Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xPvEDYX7g1YE.exe

Overview

General Information

Sample name:xPvEDYX7g1YE.exe
Analysis ID:1428969
MD5:4e11d0fdde3aa0cfdadbaebf83743bf1
SHA1:b56cbb419e4fdc7d21ee9cc24c82d9a2ab107b77
SHA256:6df5a6787c28c8d0568d6286ea2723fad317f6f42e796f4ac7f72a6db63925d3
Tags:AsyncRATexe
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
.NET source code contains potential unpacker
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • xPvEDYX7g1YE.exe (PID: 4208 cmdline: "C:\Users\user\Desktop\xPvEDYX7g1YE.exe" MD5: 4E11D0FDDE3AA0CFDADBAEBF83743BF1)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"Ports": ["3080"], "Server": ["firmes777.duckdns.org"], "Mutex": "AsyncMutex_6SI8OkPnk", "Certificate": "MIIE8jCCAtqgAwIBAgIQAPeWQ4YJ3MvReCGwLzn7rTANBgkqhkiG9w0BAQ0FADAaMRgwFgYDVQQDDA9Bc3luY1JBVCBTZXJ2ZXIwIBcNMjIwNDI1MDA0MTA5WhgPOTk5OTEyMzEyMzU5NTlaMBoxGDAWBgNVBAMMD0FzeW5jUkFUIFNlcnZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKT9nYYTjYTZhY+g1tekZ8/F29gsEIDgf/8odvCbCmYKGGZZi2yND9NjtBXEMANM9PAXCyMapGvapDPbWgjYkLiMw/Vwa3kZRg7kLpXMpzInLQufe7Q587viilcsGDoVXmnf51/SwsKPjSysZUpyayezUlJ1j6aXkZGnasiqJ7iKANdSneQducOn6IwaEuJBmpXKWxhhq8R9JMfiWeOXL/hXoE/wCzwzvU/CrzPXd3uMsLfFMDHZJ+OQ9OXKU/CHZNCgSPs4VSgCgM4eK0YTbu1mLsWSo5th3/ingNFaTyYmGsmLIE2Jq5AR1A+xA+FEdC8zKL1bAwYQcRgIJs7QdedtAIufepPZ9D5HiOiy3ITYVonqwTiiIm20en7UICt+J8iDb4M2Q2iLWA7Yi9PN2cr0Xrs8A4/RL29Qe5Ly2k35i74RiBTiT7Jbl2r7PcYlUGcjTCbdB9PWt3dYaTysuamoq2Zuo2HVRhhoZpwnajS9vNcjuZCYVoQvUQBUnHTeRZrtHXU5JV59ZBlu7flZneMZnbrWXTxob6Bdt8+hrGoSDMWBFcO4jRzhT3hEFUpu4lSFeb9T3Vx4KWkHJhHtMvHuYgDTXERdEcI00sOUbVxgd/62LhGXNNommQKCyiAGj0V5uLD73Fyw8vJpm3jXf3NgNt/CjnlaMc40DJ+HlXE5AgMBAAGjMjAwMB0GA1UdDgQWBBQsT2WvtxGUK29SWs4sHz1xYye0fzAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4ICAQCK5sVfnYyT5MqnCg3uHV2ojf12fIVFCY02Cc7gy3DVoE6/xZCPjr22V/xZunZ7DG1nt0kOJKDwdQYnGoMc5UPh8jbNRoc1ojLOCaluaIYQyl8AGkmUSRA3Ltk0XetDescffrWT/nKuRvIEYU4Ra+B39f8ouGMCa7VXaxnGJ0z0BkUie8KsDLgNmJ7/kVfIYuRxl+YefoCsUTCogqf0fu3DuRHBpUVaSQQOf9YCbvFWH7Nupc3UIwpH5D8kSdpKusEfbRp8nfWN/Fm+lzF3THeHU6vNJ+5UoAWHYFW8wfJCbzQ/0L8QZeOv4uy74oQP2Ed0RdrWCwUL6SSsDPZdDEOy4K4vVYkDTl1nL5tleATguELAEbbT42oLce85z4C7sKvpEfa4DPbU55xBLwvHniILFfjB7VVsrgVckUL/lEf4Y92uJVKvLGruQt/mtKSqIuJjD8T9y7RIsk6g9624egV5UtLtv+36kLKhgIJlqC7Xx/PVwMc2yw8BiQlvxQZgqSd1k7QmV1AhV/3z2wqnYmb09ibTMYaMFjtamFegeFqc4jRLABhVQFEFv8z5E6G9vgKn5mQDWS/JykARBv9o2BjL/PTADfwAtc1b4nWo0l+CI8IjjYXu/mJOuwR+kFJ19INtwbffQvT9U12t4smpcZV+OK0opk4Yr9r1tZYm92ghXA==", "Server Signature": "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"}
SourceRuleDescriptionAuthorStrings
xPvEDYX7g1YE.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    xPvEDYX7g1YE.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      xPvEDYX7g1YE.exeWindows_Trojan_Asyncrat_11a11ba1unknownunknown
      • 0xc564:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
      • 0xf438:$a2: Stub.exe
      • 0xf4c8:$a2: Stub.exe
      • 0x8fe2:$a3: get_ActivatePong
      • 0xc77c:$a4: vmware
      • 0xc5f4:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      • 0x9ee9:$a6: get_SslClient
      xPvEDYX7g1YE.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xc5f6:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.4449015352.0000000004D36000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xca93:$x1: AsyncRAT
      • 0xcad1:$x1: AsyncRAT
      00000000.00000000.1981603943.0000000000432000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        00000000.00000000.1981603943.0000000000432000.00000002.00000001.01000000.00000003.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
        • 0xc3f6:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
        Process Memory Space: xPvEDYX7g1YE.exe PID: 4208JoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          Process Memory Space: xPvEDYX7g1YE.exe PID: 4208INDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
          • 0x1f51a:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
          Click to see the 1 entries
          SourceRuleDescriptionAuthorStrings
          0.0.xPvEDYX7g1YE.exe.430000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            0.0.xPvEDYX7g1YE.exe.430000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              0.0.xPvEDYX7g1YE.exe.430000.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
              • 0xc564:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
              • 0xf438:$a2: Stub.exe
              • 0xf4c8:$a2: Stub.exe
              • 0x8fe2:$a3: get_ActivatePong
              • 0xc77c:$a4: vmware
              • 0xc5f4:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
              • 0x9ee9:$a6: get_SslClient
              0.0.xPvEDYX7g1YE.exe.430000.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
              • 0xc5f6:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: xPvEDYX7g1YE.exeAvira: detected
              Source: xPvEDYX7g1YE.exeMalware Configuration Extractor: AsyncRAT {"Ports": ["3080"], "Server": ["firmes777.duckdns.org"], "Mutex": "AsyncMutex_6SI8OkPnk", "Certificate": "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", "Server Signature": "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"}
              Source: xPvEDYX7g1YE.exeReversingLabs: Detection: 76%
              Source: xPvEDYX7g1YE.exeJoe Sandbox ML: detected
              Source: xPvEDYX7g1YE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: xPvEDYX7g1YE.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: unknownDNS query: name: firmes777.duckdns.org
              Source: Yara matchFile source: xPvEDYX7g1YE.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.xPvEDYX7g1YE.exe.430000.0.unpack, type: UNPACKEDPE
              Source: global trafficTCP traffic: 192.168.2.5:49704 -> 179.13.0.175:3080
              Source: Joe Sandbox ViewIP Address: 179.13.0.175 179.13.0.175
              Source: Joe Sandbox ViewASN Name: ColombiaMovilCO ColombiaMovilCO
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownDNS traffic detected: queries for: firmes777.duckdns.org

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: xPvEDYX7g1YE.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.xPvEDYX7g1YE.exe.430000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1981603943.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: xPvEDYX7g1YE.exe PID: 4208, type: MEMORYSTR
              Source: xPvEDYX7g1YE.exe, LimeLogger.cs.Net Code: KeyboardLayout

              System Summary

              barindex
              Source: xPvEDYX7g1YE.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: xPvEDYX7g1YE.exe, type: SAMPLEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 0.0.xPvEDYX7g1YE.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 0.0.xPvEDYX7g1YE.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000000.00000002.4449015352.0000000004D36000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000000.00000000.1981603943.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: Process Memory Space: xPvEDYX7g1YE.exe PID: 4208, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: Process Memory Space: xPvEDYX7g1YE.exe PID: 4208, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: xPvEDYX7g1YE.exe, 00000000.00000000.1981728567.0000000000442000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStub.exe" vs xPvEDYX7g1YE.exe
              Source: xPvEDYX7g1YE.exeBinary or memory string: OriginalFilenameStub.exe" vs xPvEDYX7g1YE.exe
              Source: xPvEDYX7g1YE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: xPvEDYX7g1YE.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: xPvEDYX7g1YE.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 0.0.xPvEDYX7g1YE.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 0.0.xPvEDYX7g1YE.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000000.00000002.4449015352.0000000004D36000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000000.00000000.1981603943.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: Process Memory Space: xPvEDYX7g1YE.exe PID: 4208, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: Process Memory Space: xPvEDYX7g1YE.exe PID: 4208, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: xPvEDYX7g1YE.exe, Settings.csBase64 encoded string: 'oHCMYs0h64XjmL6nYONqSDbgWpwIcWRCy0mBTv8aEbARHkogNsZO1coaAVixJhhIo7bHHjvNEkYXPtnaryXu4w==', 'TnSYhEgeSHIqFus4F2O5Q6hLO1G8tb1EWkzY/FyFJ+FbBaXV/SpChk/AX6c1dIpPzTTNiD9bDlxd2ZuC6Q2COBYgWfCxqoKjSRY3z8Iho+o=', 'YLbyR7FcPb5y3wyu0S1vPrhlnKqJJpjYHTYcZfMdFu7EWJqnk7w9FxNzGcD+TFJ+0ftp6Zi/GEOwsPM/jcNkTKi12Z2+Lp2oGN7V3cbJziU=', '/oTtgZDpZ/RMkL00rZd2H2rgxCtE9LBs38HQrDcyVBkWo+EXlNAOBcvW5iqucikbfKNGQP180qC0Tp7LuGxYcw==', 'uaSrBlvze6wFXL88jQD7cm0Gfs0qtI9sBx2u2BnBnZ+KLHHg4teTMfGDKDVioyvaB7xAqOBcpnCIN1kbn3qD/S8+f5uro+n7jBlKiLSjW9k=', 'RFn5hZVsYy6nsl5kQvkMzUFU/YGVtsKsPaW2WtpHM0XPVeyOtnC0CzF0Br2VRCSIBRCqn4w43FcyDOcTV/ErGQ==', 'GXuQaGHx+VMKNPpi6NKTcHIO3AyfoVrizQ+DEjuHYpU0hD457aqi+WycAdGr2h9ZI9QHfrOyEoLu5NeATHhy6w==', 'TmTxTdwdm/e86jufjUQx1dy1ftAF4sQXRS1cqc9lZJLHvQ07TS/Spt2R9iBHKvY25rBdakUjAuHP3EVMp4ZWqg==', 'YeocTeKNQS2RHnaaJRV1+L3t+FsyCdRWpGtcTJv8K8/5D18YH6SSb7LJxu8e8iOLPW+XTKkxKDDdfZq83egddQ=='
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@4/1
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeMutant created: NULL
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_6SI8OkPnk
              Source: xPvEDYX7g1YE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: xPvEDYX7g1YE.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: xPvEDYX7g1YE.exeReversingLabs: Detection: 76%
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: xPvEDYX7g1YE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: xPvEDYX7g1YE.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: xPvEDYX7g1YE.exe, Packet.cs.Net Code: Plugins System.AppDomain.Load(byte[])
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeCode function: 0_2_00D014F9 push eax; ret 0_2_00D01506
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeCode function: 0_2_00D006B0 push esp; ret 0_2_00D006BA
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeCode function: 0_2_00D00637 push edi; ret 0_2_00D00652
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeCode function: 0_2_00D00637 push ecx; ret 0_2_00D006AA
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeCode function: 0_2_00D01B68 push esp; ret 0_2_00D01B76
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeCode function: 0_2_00D01718 push esp; ret 0_2_00D01722
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeCode function: 0_2_00D01708 push esp; ret 0_2_00D01712

              Boot Survival

              barindex
              Source: Yara matchFile source: xPvEDYX7g1YE.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.xPvEDYX7g1YE.exe.430000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1981603943.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: xPvEDYX7g1YE.exe PID: 4208, type: MEMORYSTR
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: xPvEDYX7g1YE.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.xPvEDYX7g1YE.exe.430000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1981603943.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: xPvEDYX7g1YE.exe PID: 4208, type: MEMORYSTR
              Source: xPvEDYX7g1YE.exeBinary or memory string: SBIEDLL.DLL
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeMemory allocated: CC0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeMemory allocated: 2880000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeMemory allocated: 2620000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeWindow / User API: threadDelayed 9716Jump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exe TID: 1220Thread sleep count: 252 > 30Jump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exe TID: 1220Thread sleep time: -252000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exe TID: 1220Thread sleep count: 9716 > 30Jump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exe TID: 1220Thread sleep time: -9716000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: xPvEDYX7g1YE.exeBinary or memory string: vmware
              Source: xPvEDYX7g1YE.exe, 00000000.00000002.4449015352.0000000004D4E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeQueries volume information: C:\Users\user\Desktop\xPvEDYX7g1YE.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\xPvEDYX7g1YE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: Yara matchFile source: xPvEDYX7g1YE.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.xPvEDYX7g1YE.exe.430000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1981603943.0000000000432000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: xPvEDYX7g1YE.exe PID: 4208, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              2
              Virtualization/Sandbox Evasion
              1
              Input Capture
              11
              Security Software Discovery
              Remote Services1
              Input Capture
              1
              Non-Standard Port
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Disable or Modify Tools
              LSASS Memory2
              Virtualization/Sandbox Evasion
              Remote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)111
              Obfuscated Files or Information
              Security Account Manager1
              Application Window Discovery
              SMB/Windows Admin SharesData from Network Shared Drive11
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Software Packing
              NTDS13
              System Information Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              xPvEDYX7g1YE.exe76%ReversingLabsByteCode-MSIL.Trojan.AsyncRATMarte
              xPvEDYX7g1YE.exe100%AviraTR/Dropper.Gen
              xPvEDYX7g1YE.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              firmes777.duckdns.org
              179.13.0.175
              truetrue
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                179.13.0.175
                firmes777.duckdns.orgColombia
                27831ColombiaMovilCOtrue
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1428969
                Start date and time:2024-04-19 23:50:09 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 6m 8s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:4
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:xPvEDYX7g1YE.exe
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@1/0@4/1
                EGA Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 21
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240000 for current running targets taking high CPU consumption
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target xPvEDYX7g1YE.exe, PID 4208 because it is empty
                • VT rate limit hit for: xPvEDYX7g1YE.exe
                TimeTypeDescription
                23:51:34API Interceptor8724884x Sleep call for process: xPvEDYX7g1YE.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                179.13.0.175xmo4WvZPV3Q0.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                  xXQ39a5f9EJP.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                    xmrhZ7VhlJjD.exeGet hashmaliciousQuasarBrowse
                      xBoD1uCJo8Dc.exeGet hashmaliciousXWormBrowse
                        xffRCvQIkXWb.exeGet hashmaliciousXWormBrowse
                          xApyUPoAYp9c.exeGet hashmaliciousAsyncRATBrowse
                            xVDnoXtgbTMW.exeGet hashmaliciousAsyncRATBrowse
                              xApyUPoAYp9c.exeGet hashmaliciousAsyncRATBrowse
                                xVDnoXtgbTMW.exeGet hashmaliciousAsyncRATBrowse
                                  x1h52dJdta0O.exeGet hashmaliciousNjratBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    firmes777.duckdns.orgxApyUPoAYp9c.exeGet hashmaliciousAsyncRATBrowse
                                    • 179.13.0.175
                                    xVDnoXtgbTMW.exeGet hashmaliciousAsyncRATBrowse
                                    • 179.13.0.175
                                    xApyUPoAYp9c.exeGet hashmaliciousAsyncRATBrowse
                                    • 179.13.0.175
                                    xVDnoXtgbTMW.exeGet hashmaliciousAsyncRATBrowse
                                    • 179.13.0.175
                                    xf9obZbyKks2.exeGet hashmaliciousNjratBrowse
                                    • 179.13.0.175
                                    xvONQE15fXnp.exeGet hashmaliciousNjratBrowse
                                    • 179.13.0.175
                                    x2WroBFVZxLz.exeGet hashmaliciousNjratBrowse
                                    • 179.13.0.175
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    ColombiaMovilCOxmo4WvZPV3Q0.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                    • 179.13.0.175
                                    xXQ39a5f9EJP.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                    • 179.13.0.175
                                    6VXQ3TUNZo.elfGet hashmaliciousMiraiBrowse
                                    • 181.207.246.71
                                    wFtZih4nN9.elfGet hashmaliciousMiraiBrowse
                                    • 191.90.223.182
                                    tu.exeGet hashmaliciousRemcosBrowse
                                    • 179.14.10.110
                                    xmrhZ7VhlJjD.exeGet hashmaliciousQuasarBrowse
                                    • 179.13.0.175
                                    enEQvjUlGl.elfGet hashmaliciousMiraiBrowse
                                    • 181.207.212.107
                                    Ns1xkTsDQO.elfGet hashmaliciousMiraiBrowse
                                    • 181.68.139.5
                                    7t5zI3LtK8.elfGet hashmaliciousMiraiBrowse
                                    • 181.207.212.113
                                    MYb7GhRJl7.elfGet hashmaliciousMiraiBrowse
                                    • 181.69.231.0
                                    No context
                                    No context
                                    No created / dropped files found
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):5.391214586131594
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:xPvEDYX7g1YE.exe
                                    File size:64'512 bytes
                                    MD5:4e11d0fdde3aa0cfdadbaebf83743bf1
                                    SHA1:b56cbb419e4fdc7d21ee9cc24c82d9a2ab107b77
                                    SHA256:6df5a6787c28c8d0568d6286ea2723fad317f6f42e796f4ac7f72a6db63925d3
                                    SHA512:4ba422fbc3eb60c40272d8061b5ab0cc76c7d6447914d81fd684ef550cbb211cba2b2fc59aed5402bf594eee400cdd8a9292b118a0c8a317cd7644df3a45a6e1
                                    SSDEEP:1536:v2wukvF1ak9gcKu5UYFLGXw5bfAPWjp2rPlTGhx:v2dkvF1ak9Ku5UYFLGXw5bfVEdax
                                    TLSH:6B53E7013BF98029F3BE8F7469F7658106FAF5AF2D12C55D1C8950CE0632B869941BBB
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...vjzd................................. ... ....@.. .......................`............`................................
                                    Icon Hash:00928e8e8686b000
                                    Entrypoint:0x410e8e
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x647A6A76 [Fri Jun 2 22:17:26 2023 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x10e400x4b.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x7ff.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x140000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xee940xf00089c3f37a715ae88ca612817d2477d811False0.45602213541666664data5.428084767246338IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0x120000x7ff0x80033cdbc5c50f34a35b4f0e61582ac7f11False0.41650390625data4.884866150337139IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x140000xc0x200c55d7a245ac64e9737ec35df4d0d8d84False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0x120a00x2ccdata0.43575418994413406
                                    RT_MANIFEST0x1236c0x493exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.43381725021349277
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSource PortDest PortSource IPDest IP
                                    Apr 19, 2024 23:51:00.049468994 CEST497043080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:00.240345001 CEST308049704179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:00.741806030 CEST497043080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:00.930176020 CEST308049704179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:01.444924116 CEST497043080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:01.644979000 CEST308049704179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:02.148024082 CEST497043080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:02.339859962 CEST308049704179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:02.851188898 CEST497043080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:03.044276953 CEST308049704179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:08.057815075 CEST497053080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:08.570611000 CEST308049705179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:09.085536957 CEST497053080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:09.270031929 CEST308049705179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:09.773025036 CEST497053080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:09.945053101 CEST308049705179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:10.444920063 CEST497053080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:10.633446932 CEST308049705179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:11.148021936 CEST497053080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:11.335710049 CEST308049705179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:17.555567026 CEST497143080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:17.746253014 CEST308049714179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:18.257402897 CEST497143080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:18.461204052 CEST308049714179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:18.976197004 CEST497143080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:19.165797949 CEST308049714179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:19.679435968 CEST497143080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:19.875679016 CEST308049714179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:20.382401943 CEST497143080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:20.575714111 CEST308049714179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:25.586774111 CEST497153080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:25.770560980 CEST308049715179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:26.273041964 CEST497153080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:26.454384089 CEST308049715179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:26.960666895 CEST497153080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:27.134128094 CEST308049715179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:27.648077965 CEST497153080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:27.923147917 CEST308049715179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:28.429277897 CEST497153080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:28.619221926 CEST308049715179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:33.634888887 CEST497163080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:33.800091028 CEST308049716179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:34.304284096 CEST497163080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:34.470480919 CEST308049716179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:34.976239920 CEST497163080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:35.134443045 CEST308049716179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:35.648108006 CEST497163080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:35.803144932 CEST308049716179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:36.304359913 CEST497163080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:36.460656881 CEST308049716179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:41.477737904 CEST497173080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:41.668308973 CEST308049717179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:42.179322004 CEST497173080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:42.374516010 CEST308049717179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:42.882365942 CEST497173080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:43.059470892 CEST308049717179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:43.569992065 CEST497173080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:43.754139900 CEST308049717179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:44.257416964 CEST497173080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:44.432477951 CEST308049717179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:49.445924997 CEST497183080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:49.630960941 CEST308049718179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:50.132421970 CEST497183080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:50.345232010 CEST308049718179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:50.852118969 CEST497183080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:51.028820038 CEST308049718179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:51.538656950 CEST497183080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:51.720448017 CEST308049718179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:52.226130009 CEST497183080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:52.416570902 CEST308049718179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:57.430399895 CEST497203080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:57.628851891 CEST308049720179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:58.132427931 CEST497203080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:58.324143887 CEST308049720179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:58.835521936 CEST497203080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:59.024338961 CEST308049720179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:51:59.538685083 CEST497203080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:51:59.729640007 CEST308049720179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:00.241745949 CEST497203080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:00.434160948 CEST308049720179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:06.203833103 CEST497213080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:06.363889933 CEST308049721179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:06.866724014 CEST497213080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:07.037877083 CEST308049721179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:07.538711071 CEST497213080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:07.699399948 CEST308049721179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:08.210505009 CEST497213080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:08.418519974 CEST308049721179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:08.929529905 CEST497213080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:09.100023985 CEST308049721179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:14.102370024 CEST497223080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:14.278162003 CEST308049722179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:14.788594007 CEST497223080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:14.978461027 CEST308049722179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:15.491719961 CEST497223080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:15.665376902 CEST308049722179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:16.179236889 CEST497223080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:16.379256964 CEST308049722179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:16.882332087 CEST497223080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:17.065251112 CEST308049722179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:22.071396112 CEST497243080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:22.230817080 CEST308049724179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:22.741750002 CEST497243080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:22.910820007 CEST308049724179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:23.413626909 CEST497243080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:23.591228962 CEST308049724179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:24.257544994 CEST497243080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:24.420857906 CEST308049724179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:25.069823980 CEST497243080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:25.234375000 CEST308049724179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:30.243886948 CEST497253080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:30.425160885 CEST308049725179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:30.930778980 CEST497253080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:31.112052917 CEST308049725179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:31.616714001 CEST497253080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:31.804899931 CEST308049725179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:32.319839954 CEST497253080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:32.510672092 CEST308049725179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:33.022985935 CEST497253080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:33.206249952 CEST308049725179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:38.211462021 CEST497263080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:38.661075115 CEST308049726179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:39.163558006 CEST497263080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:39.347203016 CEST308049726179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:39.851067066 CEST497263080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:40.037992001 CEST308049726179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:40.538631916 CEST497263080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:40.727327108 CEST308049726179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:41.241712093 CEST497263080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:41.446196079 CEST308049726179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:46.461321115 CEST497273080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:46.630117893 CEST308049727179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:47.132338047 CEST497273080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:47.300108910 CEST308049727179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:47.804191113 CEST497273080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:47.970571041 CEST308049727179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:48.476068974 CEST497273080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:48.753209114 CEST308049727179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:49.258785009 CEST497273080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:49.415951967 CEST308049727179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:54.430233002 CEST497283080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:54.616938114 CEST308049728179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:55.118762016 CEST497283080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:55.299510956 CEST308049728179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:55.804167032 CEST497283080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:55.989216089 CEST308049728179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:56.491699934 CEST497283080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:56.683588982 CEST308049728179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:52:57.196787119 CEST497283080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:52:57.369106054 CEST308049728179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:02.383562088 CEST497293080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:02.573950052 CEST308049729179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:03.085526943 CEST497293080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:03.260884047 CEST308049729179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:03.772931099 CEST497293080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:03.952640057 CEST308049729179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:04.460481882 CEST497293080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:04.649631023 CEST308049729179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:05.163558960 CEST497293080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:05.344739914 CEST308049729179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:10.493227005 CEST497303080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:10.669480085 CEST308049730179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:11.179662943 CEST497303080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:11.352988005 CEST308049730179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:11.866698027 CEST497303080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:12.055516958 CEST308049730179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:12.569797039 CEST497303080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:12.734040976 CEST308049730179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:13.241925001 CEST497303080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:13.419368029 CEST308049730179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:18.430140018 CEST497313080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:18.604981899 CEST308049731179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:19.116648912 CEST497313080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:19.296766043 CEST308049731179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:19.804146051 CEST497313080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:20.485131979 CEST308049731179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:20.991672993 CEST497313080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:21.566802979 CEST308049731179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:22.085403919 CEST497313080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:22.261214018 CEST308049731179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:27.274116993 CEST497323080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:27.440104961 CEST308049732179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:27.991662025 CEST497323080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:28.144953966 CEST308049732179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:28.694778919 CEST497323080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:28.861524105 CEST308049732179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:29.366774082 CEST497323080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:29.528940916 CEST308049732179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:30.038635015 CEST497323080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:30.193340063 CEST308049732179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:35.211384058 CEST497333080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:35.398006916 CEST308049733179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:35.907289028 CEST497333080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:36.095524073 CEST308049733179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:36.601126909 CEST497333080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:36.801152945 CEST308049733179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:37.304189920 CEST497333080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:37.502928972 CEST308049733179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:38.007299900 CEST497333080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:38.260415077 CEST308049733179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:44.318661928 CEST497343080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:44.484211922 CEST308049734179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:45.148004055 CEST497343080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:45.305440903 CEST308049734179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:45.944777966 CEST497343080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:46.108779907 CEST308049734179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:46.632286072 CEST497343080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:46.799880981 CEST308049734179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:47.335547924 CEST497343080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:47.498399973 CEST308049734179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:52.508790016 CEST497353080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:52.697546959 CEST308049735179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:53.210392952 CEST497353080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:53.405378103 CEST308049735179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:53.913537979 CEST497353080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:54.191601992 CEST308049735179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:54.694777012 CEST497353080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:54.882422924 CEST308049735179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:53:55.382263899 CEST497353080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:53:55.561628103 CEST308049735179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:54:02.211847067 CEST497363080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:02.384239912 CEST308049736179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:54:02.975996971 CEST497363080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:03.149945021 CEST308049736179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:54:03.772877932 CEST497363080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:03.940566063 CEST308049736179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:54:04.475994110 CEST497363080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:04.645656109 CEST308049736179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:54:05.272922039 CEST497363080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:05.444802046 CEST308049736179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:54:10.602323055 CEST497373080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:10.784192085 CEST308049737179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:54:11.304142952 CEST497373080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:11.485954046 CEST308049737179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:54:11.991626024 CEST497373080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:12.167671919 CEST308049737179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:54:12.679183960 CEST497373080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:12.867904902 CEST308049737179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:54:13.382791996 CEST497373080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:13.573149920 CEST308049737179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:54:18.586532116 CEST497383080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:18.773789883 CEST308049738179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:54:19.288881063 CEST497383080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:19.464947939 CEST308049738179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:54:19.975979090 CEST497383080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:20.454111099 CEST308049738179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:54:20.960397005 CEST497383080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:21.440251112 CEST308049738179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:54:21.944753885 CEST497383080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:22.128113985 CEST308049738179.13.0.175192.168.2.5
                                    Apr 19, 2024 23:54:27.134824991 CEST497393080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:28.147874117 CEST497393080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:30.163482904 CEST497393080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:34.163535118 CEST497393080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:42.163451910 CEST497393080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:53.195671082 CEST497403080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:54.305222034 CEST497403080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:54:56.319716930 CEST497403080192.168.2.5179.13.0.175
                                    Apr 19, 2024 23:55:00.319698095 CEST497403080192.168.2.5179.13.0.175
                                    TimestampSource PortDest PortSource IPDest IP
                                    Apr 19, 2024 23:50:59.902915955 CEST5917653192.168.2.51.1.1.1
                                    Apr 19, 2024 23:51:00.042330980 CEST53591761.1.1.1192.168.2.5
                                    Apr 19, 2024 23:52:06.015899897 CEST5708653192.168.2.51.1.1.1
                                    Apr 19, 2024 23:52:06.156191111 CEST53570861.1.1.1192.168.2.5
                                    Apr 19, 2024 23:53:10.351980925 CEST5388253192.168.2.51.1.1.1
                                    Apr 19, 2024 23:53:10.492247105 CEST53538821.1.1.1192.168.2.5
                                    Apr 19, 2024 23:54:10.461199045 CEST6140053192.168.2.51.1.1.1
                                    Apr 19, 2024 23:54:10.601329088 CEST53614001.1.1.1192.168.2.5
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Apr 19, 2024 23:50:59.902915955 CEST192.168.2.51.1.1.10x9600Standard query (0)firmes777.duckdns.orgA (IP address)IN (0x0001)false
                                    Apr 19, 2024 23:52:06.015899897 CEST192.168.2.51.1.1.10xdcddStandard query (0)firmes777.duckdns.orgA (IP address)IN (0x0001)false
                                    Apr 19, 2024 23:53:10.351980925 CEST192.168.2.51.1.1.10xde46Standard query (0)firmes777.duckdns.orgA (IP address)IN (0x0001)false
                                    Apr 19, 2024 23:54:10.461199045 CEST192.168.2.51.1.1.10x1dc2Standard query (0)firmes777.duckdns.orgA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Apr 19, 2024 23:51:00.042330980 CEST1.1.1.1192.168.2.50x9600No error (0)firmes777.duckdns.org179.13.0.175A (IP address)IN (0x0001)false
                                    Apr 19, 2024 23:52:06.156191111 CEST1.1.1.1192.168.2.50xdcddNo error (0)firmes777.duckdns.org179.13.0.175A (IP address)IN (0x0001)false
                                    Apr 19, 2024 23:53:10.492247105 CEST1.1.1.1192.168.2.50xde46No error (0)firmes777.duckdns.org179.13.0.175A (IP address)IN (0x0001)false
                                    Apr 19, 2024 23:54:10.601329088 CEST1.1.1.1192.168.2.50x1dc2No error (0)firmes777.duckdns.org179.13.0.175A (IP address)IN (0x0001)false

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Target ID:0
                                    Start time:23:50:54
                                    Start date:19/04/2024
                                    Path:C:\Users\user\Desktop\xPvEDYX7g1YE.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\xPvEDYX7g1YE.exe"
                                    Imagebase:0x430000
                                    File size:64'512 bytes
                                    MD5 hash:4E11D0FDDE3AA0CFDADBAEBF83743BF1
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.4449015352.0000000004D36000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.1981603943.0000000000432000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000000.1981603943.0000000000432000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                    Reputation:low
                                    Has exited:false

                                    Reset < >
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: a]q$ a]q$,$xaq
                                      • API String ID: 0-452644037
                                      • Opcode ID: b77803d9a233180519542b036fd3d93c7d60b65678f0d7848652dac62cf2df19
                                      • Instruction ID: 59a668ae2aa2fcd4cbfc636f4570b66aa7b846a28e587a077f3dd78b1c6f94b0
                                      • Opcode Fuzzy Hash: b77803d9a233180519542b036fd3d93c7d60b65678f0d7848652dac62cf2df19
                                      • Instruction Fuzzy Hash: F802AD34B002049FD715EF68D554B6E77E2FF84700F248968E40A9B3A9DBB4EC46CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (aq$Te]q
                                      • API String ID: 0-2961548996
                                      • Opcode ID: 6b170d65e93e71e217bebf4c49e2ac08c92c5ebcb5662f52211d220624a70b50
                                      • Instruction ID: 73f4c00ef87cc59c597a65808022b6025e2309f546bdb48f0b82ffc7e7c885b2
                                      • Opcode Fuzzy Hash: 6b170d65e93e71e217bebf4c49e2ac08c92c5ebcb5662f52211d220624a70b50
                                      • Instruction Fuzzy Hash: 7A419035B105108FCB489F6DD458B5EBBE2FF89710F2580A9E806DB3A6CE75DC018B95
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Haq$dLcq
                                      • API String ID: 0-1713614415
                                      • Opcode ID: 5c74d7ad4265b27e996fdc236fe697682bad4c0257473871c69872defb288cac
                                      • Instruction ID: 70744fcf324380ab820873be820a23897ca1e2cf57a3c2448054e81fbc901af3
                                      • Opcode Fuzzy Hash: 5c74d7ad4265b27e996fdc236fe697682bad4c0257473871c69872defb288cac
                                      • Instruction Fuzzy Hash: 5031A031A002049FCB19DF69C454BAEBFF2BF89300F1449A9E506AB3A1CB75DD05CBA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: LR]q
                                      • API String ID: 0-3081347316
                                      • Opcode ID: cbb0e6352a92025d2d398742a27bb4b435333366238e018f2c671208136eacc1
                                      • Instruction ID: 2f5676630b0427b736d0936626b869b147acf51bc8be2a159962318f1f9c13c6
                                      • Opcode Fuzzy Hash: cbb0e6352a92025d2d398742a27bb4b435333366238e018f2c671208136eacc1
                                      • Instruction Fuzzy Hash: 3221AD34F001168FCB54EB788591A6EBBF2AFC8304B14456DE54ADB3A5DE34DC028BA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: dLcq
                                      • API String ID: 0-2236789282
                                      • Opcode ID: 5c06beeba112f23ebe404aae1c27c74928f8b0f87b6bbf52d3b5d296bbcceace
                                      • Instruction ID: 3a83abc4e10be045d8f27f2269910ec8ed38074262774e20e3b1bb79b65ee050
                                      • Opcode Fuzzy Hash: 5c06beeba112f23ebe404aae1c27c74928f8b0f87b6bbf52d3b5d296bbcceace
                                      • Instruction Fuzzy Hash: A0318175A002049FCB14DF69D558BAEBFF1BF48300F148569E405AB3A1CB75DD05CB60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 287535f827dc2a53814ecac944943b1423d3c77fe827cd0c382f99965787cba5
                                      • Instruction ID: e87c46a2627d7be6104719d7a7c6b94c7cc461ad2c1fdbb4ba8d30be33f65600
                                      • Opcode Fuzzy Hash: 287535f827dc2a53814ecac944943b1423d3c77fe827cd0c382f99965787cba5
                                      • Instruction Fuzzy Hash: 4A51E63C112A01DFC71AFF2CF984A59376AFB8470571086A8D4019B72DDBB5AD0ACF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: becdefd319c15df0defa87c040abb47c6485ca864761ab90a0f09c8c69d212e9
                                      • Instruction ID: 63fa427eb0179273f0f650a43d096d98b8c342e50513bc355a875f34fb9463e9
                                      • Opcode Fuzzy Hash: becdefd319c15df0defa87c040abb47c6485ca864761ab90a0f09c8c69d212e9
                                      • Instruction Fuzzy Hash: 52414F75B102289FDF049BA9ED1479D7ABBBFCC710F144529E809B3758CA386C058B99
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ecbe5880f5494cb5db2d329f8d228708cbfcb288161ff5d1b7c29c3b80787ca9
                                      • Instruction ID: 051582fb384a6b344f562ee66598cb24d7de7242b70111822b8df211ceea47c0
                                      • Opcode Fuzzy Hash: ecbe5880f5494cb5db2d329f8d228708cbfcb288161ff5d1b7c29c3b80787ca9
                                      • Instruction Fuzzy Hash: DF316E30710702AFDB59AB79A95477E7AA6BF40704B18482DD44FC72D0EF24D906CBB2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3881c0fd87551cc96abf4db7c1c2f3df09891ba9485b14cfa918a0d87b23e1a2
                                      • Instruction ID: 421dfe1140005cfeeb7ac2ba0c8d722392bcd0f93203f2b5ac1f3b9e7bcc0a4e
                                      • Opcode Fuzzy Hash: 3881c0fd87551cc96abf4db7c1c2f3df09891ba9485b14cfa918a0d87b23e1a2
                                      • Instruction Fuzzy Hash: 3F315C30710702AFDB29AB79995877E3EA6BF84704B18492DD44BC72D0EF24DD018BA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 00a604f7cd7119d0da9fdcc3d5fb029cdae8e1915322f5880df3aa76f7331622
                                      • Instruction ID: 7e525cced1af9e65bbb93fea6f31907137cd9224ed3c704771ceb397155f8584
                                      • Opcode Fuzzy Hash: 00a604f7cd7119d0da9fdcc3d5fb029cdae8e1915322f5880df3aa76f7331622
                                      • Instruction Fuzzy Hash: 72117FB1B002155FCB48AFBE595436EBAEEEFC9700B20483DD44AD7395DE388D0587A5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9b903bb3d8c5f0d1a55769285f694d95012549eea0666554734edc6a505a0364
                                      • Instruction ID: eb1d02633c51465f1b7af29fe6cc2fe2dfc1da4caf0a12c611678585df18e0a6
                                      • Opcode Fuzzy Hash: 9b903bb3d8c5f0d1a55769285f694d95012549eea0666554734edc6a505a0364
                                      • Instruction Fuzzy Hash: 0311AFB1B002155FCB48AFBE595436EBAEEEFC9700B20483DD44AD3396DE388C0587A5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3a0ea3f6efc7a989ff8012b0c4da2ed671dc8b45268a72701e0603daf3ef79c8
                                      • Instruction ID: b7d2d2a6ae3513c0392664961fd2076f5b9120df9f13fa96f346207598ff65af
                                      • Opcode Fuzzy Hash: 3a0ea3f6efc7a989ff8012b0c4da2ed671dc8b45268a72701e0603daf3ef79c8
                                      • Instruction Fuzzy Hash: 50117978B012159FCB54EBB9D80862A7BF6BFC830471048B9D40ACB398EA34DD01CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 39b2c0ebe7d272fac0da2d54487739f28031c1e2469a8d722bef5651566ae4fe
                                      • Instruction ID: 9d45f11b26f542da5812dd8da03314b4b12897ff3f295780ee4a19331bed7f62
                                      • Opcode Fuzzy Hash: 39b2c0ebe7d272fac0da2d54487739f28031c1e2469a8d722bef5651566ae4fe
                                      • Instruction Fuzzy Hash: 2F012DB9B066028FD708DF6EE94161AFBA6FFC4714318C2AAD508DB359D670E801CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8ed0eb76bfcca108ba973822e667f470d0b5dba0d6bf4d9d17ad7d687e762335
                                      • Instruction ID: 6808ca39fe0de8e093372a0b0b02ded5de0c717d30ef2619739bcabfa6a18945
                                      • Opcode Fuzzy Hash: 8ed0eb76bfcca108ba973822e667f470d0b5dba0d6bf4d9d17ad7d687e762335
                                      • Instruction Fuzzy Hash: 8D016D78A012159FCB54EB78D80466E7BF6BFC830571448B9D40ADB354EA34DD01CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c668b45fe46cc46147e0a23029be5c75b567a32a962d301e85ccb948c858a209
                                      • Instruction ID: 40a38c5e5ef0a44d74afcff07300dbc0c757bbd596e03a57f0d6b6c2bbc1321d
                                      • Opcode Fuzzy Hash: c668b45fe46cc46147e0a23029be5c75b567a32a962d301e85ccb948c858a209
                                      • Instruction Fuzzy Hash: 71016D3CB021158FCB18EBA9D4517BE7BA0AF45700F1440ADC40A97282DB709901CBA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 42ad4c4b0d6da2703e17683c0a4dbabb496f0e27a008aa1d62f1b2818d1407d1
                                      • Instruction ID: 0ea2883b6e2e650a98cbcdec31d951268a5843e2fd8830609a2dde37ed1fcc92
                                      • Opcode Fuzzy Hash: 42ad4c4b0d6da2703e17683c0a4dbabb496f0e27a008aa1d62f1b2818d1407d1
                                      • Instruction Fuzzy Hash: 2A01A438C10609CFD705FBBCE85575D7B75FF81304B404624C44657298EB70A904CBA6
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e93317ff1da34a1084f9eea8a91eb18b92d7040fdb40591f6a5bc2204672a488
                                      • Instruction ID: 35b15a318fb5ee54974669f2e636f1d344a81c2bc138183c2145f73d4966b34e
                                      • Opcode Fuzzy Hash: e93317ff1da34a1084f9eea8a91eb18b92d7040fdb40591f6a5bc2204672a488
                                      • Instruction Fuzzy Hash: 6A01F438C187898FE302EBB8D850B6C7F71AF82308B04465AC496962D5EB709905C76A
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 03ab11e65fc554d8850bb71606428c51550cb2c812b9bc59dff46af7ae21ebbe
                                      • Instruction ID: e2c9f33434d776db63396b21cf9751d6a44a5e66c36e7f7c893ebe09c97b1342
                                      • Opcode Fuzzy Hash: 03ab11e65fc554d8850bb71606428c51550cb2c812b9bc59dff46af7ae21ebbe
                                      • Instruction Fuzzy Hash: DEE046317152114FC7889A6DA8989AE7BAAEBC922932548BAF009C7361CA259C038750
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d52d117a880181dc4823edc98f8eabfde9530c6f14ed0b711e345a3f748d08b6
                                      • Instruction ID: a885242b8cf004b0d44261113aa78d5e97ead04e342ebeb613243c4a9c22fc72
                                      • Opcode Fuzzy Hash: d52d117a880181dc4823edc98f8eabfde9530c6f14ed0b711e345a3f748d08b6
                                      • Instruction Fuzzy Hash: 66E08C313002005F83449A2EA88495AB7DAEBC813531544B9E10DC7321CE60DC024390
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bd679aa7965ac57270bee6bdedc59ebecd600f8c295a3ae20fa828a29fd0e63a
                                      • Instruction ID: 5c619a13ce2da2e32bb0f4ec8765c9d6b91cdb6a06a1430696f806c038be08a8
                                      • Opcode Fuzzy Hash: bd679aa7965ac57270bee6bdedc59ebecd600f8c295a3ae20fa828a29fd0e63a
                                      • Instruction Fuzzy Hash: BBC08C30434548EFD30857B4D81C36C7E14EB4130EFB44155E0CB010F18E689886D633
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4448040593.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d00000_xPvEDYX7g1YE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 765e43af2e0215a9afbf8159218e31a32817fe8c65da5952edd28dde9b20ef57
                                      • Instruction ID: 7ff0b66fb68bf79eda9994431eb69f727220d6434dfff38aaf9ede34804fd288
                                      • Opcode Fuzzy Hash: 765e43af2e0215a9afbf8159218e31a32817fe8c65da5952edd28dde9b20ef57
                                      • Instruction Fuzzy Hash: 7CC08C30434148EFD30867B4D80C36C7E14AF4230EFB40050E0CB020F18E689884D233
                                      Uniqueness

                                      Uniqueness Score: -1.00%