA75B0AFD0DC8
                                SHA1:945F1E3929BDA6913992866447BDE632AD717E8A
                                SHA-256:BE88AE367533800A31B2692100078E5441C4A346791EEEB80322446F620253AE
                                SHA-512:A1B35742320F75DD188ED67E5002E9D42219B880C2F680BAC909542AB631F9C551E0CB07C5EEBE897E20A233193EBF1E4D7C74F63BE1BCAE9780DC8FAE575BEF
                                Malicious:false
                                Preview:@echo off..timeout 3 > NUL..START "" "C:\Users\user\AppData\Roaming\mantekaaaa.exe"..CD C:\Users\user\AppData\Local\Temp\..DEL "tmp7A0D.tmp.bat" /f /q..
                                Process:C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):334848
                                Entropy (8bit):3.3565884382571527
                                Encrypted:false
                                SSDEEP:1536:XujY21TU0r2r23ehdf+hbygwlbjAikOapPXLocdSpp65GI:XujY6TU0r2oKf+hbyggjAiktPJ4vSGI
                                MD5:DD6E4DA328DCA0E94FA0BF263276ED44
                                SHA1:4F9E1CD25C1ABE4C96A2A5DB0893B153377F8695
                                SHA-256:685B4307728ABD92415C2D9C001761CFA0481B29689B35106F7A5EE1D1117C8A
                                SHA-512:054FC29D46338465D372E2C27E21A170DAF7110755ED4B5F6C1A9D91DB5DC4C9214A0199098F4FF32EA0CFC744B4D259F8315EFE7E0AC09CD64D6CE3C6854669
                                Malicious:true
                                Yara Hits:
                                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Roaming\mantekaaaa.exe, Author: Joe Security
                                • Rule: rat_win_asyncrat, Description: Detect AsyncRAT based on specific strings, Source: C:\Users\user\AppData\Roaming\mantekaaaa.exe, Author: Sekoia.io
                                • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: C:\Users\user\AppData\Roaming\mantekaaaa.exe, Author: ditekSHen
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 86%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....-e.....................h......~.... ........@.. ....................................@.................................,...O.......$e...................`....................................................... ............... ..H............text........ ...................... ..`.rsrc...$e.......f..................@..@.reloc.......`......................@..B................`.......H........Y..8v.............................................................V..;...$0.xC.=VD..b......9A../.\.....(....*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.~....*.......*.~....*.......*.~....*.......**.(>......*2~.....o?...*.s.........*.()...:(...(*...:....(+...:....('...:....((...9.....(v...*V(....s.... ...o....*n~....9....~....o..........*~~....(....9....(0...9....(@...*Vr|%.p~....(o....#...*.s...
                                Process:C:\Windows\SysWOW64\timeout.exe
                                File Type:ASCII text, with CRLF line terminators, with overstriking
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.41440934524794
                                Encrypted:false
                                SSDEEP:3:hYFqdLGAR+mQRKVxLZXt0sn:hYFqGaNZKsn
                                MD5:3DD7DD37C304E70A7316FE43B69F421F
                                SHA1:A3754CFC33E9CA729444A95E95BCB53384CB51E4
                                SHA-256:4FA27CE1D904EA973430ADC99062DCF4BAB386A19AB0F8D9A4185FA99067F3AA
                                SHA-512:713533E973CF0FD359AC7DB22B1399392C86D9FD1E715248F5724AAFBBF0EEB5EAC0289A0E892167EB559BE976C2AD0A0A0D8EFC407FFAF5B3C3A32AA9A0AAA4
                                Malicious:false
                                Preview:..Waiting for 3 seconds, press a key to continue ....2.1.0..
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):3.3565884382571527
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                • DOS Executable Generic (2002/1) 0.01%
                                File name:250427-xt4dsszrv3.bin.exe
                                File size:334'848 bytes
                                MD5:dd6e4da328dca0e94fa0bf263276ed44
                                SHA1:4f9e1cd25c1abe4c96a2a5db0893b153377f8695
                                SHA256:685b4307728abd92415c2d9c001761cfa0481b29689b35106f7a5ee1d1117c8a
                                SHA512:054fc29d46338465d372e2c27e21a170daf7110755ed4b5f6c1a9d91db5dc4c9214a0199098f4ff32ea0cfc744b4d259f8315efe7e0ac09cd64d6ce3c6854669
                                SSDEEP:1536:XujY21TU0r2r23ehdf+hbygwlbjAikOapPXLocdSpp65GI:XujY6TU0r2oKf+hbyggjAiktPJ4vSGI
                                TLSH:6E6462E02698FF17E679CFBC48B191424D79BD13A513E40B6A8436CD0A33ACB4532DE6
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....-e.....................h......~.... ........@.. ....................................@................................
                                Icon Hash:0f2b69d4d44d330f
                                Entrypoint:0x40d07e
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x652DADE5 [Mon Oct 16 21:40:53 2023 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xd02c0x4f.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x46524.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x560000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000xb0840xb20075edce6dcf8c6636e2b4d1f74349327aFalse0.5417837078651685data5.6167728870607485IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rsrc0xe0000x465240x46600ecee44ab5bb1263bbf8283d551e2ad9eFalse0.0337790019982238data2.6028504911502264IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x560000xc0x2004cabfef58a4e8716ddd98e1c6e729d0dFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0xe1c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.32180851063829785
                                RT_ICON0xe6280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.18785178236397748
                                RT_ICON0xf6d00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.17074688796680498
                                RT_ICON0x11c780x42028Device independent bitmap graphic, 256 x 512 x 32, image size 00.020719294611947808
                                RT_GROUP_ICON0x53ca00x3edata0.7580645161290323
                                RT_VERSION0x53ce00x3b0data0.4269067796610169
                                RT_MANIFEST0x540900x493exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.43381725021349277
                                DLLImport
                                mscoree.dll_CorExeMain
                                DescriptionData
                                Translation0x0000 0x04b0
                                Comments
                                CompanyNameDiscord Inc.
                                FileDescriptionDiscord
                                FileVersion1.0.9189.0
                                InternalNameDiscord.exe
                                LegalCopyrightCopyright (c) 2025-04-22 18:37:45.598179 Discord Inc. All rights reserved.
                                LegalTrademarks
                                OriginalFilenameDiscord.exe
                                ProductNameDiscord
                                ProductVersion1.0.9189.0
                                Assembly Version1.0.9189.0

                                Download Network PCAP: filteredfull

                                • Total Packets: 32
                                • 12802 undefined
                                • 53 (DNS)
                                TimestampSource PortDest PortSource IPDest IP
                                Apr 27, 2025 21:15:25.520715952 CEST4971612802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:25.798628092 CEST128024971618.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:26.300415993 CEST4971612802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:26.578188896 CEST128024971618.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:27.097204924 CEST4971612802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:27.374914885 CEST128024971618.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:27.889429092 CEST4971612802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:28.167196989 CEST128024971618.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:28.675333023 CEST4971612802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:28.953027010 CEST128024971618.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:33.957534075 CEST4972212802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:34.235354900 CEST128024972218.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:34.737857103 CEST4972212802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:35.015665054 CEST128024972218.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:35.519110918 CEST4972212802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:35.797177076 CEST128024972218.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:36.300395966 CEST4972212802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:36.578234911 CEST128024972218.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:37.081788063 CEST4972212802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:37.359574080 CEST128024972218.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:42.363879919 CEST4972312802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:42.642189980 CEST128024972318.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:43.146716118 CEST4972312802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:43.425208092 CEST128024972318.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:43.941014051 CEST4972312802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:44.219105005 CEST128024972318.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:44.722307920 CEST4972312802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:45.000678062 CEST128024972318.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:45.503561974 CEST4972312802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:45.781702042 CEST128024972318.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:50.785851955 CEST4972412802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:51.063553095 CEST128024972418.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:51.566041946 CEST4972412802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:51.843790054 CEST128024972418.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:52.363089085 CEST4972412802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:52.640976906 CEST128024972418.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:53.144165993 CEST4972412802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:53.421843052 CEST128024972418.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:53.925421000 CEST4972412802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:54.203044891 CEST128024972418.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:59.207900047 CEST4972512802192.168.2.418.192.31.30
                                Apr 27, 2025 21:15:59.487824917 CEST128024972518.192.31.30192.168.2.4
                                Apr 27, 2025 21:15:59.987926960 CEST4972512802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:00.264175892 CEST128024972518.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:00.769264936 CEST4972512802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:01.045598030 CEST128024972518.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:01.550431013 CEST4972512802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:01.826831102 CEST128024972518.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:02.331686974 CEST4972512802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:02.608019114 CEST128024972518.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:07.614665985 CEST4972612802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:07.892502069 CEST128024972618.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:08.394208908 CEST4972612802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:08.671854019 CEST128024972618.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:09.175468922 CEST4972612802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:09.453233957 CEST128024972618.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:09.956902981 CEST4972612802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:10.234900951 CEST128024972618.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:10.737979889 CEST4972612802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:11.015633106 CEST128024972618.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:16.021056890 CEST4972812802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:16.299187899 CEST128024972818.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:16.800517082 CEST4972812802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:17.078588009 CEST128024972818.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:17.600920916 CEST4972812802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:17.878909111 CEST128024972818.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:18.401112080 CEST4972812802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:18.680283070 CEST128024972818.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:19.191095114 CEST4972812802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:19.469225883 CEST128024972818.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:24.473370075 CEST4972912802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:24.751552105 CEST128024972918.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:25.253632069 CEST4972912802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:25.531713009 CEST128024972918.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:26.034972906 CEST4972912802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:26.312964916 CEST128024972918.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:26.816143036 CEST4972912802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:27.094151020 CEST128024972918.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:27.597409964 CEST4972912802192.168.2.418.192.31.30
                                Apr 27, 2025 21:16:27.875634909 CEST128024972918.192.31.30192.168.2.4
                                Apr 27, 2025 21:16:33.049092054 CEST4973012802192.168.2.43.71.225.231
                                Apr 27, 2025 21:16:33.326988935 CEST12802497303.71.225.231192.168.2.4
                                Apr 27, 2025 21:16:33.831813097 CEST4973012802192.168.2.43.71.225.231
                                Apr 27, 2025 21:16:34.109766006 CEST12802497303.71.225.231192.168.2.4
                                Apr 27, 2025 21:16:34.613015890 CEST4973012802192.168.2.43.71.225.231
                                Apr 27, 2025 21:16:34.890978098 CEST12802497303.71.225.231192.168.2.4
                                Apr 27, 2025 21:16:35.394269943 CEST4973012802192.168.2.43.71.225.231
                                Apr 27, 2025 21:16:35.672236919 CEST12802497303.71.225.231192.168.2.4
                                Apr 27, 2025 21:16:36.175597906 CEST4973012802192.168.2.43.71.225.231
                                Apr 27, 2025 21:16:36.453577995 CEST12802497303.71.225.231192.168.2.4
                                Apr 27, 2025 21:16:41.458103895 CEST4973112802192.168.2.43.71.225.231
                                Apr 27, 2025 21:16:41.736323118 CEST12802497313.71.225.231192.168.2.4
                                Apr 27, 2025 21:16:42.238054037 CEST4973112802192.168.2.43.71.225.231
                                Apr 27, 2025 21:16:42.516196012 CEST12802497313.71.225.231192.168.2.4
                                Apr 27, 2025 21:16:43.019288063 CEST4973112802192.168.2.43.71.225.231
                                Apr 27, 2025 21:16:43.297420025 CEST12802497313.71.225.231192.168.2.4
                                Apr 27, 2025 21:16:43.800538063 CEST4973112802192.168.2.43.71.225.231
                                Apr 27, 2025 21:16:44.078613997 CEST12802497313.71.225.231192.168.2.4
                                Apr 27, 2025 21:16:44.581787109 CEST4973112802192.168.2.43.71.225.231
                                Apr 27, 2025 21:16:44.859922886 CEST12802497313.71.225.231192.168.2.4
                                Apr 27, 2025 21:16:49.864586115 CEST4973212802192.168.2.43.71.225.231
                                Apr 27, 2025 21:16:50.142307997 CEST12802497323.71.225.231192.168.2.4
                                Apr 27, 2025 21:16:50.644320011 CEST4973212802192.168.2.43.71.225.231
                                Apr 27, 2025 21:16:50.922082901 CEST12802497323.71.225.231192.168.2.4
                                Apr 27, 2025 21:16:51.425576925 CEST4973212802192.168.2.43.71.225.231
                                Apr 27, 2025 21:16:51.703243971 CEST12802497323.71.225.231192.168.2.4
                                Apr 27, 2025 21:16:52.206891060 CEST4973212802192.168.2.43.71.225.231
                                Apr 27, 2025 21:16:52.484586954 CEST12802497323.71.225.231192.168.2.4
                                Apr 27, 2025 21:16:52.988097906 CEST4973212802192.168.2.43.71.225.231
                                Apr 27, 2025 21:16:53.265777111 CEST12802497323.71.225.231192.168.2.4
                                Apr 27, 2025 21:16:58.270299911 CEST4973312802192.168.2.43.71.225.231
                                Apr 27, 2025 21:16:58.548496008 CEST12802497333.71.225.231192.168.2.4
                                Apr 27, 2025 21:16:59.050586939 CEST4973312802192.168.2.43.71.225.231
                                Apr 27, 2025 21:16:59.328701019 CEST12802497333.71.225.231192.168.2.4
                                Apr 27, 2025 21:16:59.831830978 CEST4973312802192.168.2.43.71.225.231
                                Apr 27, 2025 21:17:00.110702991 CEST12802497333.71.225.231192.168.2.4
                                Apr 27, 2025 21:17:00.613071918 CEST4973312802192.168.2.43.71.225.231
                                Apr 27, 2025 21:17:00.891297102 CEST12802497333.71.225.231192.168.2.4
                                Apr 27, 2025 21:17:01.394314051 CEST4973312802192.168.2.43.71.225.231
                                Apr 27, 2025 21:17:01.672941923 CEST12802497333.71.225.231192.168.2.4
                                Apr 27, 2025 21:17:06.709252119 CEST4973412802192.168.2.43.71.225.231
                                Apr 27, 2025 21:17:06.988089085 CEST12802497343.71.225.231192.168.2.4
                                Apr 27, 2025 21:17:07.488136053 CEST4973412802192.168.2.43.71.225.231
                                Apr 27, 2025 21:17:07.767267942 CEST12802497343.71.225.231192.168.2.4
                                Apr 27, 2025 21:17:08.269365072 CEST4973412802192.168.2.43.71.225.231
                                Apr 27, 2025 21:17:08.548175097 CEST12802497343.71.225.231192.168.2.4
                                Apr 27, 2025 21:17:09.050602913 CEST4973412802192.168.2.43.71.225.231
                                Apr 27, 2025 21:17:09.329320908 CEST12802497343.71.225.231192.168.2.4
                                Apr 27, 2025 21:17:09.831849098 CEST4973412802192.168.2.43.71.225.231
                                Apr 27, 2025 21:17:10.110668898 CEST12802497343.71.225.231192.168.2.4
                                Apr 27, 2025 21:17:15.114257097 CEST4973512802192.168.2.43.71.225.231
                                Apr 27, 2025 21:17:15.392128944 CEST12802497353.71.225.231192.168.2.4
                                Apr 27, 2025 21:17:15.895349979 CEST4973512802192.168.2.43.71.225.231
                                Apr 27, 2025 21:17:16.173089981 CEST12802497353.71.225.231192.168.2.4
                                Apr 27, 2025 21:17:16.675605059 CEST4973512802192.168.2.43.71.225.231
                                Apr 27, 2025 21:17:16.953495979 CEST12802497353.71.225.231192.168.2.4
                                Apr 27, 2025 21:17:17.456984997 CEST4973512802192.168.2.43.71.225.231
                                Apr 27, 2025 21:17:17.735815048 CEST12802497353.71.225.231192.168.2.4
                                Apr 27, 2025 21:17:18.238380909 CEST4973512802192.168.2.43.71.225.231
                                Apr 27, 2025 21:17:18.516314030 CEST12802497353.71.225.231192.168.2.4
                                TimestampSource PortDest PortSource IPDest IP
                                Apr 27, 2025 21:15:24.815685987 CEST5719953192.168.2.41.1.1.1
                                Apr 27, 2025 21:15:24.986258030 CEST53571991.1.1.1192.168.2.4
                                Apr 27, 2025 21:16:32.879594088 CEST6115253192.168.2.41.1.1.1
                                Apr 27, 2025 21:16:33.048316002 CEST53611521.1.1.1192.168.2.4
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Apr 27, 2025 21:15:24.815685987 CEST192.168.2.41.1.1.10x335bStandard query (0)0.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                Apr 27, 2025 21:16:32.879594088 CEST192.168.2.41.1.1.10xf2aStandard query (0)0.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Apr 27, 2025 21:15:24.986258030 CEST1.1.1.1192.168.2.40x335bNo error (0)0.tcp.eu.ngrok.io18.192.31.30A (IP address)IN (0x0001)false
                                Apr 27, 2025 21:16:33.048316002 CEST1.1.1.1192.168.2.40xf2aNo error (0)0.tcp.eu.ngrok.io3.71.225.231A (IP address)IN (0x0001)false
                                Target ID:0
                                Start time:15:15:12
                                Start date:27/04/2025
                                Path:C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\250427-xt4dsszrv3.bin.exe"
                                Imagebase:0x4b0000
                                File size:334'848 bytes
                                MD5 hash:DD6E4DA328DCA0E94FA0BF263276ED44
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.1129477830.00000000004B2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000000.1129477830.00000000004B2000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.1181310315.00000000038D6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000002.1181310315.00000000038D6000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.1179987885.0000000002871000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000002.1179987885.0000000002871000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                Reputation:low
                                Has exited:true
                                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                Target ID:1
                                Start time:15:15:17
                                Start date:27/04/2025
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"' & exit
                                Imagebase:0xc70000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:2
                                Start time:15:15:17
                                Start date:27/04/2025
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff62fc20000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:15:15:17
                                Start date:27/04/2025
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp7A0D.tmp.bat""
                                Imagebase:0xc70000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:4
                                Start time:15:15:17
                                Start date:27/04/2025
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff62fc20000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:5
                                Start time:15:15:17
                                Start date:27/04/2025
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks /create /f /sc onlogon /rl highest /tn "mantekaaaa" /tr '"C:\Users\user\AppData\Roaming\mantekaaaa.exe"'
                                Imagebase:0x610000
                                File size:187'904 bytes
                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:6
                                Start time:15:15:17
                                Start date:27/04/2025
                                Path:C:\Windows\SysWOW64\timeout.exe
                                Wow64 process (32bit):true
                                Commandline:timeout 3
                                Imagebase:0x320000
                                File size:25'088 bytes
                                MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:7
                                Start time:15:15:19
                                Start date:27/04/2025
                                Path:C:\Users\user\AppData\Roaming\mantekaaaa.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\AppData\Roaming\mantekaaaa.exe
                                Imagebase:0xd0000
                                File size:334'848 bytes
                                MD5 hash:DD6E4DA328DCA0E94FA0BF263276ED44
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000007.00000002.2383698510.000000000242C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000007.00000002.2383698510.000000000242C000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Roaming\mantekaaaa.exe, Author: Joe Security
                                • Rule: rat_win_asyncrat, Description: Detect AsyncRAT based on specific strings, Source: C:\Users\user\AppData\Roaming\mantekaaaa.exe, Author: Sekoia.io
                                • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: C:\Users\user\AppData\Roaming\mantekaaaa.exe, Author: ditekSHen
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 86%, ReversingLabs
                                Reputation:low
                                Has exited:false
                                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                Execution Graph

                                Execution Coverage

                                Dynamic/Packed Code Coverage

                                Signature Coverage

                                Execution Coverage:14.9%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:16.7%
                                Total number of Nodes:18
                                Total number of Limit Nodes:0
                                Show Legend
                                Hide Nodes/Edges
                                execution_graph 4487 e36a20 4488 e36a63 RtlSetProcessIsCritical 4487->4488 4489 e36a94 4488->4489 4490 e309a8 4491 e309ca 4490->4491 4492 e30a27 4491->4492 4494 e315b8 4491->4494 4496 e315d1 4494->4496 4495 e315db 4495->4492 4496->4495 4499 e35204 4496->4499 4503 e35258 4496->4503 4500 e35258 4499->4500 4507 e32d4c 4500->4507 4504 e35277 4503->4504 4505 e32d4c CheckRemoteDebuggerPresent 4504->4505 4506 e3528a 4505->4506 4506->4495 4508 e352b8 CheckRemoteDebuggerPresent 4507->4508 4510 e3528a 4508->4510 4510->4495

                                Executed Functions

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 65 e35b20-e35b32 66 e35b96-e35b9d 65->66 67 e35b34-e35b73 call e35928 call e306dc 65->67 76 e35b75-e35b87 67->76 77 e35b9e-e35c05 67->77 83 e35b8e 76->83 87 e35c07-e35c09 77->87 88 e35c0e-e35c1e 77->88 83->66 89 e35ead-e35eb4 87->89 90 e35c20 88->90 91 e35c25-e35c35 88->91 90->89 93 e35e94-e35ea2 91->93 94 e35c3b-e35c49 91->94 97 e35eb5-e35f2e 93->97 99 e35ea4-e35ea8 call e34f38 93->99 94->97 98 e35c4f 94->98 98->97 100 e35ce0-e35d01 98->100 101 e35e47-e35e62 call e301c0 98->101 102 e35d06-e35d27 98->102 103 e35e64-e35e86 98->103 104 e35e88-e35e92 98->104 105 e35dee-e35e14 98->105 106 e35c6d-e35c8e 98->106 107 e35d2c-e35d4d 98->107 108 e35dac-e35de9 98->108 109 e35c93-e35cb5 98->109 110 e35d52-e35d7a 98->110 111 e35c56-e35c68 98->111 112 e35cba-e35cdb 98->112 113 e35e19-e35e45 98->113 114 e35d7f-e35da7 98->114 99->89 100->89 101->89 102->89 103->89 104->89 105->89 106->89 107->89 108->89 109->89 110->89 111->89 112->89 113->89 114->89
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1179816308.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_e30000_250427-xt4dsszrv3.jbxd
                                Similarity
                                • API ID:
                                • String ID: Xq$$q
                                • API String ID: 0-855381642
                                • Opcode ID: 938a0212c6fb0d1a0bd986b48a980231f37fcabec54329c777193f9c1e07ca9a
                                • Instruction ID: f57d19b037c6b7b6b659322d0c4769943142c4e1093d0eba3e3b184f7fbd72da
                                • Opcode Fuzzy Hash: 938a0212c6fb0d1a0bd986b48a980231f37fcabec54329c777193f9c1e07ca9a
                                • Instruction Fuzzy Hash: 1FB17035B047548FDB18AB799C5867E7BB7ABC8300B15882ED406EB385DE349D02D7A2

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 204 e32d4c-e3533c CheckRemoteDebuggerPresent 207 e35345-e35380 204->207 208 e3533e-e35344 204->208 208->207
                                APIs
                                • CheckRemoteDebuggerPresent.KERNELBASE(00000000,?), ref: 00E3532F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1179816308.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_e30000_250427-xt4dsszrv3.jbxd
                                Similarity
                                • API ID: CheckDebuggerPresentRemote
                                • String ID:
                                • API String ID: 3662101638-0
                                • Opcode ID: 5d25cb36816e2ccbb25d99cdb08897346d6108e5f6ca1ae318149bc6846f9bc9
                                • Instruction ID: 0603f9e303c1914b21afd619138d400d9cb8252fbd258f016a005eb66cb0adf4
                                • Opcode Fuzzy Hash: 5d25cb36816e2ccbb25d99cdb08897346d6108e5f6ca1ae318149bc6846f9bc9
                                • Instruction Fuzzy Hash: 6D2136B28016598FDB10CF9AC484BEEBBF4EF48310F14842AE859B7350D778A944CFA1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 421 e34088-e340ee 423 e340f0-e340fb 421->423 424 e34138-e3413a 421->424 423->424 425 e340fd-e34109 423->425 426 e3413c-e34155 424->426 427 e3410b-e34115 425->427 428 e3412c-e34136 425->428 432 e341a1-e341a3 426->432 433 e34157-e34163 426->433 430 e34117 427->430 431 e34119-e34128 427->431 428->426 430->431 431->431 434 e3412a 431->434 436 e341a5-e341fd 432->436 433->432 435 e34165-e34171 433->435 434->428 437 e34173-e3417d 435->437 438 e34194-e3419f 435->438 445 e34247-e34249 436->445 446 e341ff-e3420a 436->446 439 e34181-e34190 437->439 440 e3417f 437->440 438->436 439->439 442 e34192 439->442 440->439 442->438 448 e3424b-e34263 445->448 446->445 447 e3420c-e34218 446->447 449 e3423b-e34245 447->449 450 e3421a-e34224 447->450 455 e34265-e34270 448->455 456 e342ad-e342af 448->456 449->448 451 e34226 450->451 452 e34228-e34237 450->452 451->452 452->452 454 e34239 452->454 454->449 455->456 458 e34272-e3427e 455->458 457 e342b1-e34302 456->457 466 e34308-e34316 457->466 459 e342a1-e342ab 458->459 460 e34280-e3428a 458->460 459->457 462 e3428e-e3429d 460->462 463 e3428c 460->463 462->462 464 e3429f 462->464 463->462 464->459 467 e34318-e3431e 466->467 468 e3431f-e3437f 466->468 467->468 475 e34381-e34385 468->475 476 e3438f-e34393 468->476 475->476 477 e34387 475->477 478 e343a3-e343a7 476->478 479 e34395-e34399 476->479 477->476 481 e343b7-e343bb 478->481 482 e343a9-e343ad 478->482 479->478 480 e3439b 479->480 480->478 484 e343cb-e343cf 481->484 485 e343bd-e343c1 481->485 482->481 483 e343af-e343b2 call e30418 482->483 483->481 488 e343d1-e343d5 484->488 489 e343df-e343e3 484->489 485->484 487 e343c3-e343c6 call e30418 485->487 487->484 488->489 491 e343d7-e343da call e30418 488->491 492 e343f3-e343f7 489->492 493 e343e5-e343e9 489->493 491->489 496 e34407 492->496 497 e343f9-e343fd 492->497 493->492 495 e343eb 493->495 495->492 499 e34408 496->499 497->496 498 e343ff 497->498 498->496 499->499
                                Memory Dump Source
                                • Source File: 00000000.00000002.1179816308.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_e30000_250427-xt4dsszrv3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ebfc79a79e89dab3e6583b698e21a5dbe09df2d6559e08da812e442018a96609
                                • Instruction ID: 92445356e93a536403821e3c329ebee45ae8864e0679d21aec4754e1ef7d032a
                                • Opcode Fuzzy Hash: ebfc79a79e89dab3e6583b698e21a5dbe09df2d6559e08da812e442018a96609
                                • Instruction Fuzzy Hash: 7CB131B0E00609CFDB14CFA9D88979EBFF2BF88314F149129E815B7294DB74A845CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.1179816308.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_e30000_250427-xt4dsszrv3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3c23cf7cc1c08be70a796cfcf62af4b82316c4d9c3ac1927d3b8caf3764ebe4e
                                • Instruction ID: 622da5790855fac5012cd7ef159892181d98c3d901c28fd1ffddc948823ef0c7
                                • Opcode Fuzzy Hash: 3c23cf7cc1c08be70a796cfcf62af4b82316c4d9c3ac1927d3b8caf3764ebe4e
                                • Instruction Fuzzy Hash: DBB13BB0E002098FEB14CFA9D88979DBFF2BF88354F149129D415B7294EB75A845CB85

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 198 e352b0-e3533c CheckRemoteDebuggerPresent 200 e35345-e35380 198->200 201 e3533e-e35344 198->201 201->200
                                APIs
                                • CheckRemoteDebuggerPresent.KERNELBASE(00000000,?), ref: 00E3532F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1179816308.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_e30000_250427-xt4dsszrv3.jbxd
                                Similarity
                                • API ID: CheckDebuggerPresentRemote
                                • String ID:
                                • API String ID: 3662101638-0
                                • Opcode ID: b081ee7c62c07c52883b30d4cd0ca859fc2161849c04e2f1a0fbf1f3013a0994
                                • Instruction ID: 2c206535d866df78199976315098743e572f618b81a39b40c408cdc7f538c058
                                • Opcode Fuzzy Hash: b081ee7c62c07c52883b30d4cd0ca859fc2161849c04e2f1a0fbf1f3013a0994
                                • Instruction Fuzzy Hash: FE213972C012598FDB10CF9AD484BEEBBF4AF49310F14846ED855A7350C7789945CF65

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 211 e36a19-e36a5b 212 e36a63-e36a92 RtlSetProcessIsCritical 211->212 213 e36a94 212->213 214 e36a99-e36ab2 212->214 213->214
                                APIs
                                • RtlSetProcessIsCritical.NTDLL(?,?,?), ref: 00E36A85
                                Memory Dump Source
                                • Source File: 00000000.00000002.1179816308.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_e30000_250427-xt4dsszrv3.jbxd
                                Similarity
                                • API ID: CriticalProcess
                                • String ID:
                                • API String ID: 2695349919-0
                                • Opcode ID: 88b92bd206fb3bc794fca1c5f4c47c1f79969a065299fd19898fd236ee0209de
                                • Instruction ID: 4f4e3017b213ed3f5d3b406e1bed7511079b058786de41dcb272e6f876413c32
                                • Opcode Fuzzy Hash: 88b92bd206fb3bc794fca1c5f4c47c1f79969a065299fd19898fd236ee0209de
                                • Instruction Fuzzy Hash: 0A1136B58003499FDB20CF9AC488BDEBFF4EF88314F10842AD519A7240C339A949CFA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 216 e36a20-e36a92 RtlSetProcessIsCritical 218 e36a94 216->218 219 e36a99-e36ab2 216->219 218->219
                                APIs
                                • RtlSetProcessIsCritical.NTDLL(?,?,?), ref: 00E36A85
                                Memory Dump Source
                                • Source File: 00000000.00000002.1179816308.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_e30000_250427-xt4dsszrv3.jbxd
                                Similarity
                                • API ID: CriticalProcess
                                • String ID:
                                • API String ID: 2695349919-0
                                • Opcode ID: a3e32a19d8ba47f3ae68e954e3b14880648c6bb37a03605358c18779c3f9fc45
                                • Instruction ID: 48526374a61cb0a7be1f87151a220ac8a00129bad94e8a406d305770f74bf354
                                • Opcode Fuzzy Hash: a3e32a19d8ba47f3ae68e954e3b14880648c6bb37a03605358c18779c3f9fc45
                                • Instruction Fuzzy Hash: 1D1103B58003499FDB20DF9AC488BDEBFF4EB88314F208429D519A7250C779A944CFA5
                                Memory Dump Source
                                • Source File: 00000000.00000002.1179717290.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_ddd000_250427-xt4dsszrv3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d0cb290bdf2cbbbd5a54e5a026582c12c112748431c8677ccfe0eb969953d053
                                • Instruction ID: 9878b6fac4390282c1c42f916966e8cf56f21e93262c997d2dbf5df3c98c025a
                                • Opcode Fuzzy Hash: d0cb290bdf2cbbbd5a54e5a026582c12c112748431c8677ccfe0eb969953d053
                                • Instruction Fuzzy Hash: 3721D671504240DFDF15DF14E9C0B16BF66FB94314F24856AD9090B356C336D856CBB2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1179717290.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_ddd000_250427-xt4dsszrv3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 14c6bea1b0f6aaacb7db59bffceb06c36f0ab32707ada9f1390ddb9994ea60e7
                                • Instruction ID: 9b93eb2f1c27b7e02671b536935f1952601a5710935fe3ff72993c1d04e1a136
                                • Opcode Fuzzy Hash: 14c6bea1b0f6aaacb7db59bffceb06c36f0ab32707ada9f1390ddb9994ea60e7
                                • Instruction Fuzzy Hash: C111B176904240DFCF16CF14D9C4B16BF72FB94324F28C6AAD9090B656C336D85ACBA2

                                Non-executed Functions

                                Memory Dump Source
                                • Source File: 00000000.00000002.1179816308.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_e30000_250427-xt4dsszrv3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d3b4b410cd63b1d0bde952f3e44f6119cd369c01598b831b389ec303680c205e
                                • Instruction ID: a696c8430a24fa4cb60baef99ca5b7758f9ac9b2b26222bd454acb4d88b00f64
                                • Opcode Fuzzy Hash: d3b4b410cd63b1d0bde952f3e44f6119cd369c01598b831b389ec303680c205e
                                • Instruction Fuzzy Hash: B1913B70E003098FDB14CFA9D989BDEBFF2AF88318F149129E415B7294EB749945CB91

                                Execution Graph

                                Execution Coverage

                                Dynamic/Packed Code Coverage

                                Signature Coverage

                                Execution Coverage:12.4%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:0%
                                Total number of Nodes:18
                                Total number of Limit Nodes:0
                                Show Legend
                                Hide Nodes/Edges
                                execution_graph 4448 7109a8 4449 7109ca 4448->4449 4450 710a27 4449->4450 4452 7115b8 4449->4452 4454 7115d1 4452->4454 4453 7115db 4453->4450 4454->4453 4457 715258 4454->4457 4461 715248 4454->4461 4458 715277 4457->4458 4465 712d4c 4458->4465 4462 715258 4461->4462 4463 712d4c CheckRemoteDebuggerPresent 4462->4463 4464 71528a 4463->4464 4464->4453 4466 7152b8 CheckRemoteDebuggerPresent 4465->4466 4468 71528a 4466->4468 4468->4453 4469 7169c8 4470 716a0b RtlSetProcessIsCritical 4469->4470 4471 716a3c 4470->4471

                                Executed Functions

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 343 7152b0-71533c CheckRemoteDebuggerPresent 346 715345-715380 343->346 347 71533e-715344 343->347 347->346
                                APIs
                                • CheckRemoteDebuggerPresent.KERNELBASE(00000000,?), ref: 0071532F
                                Memory Dump Source
                                • Source File: 00000007.00000002.2383059834.0000000000710000.00000040.00000800.00020000.00000000.sdmp, Offset: 00710000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_710000_mantekaaaa.jbxd
                                Similarity
                                • API ID: CheckDebuggerPresentRemote
                                • String ID:
                                • API String ID: 3662101638-0
                                • Opcode ID: 80593a5d233e402a3fb5b91e087fb11ea60aa95e764effcd2e5364bc4db0eb88
                                • Instruction ID: 1e9f018e94511c4770f9b204d0ab935c333de236af6f92a50b5c8cca4c5a7361
                                • Opcode Fuzzy Hash: 80593a5d233e402a3fb5b91e087fb11ea60aa95e764effcd2e5364bc4db0eb88
                                • Instruction Fuzzy Hash: E82136B2801259CFDB14CF9AD884BEEBBF4AF49310F14846AE858A7641D778A944CF61

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 350 712d4c-71533c CheckRemoteDebuggerPresent 353 715345-715380 350->353 354 71533e-715344 350->354 354->353
                                APIs
                                • CheckRemoteDebuggerPresent.KERNELBASE(00000000,?), ref: 0071532F
                                Memory Dump Source
                                • Source File: 00000007.00000002.2383059834.0000000000710000.00000040.00000800.00020000.00000000.sdmp, Offset: 00710000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_710000_mantekaaaa.jbxd
                                Similarity
                                • API ID: CheckDebuggerPresentRemote
                                • String ID:
                                • API String ID: 3662101638-0
                                • Opcode ID: 6f8f076295af9fc8c12cb30bf9f65e20eb9bcf29b1de5359f74ecd5aaeac7137
                                • Instruction ID: b3deb8ff6063fdc3821c864e8af9a609d5345da5543cf41ecaa1aee079a15f9f
                                • Opcode Fuzzy Hash: 6f8f076295af9fc8c12cb30bf9f65e20eb9bcf29b1de5359f74ecd5aaeac7137
                                • Instruction Fuzzy Hash: 832148B2C01259CFDB14CF9AD484BEEBBF4EF48310F14846AE859A7240D778A944CFA0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 357 7169c0-716a03 358 716a0b-716a3a RtlSetProcessIsCritical 357->358 359 716a41-716a5a 358->359 360 716a3c 358->360 360->359
                                APIs
                                • RtlSetProcessIsCritical.NTDLL(?,?,?), ref: 00716A2D
                                Memory Dump Source
                                • Source File: 00000007.00000002.2383059834.0000000000710000.00000040.00000800.00020000.00000000.sdmp, Offset: 00710000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_710000_mantekaaaa.jbxd
                                Similarity
                                • API ID: CriticalProcess
                                • String ID:
                                • API String ID: 2695349919-0
                                • Opcode ID: ead83b09dfa07fbd23191fd1caebbf92147cddc09855af109a28e60f4687a782
                                • Instruction ID: 6be7c5f38744c5b8f92e96e368bd2b617af980a51e29bbc274baf7b528eadfd8
                                • Opcode Fuzzy Hash: ead83b09dfa07fbd23191fd1caebbf92147cddc09855af109a28e60f4687a782
                                • Instruction Fuzzy Hash: 411125B58003488FEB20DF9AC584BDEBFF4EF88310F208029D519A7250C779A944CFA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 362 7169c8-716a3a RtlSetProcessIsCritical 364 716a41-716a5a 362->364 365 716a3c 362->365 365->364
                                APIs
                                • RtlSetProcessIsCritical.NTDLL(?,?,?), ref: 00716A2D
                                Memory Dump Source
                                • Source File: 00000007.00000002.2383059834.0000000000710000.00000040.00000800.00020000.00000000.sdmp, Offset: 00710000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_710000_mantekaaaa.jbxd
                                Similarity
                                • API ID: CriticalProcess
                                • String ID:
                                • API String ID: 2695349919-0
                                • Opcode ID: 60de894e93f586599d5849fd45d13e26a1315f077f750ea5168d328e5ada3cec
                                • Instruction ID: 666ab5f826a9d779ab1bce31fb3e7aec3f32b98d94d83422a1e958422619fe8c
                                • Opcode Fuzzy Hash: 60de894e93f586599d5849fd45d13e26a1315f077f750ea5168d328e5ada3cec
                                • Instruction Fuzzy Hash: 231103B59003488FDB20DF9AD984BDEBBF4EF88310F208429D518A7250C779A944CFA5
                                Memory Dump Source
                                • Source File: 00000007.00000002.2382601472.00000000006AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006AD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_6ad000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d3c8a01d0f4865cba62e527f149f1520d68adb8baae5a0a1f128a6d9d1b8dca7
                                • Instruction ID: 110e62c8e10e88552ef376a576002e0386e9e674ab8bb1bb9ff1667019d4ba2a
                                • Opcode Fuzzy Hash: d3c8a01d0f4865cba62e527f149f1520d68adb8baae5a0a1f128a6d9d1b8dca7
                                • Instruction Fuzzy Hash: D12136B1904200DFDB15EF00D9C0B16BFA2FB89318F24C569D80A0B656C336DC16CEA2
                                Memory Dump Source
                                • Source File: 00000007.00000002.2382708131.00000000006BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006BD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_6bd000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a23368918ed561f4a6868c558c93ea7e90f884aaf7cfd95fa69a83344667e37b
                                • Instruction ID: 6aa7ecfa22944939560e321a9b98625671a332b152eb933ec0327e2e63721cde
                                • Opcode Fuzzy Hash: a23368918ed561f4a6868c558c93ea7e90f884aaf7cfd95fa69a83344667e37b
                                • Instruction Fuzzy Hash: 3721C2B5604304AFDB14DF18D9C0B56BBA6EB84314F24C56DD8094F396D33AD896CBA1
                                Memory Dump Source
                                • Source File: 00000007.00000002.2382601472.00000000006AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006AD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_6ad000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 14c6bea1b0f6aaacb7db59bffceb06c36f0ab32707ada9f1390ddb9994ea60e7
                                • Instruction ID: 81a365b95b5902e9b013edfc6c4336e5b15453d2e72b13c4c082e0477ff67bcc
                                • Opcode Fuzzy Hash: 14c6bea1b0f6aaacb7db59bffceb06c36f0ab32707ada9f1390ddb9994ea60e7
                                • Instruction Fuzzy Hash: FE11E1B6804240DFCB16DF04D5C0B56BF72FB84324F28C6A9D80A0B656C336D85ACFA2
                                Memory Dump Source
                                • Source File: 00000007.00000002.2382708131.00000000006BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006BD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_6bd000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c17b561b3a2f5ccd6137e25a4bf8f6687a509af5f5175a698926a0964df509aa
                                • Instruction ID: fbb181ac7bb1b8d4604a86f357987c529f42e46b8ea0cbb1cb220b167258ae14
                                • Opcode Fuzzy Hash: c17b561b3a2f5ccd6137e25a4bf8f6687a509af5f5175a698926a0964df509aa
                                • Instruction Fuzzy Hash: A411A9B55042809FDB05CF14D980B95BBA2FB84314F28C6A9D8094F796C33AD85ACBA1

                                Executed Functions

                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1251757553.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_1700000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID: (q$Teq$d]t
                                • API String ID: 0-433998699
                                • Opcode ID: c20269adc3a59f926215e82c6436eeca81cb87f3ca79b07dc79d683809820f69
                                • Instruction ID: 4d96620eb2cb271fa47e6158da3811290b2af38f5df9df255e8b4ff5a237ac8e
                                • Opcode Fuzzy Hash: c20269adc3a59f926215e82c6436eeca81cb87f3ca79b07dc79d683809820f69
                                • Instruction Fuzzy Hash: E8519170B106049FD754DF69D494A9DBBF2FF88710F2581AAE806EB3A5CA75DC01CB90
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1251757553.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_1700000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID: Hq$dLq
                                • API String ID: 0-4038822049
                                • Opcode ID: 4d14d44992e3470d42b334d6f69cbe6061ff016f0208818d220d798db52c52cc
                                • Instruction ID: 6de7bb9bc2569d39bea1fdae555105a664e1cea2e3c2b94dd6a3ac18b6962c30
                                • Opcode Fuzzy Hash: 4d14d44992e3470d42b334d6f69cbe6061ff016f0208818d220d798db52c52cc
                                • Instruction Fuzzy Hash: 40519030B043048FDB159F69D494B9EBBF2FF89310F1445AAE405EB3A2CA759C05CB91
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1251757553.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_1700000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID: LRq
                                • API String ID: 0-3187445251
                                • Opcode ID: d15143f6fbe32ec97ae1af6a44c6556b61e1893d3c4aa20b698e550a5e5293aa
                                • Instruction ID: 29cf628d1e94cdab15edee6de7397406ee46f0dfa84314eb23b5544d0d1db21a
                                • Opcode Fuzzy Hash: d15143f6fbe32ec97ae1af6a44c6556b61e1893d3c4aa20b698e550a5e5293aa
                                • Instruction Fuzzy Hash: 5131DC70F002158FCB159BBD9891AAEBBE2FFC9310B54456EE506DB3A5EA34CD028791
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1251757553.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_1700000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID: dLq
                                • API String ID: 0-2312315067
                                • Opcode ID: 9d8d599c685c1f89117f471a761e01924db4b158e0dc3179659f9381c62589a2
                                • Instruction ID: 936f09c868e0d457d2e5e436b5f2b35c0f73937aba3c45645dc7d7532d2c0b86
                                • Opcode Fuzzy Hash: 9d8d599c685c1f89117f471a761e01924db4b158e0dc3179659f9381c62589a2
                                • Instruction Fuzzy Hash: C9318F75A00204DFDB15DF69C898BAEBBF2FF88310F148569E405AB3A1CB74AD45CB91
                                Strings
                                Memory Dump Source
                                • Source File: 00000009.00000002.1251757553.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_1700000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID: Hq
                                • API String ID: 0-1594803414
                                • Opcode ID: c2e09ce0a8e9b73afee21ca9777371cfd55cb3b674782bb96e4c86854ab40627
                                • Instruction ID: e2adfefe7aec8fb3fb0229bb751ae4c1a55f165482408f1b5c658e6f59232f23
                                • Opcode Fuzzy Hash: c2e09ce0a8e9b73afee21ca9777371cfd55cb3b674782bb96e4c86854ab40627
                                • Instruction Fuzzy Hash: DB01F4307083404FC38A9B3DA49456E7BE2EFCA22036945BFD405CB3A6CD3D8C0687A1
                                Memory Dump Source
                                • Source File: 00000009.00000002.1251757553.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_1700000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 06583512c574b324990c952052bd2e12ac6453919b50194119e8f5aea8de7a65
                                • Instruction ID: b29e659a2b4533d71602e4cefa4a94381b0f1174351ef9c180d7078971a7e7e5
                                • Opcode Fuzzy Hash: 06583512c574b324990c952052bd2e12ac6453919b50194119e8f5aea8de7a65
                                • Instruction Fuzzy Hash: BB51B638600205CFC7A5EF24F884A5AB772FB8C2057508679D801EB269EF3D9D06DF91
                                Memory Dump Source
                                • Source File: 00000009.00000002.1251757553.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_1700000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bf4ef006da03cadc8a62d290beb75b9637f871bfbd7e1a0c03d0b267afd7fa82
                                • Instruction ID: 90a9e2ab44de7de8056ff931e0e4666c8d43e58e970612705764c90bd3d65bcc
                                • Opcode Fuzzy Hash: bf4ef006da03cadc8a62d290beb75b9637f871bfbd7e1a0c03d0b267afd7fa82
                                • Instruction Fuzzy Hash: 08418DB0F00309AFCB44DFA9885466EFBFAFF98310F64856ED44AD7345DA3499428B91
                                Memory Dump Source
                                • Source File: 00000009.00000002.1251757553.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_1700000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6f6091084280a17e8f00fa091b22b0593d0021eb2e0fa0545e46168da2d7c448
                                • Instruction ID: 258a259d98d0d61c833d920d481b026579e2b26fc74269de86021e4b3eb6bfa0
                                • Opcode Fuzzy Hash: 6f6091084280a17e8f00fa091b22b0593d0021eb2e0fa0545e46168da2d7c448
                                • Instruction Fuzzy Hash: 79212D35B00205DFE715DB69C955BADBBF2BF88720F658099E502AB3A5DA71DC00CB90
                                Memory Dump Source
                                • Source File: 00000009.00000002.1251757553.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_1700000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d77c459e80b7be23b1624cd1a52cd718df5828809be6faccf789b58cabca39d5
                                • Instruction ID: 8357ef08641a8d59c53cbeec701bb0ae9c40ee1c7784b4882f128ca595329a77
                                • Opcode Fuzzy Hash: d77c459e80b7be23b1624cd1a52cd718df5828809be6faccf789b58cabca39d5
                                • Instruction Fuzzy Hash: E5213670654302CFDB66AF79984876DFBE4FB04391704567DB807D5195DE388A808B51
                                Memory Dump Source
                                • Source File: 00000009.00000002.1250842251.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_14ad000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9f3c112e30f98106229351b43eac98d8da48dcb208e899142739a374b9057477
                                • Instruction ID: 48c8cecd1a412fe6c0193dd4ed0cad9238a2cf56db71013bb5854942339bf2b3
                                • Opcode Fuzzy Hash: 9f3c112e30f98106229351b43eac98d8da48dcb208e899142739a374b9057477
                                • Instruction Fuzzy Hash: 862136B1904200DFDB15DF44D9C0B17BF61FB98314F64856AD9090B666C336D416CAA2
                                Memory Dump Source
                                • Source File: 00000009.00000002.1251757553.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_1700000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 517c24b3e54e0b1ac9558042912f6b0b220dba5d8f25d0dc106a15f832b5897f
                                • Instruction ID: 1c107a544ad8bd50cb95908a276d1845df2cfcfeae2c99dad053805b4c228ac3
                                • Opcode Fuzzy Hash: 517c24b3e54e0b1ac9558042912f6b0b220dba5d8f25d0dc106a15f832b5897f
                                • Instruction Fuzzy Hash: C32133B0614302CFDF66BF7D995872EFAE4BF082917044639B907D51D5EE34CA808B51
                                Memory Dump Source
                                • Source File: 00000009.00000002.1251757553.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_1700000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 19674dc4494de911131d73d73df46546743392b475977699f1d67bed0563d348
                                • Instruction ID: f2fd68604d031f0c02000c4c2e1df59f29afac0b3e2280b1f6cd99ea6d459fe9
                                • Opcode Fuzzy Hash: 19674dc4494de911131d73d73df46546743392b475977699f1d67bed0563d348
                                • Instruction Fuzzy Hash: 26119E30A00315DFC795DFB8D5445AABBF1FF8831035246B9E805D7268DA39DC12CB90
                                Memory Dump Source
                                • Source File: 00000009.00000002.1250842251.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_14ad000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 14c6bea1b0f6aaacb7db59bffceb06c36f0ab32707ada9f1390ddb9994ea60e7
                                • Instruction ID: 0999d9761445651c5f33b27f62d49d2c4b3f8ea2096536b9ddd77aef2ecece4d
                                • Opcode Fuzzy Hash: 14c6bea1b0f6aaacb7db59bffceb06c36f0ab32707ada9f1390ddb9994ea60e7
                                • Instruction Fuzzy Hash: 0511E4B6804240CFCB16CF44D5C0B16BF71FB94314F24C5AAD9450B667C336D456CB91
                                Memory Dump Source
                                • Source File: 00000009.00000002.1251757553.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_1700000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d219c55c6ea131be290184cc1eed9035374283fbd3bc6adce9fe03db7a5aa287
                                • Instruction ID: c4a384caa23db8f87d3cd2f9a591d663a879be516f9678b53dca2263ba8d51ac
                                • Opcode Fuzzy Hash: d219c55c6ea131be290184cc1eed9035374283fbd3bc6adce9fe03db7a5aa287
                                • Instruction Fuzzy Hash: 1C117C70A00205DFCB95EBB9D50466ABBF6BF8821075544B8D406D7368EE38CC01CB90
                                Memory Dump Source
                                • Source File: 00000009.00000002.1251757553.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_1700000_mantekaaaa.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c6392cce511ca07d53ced97ba460fd9fd44d5e31227a41a1bea4df21c6ba842a
                                • Instruction ID: 96d6e6979b536ea72b40c2bce6c3c5211acf2030ffa61cc8ab57171756969231
                                • Opcode Fuzzy Hash: c6392cce511ca07d53ced97ba460fd9fd44d5e31227a41a1bea4df21c6ba842a
                                • Instruction Fuzzy Hash: 22E08C313002005F83489A2EA88495ABBDAEBC822135444BAE109C7329CD70CC014790