Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xjXIE2ZFFSw4.exe

Overview

General Information

Sample name:xjXIE2ZFFSw4.exe
Analysis ID:1430613
MD5:231e83da0623f80d134940cc17528eb3
SHA1:99e2c48f98984b2802e62f8e54ec5773088e6b13
SHA256:ec722b1e3fdf6f67c84676d86e717a7bd559f0eb0e28e53f6bcacc97581d6654
Tags:DcRatexe
Infos:

Detection

AsyncRAT, DcRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
Yara detected DcRat
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries memory information (via WMI often done to detect virtual machines)
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • xjXIE2ZFFSw4.exe (PID: 6896 cmdline: "C:\Users\user\Desktop\xjXIE2ZFFSw4.exe" MD5: 231E83DA0623F80D134940CC17528EB3)
    • cmd.exe (PID: 7108 cmdline: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"' & exit MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 7200 cmdline: schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"' MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • cmd.exe (PID: 6824 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpF256.tmp.bat"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • timeout.exe (PID: 7232 cmdline: timeout 3 MD5: 100065E21CFBBDE57CBA2838921F84D6)
      • FULL.exe (PID: 7280 cmdline: "C:\Users\user\AppData\Roaming\FULL.exe" MD5: 231E83DA0623F80D134940CC17528EB3)
  • FULL.exe (PID: 7256 cmdline: C:\Users\user\AppData\Roaming\FULL.exe MD5: 231E83DA0623F80D134940CC17528EB3)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
DCRatDCRat is a typical RAT that has been around since at least June 2019.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dcrat
{"Ports": ["1993"], "Server": ["rusia.duckdns.org"], "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "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", "Server Signature": "iRdOmXtQOefRF9WysbiOmzSA9uTlIyCBU05GzEsxt8ZAkgdeYkuRzRii/l9vJYaefhsab8VeQeQWm3x9cxjwJVhRTfxqjmteK+RQu1f4WdvL5ar0f24/boAOcTn7E5SdMpW5+TeYiHRH8FeBUWlNiptG2VY45kj1wZepQEEQjeA="}
SourceRuleDescriptionAuthorStrings
xjXIE2ZFFSw4.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    xjXIE2ZFFSw4.exeINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
    • 0xd15a:$q1: Select * from Win32_CacheMemory
    • 0xd19a:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
    • 0xd1e8:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
    • 0xd236:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
    xjXIE2ZFFSw4.exeINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
    • 0xd796:$s1: DcRatBy
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\FULL.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      C:\Users\user\AppData\Roaming\FULL.exeINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
      • 0xd15a:$q1: Select * from Win32_CacheMemory
      • 0xd19a:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
      • 0xd1e8:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
      • 0xd236:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
      C:\Users\user\AppData\Roaming\FULL.exeINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
      • 0xd796:$s1: DcRatBy
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1631861328.0000000000732000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        00000008.00000002.1709688213.00000000013CC000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
        • 0x87c:$b2: DcRat By qwqdanchun1
        00000008.00000002.1710297798.0000000003041000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
        • 0x54a8:$b1: DcRatByqwqdanchun
        00000007.00000002.2880963232.0000000003021000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
        • 0x54a8:$b1: DcRatByqwqdanchun
        00000000.00000002.1661055131.0000000002C00000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          Click to see the 16 entries
          SourceRuleDescriptionAuthorStrings
          0.2.xjXIE2ZFFSw4.exe.2c005e0.1.raw.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            0.2.xjXIE2ZFFSw4.exe.2c005e0.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
            • 0xd15a:$q1: Select * from Win32_CacheMemory
            • 0xd19a:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
            • 0xd1e8:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
            • 0xd236:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
            0.2.xjXIE2ZFFSw4.exe.2c005e0.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
            • 0xd796:$s1: DcRatBy
            0.0.xjXIE2ZFFSw4.exe.730000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
              0.0.xjXIE2ZFFSw4.exe.730000.0.unpackINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
              • 0xd15a:$q1: Select * from Win32_CacheMemory
              • 0xd19a:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
              • 0xd1e8:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
              • 0xd236:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
              Click to see the 4 entries

              System Summary

              barindex
              Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\xjXIE2ZFFSw4.exe", ParentImage: C:\Users\user\Desktop\xjXIE2ZFFSw4.exe, ParentProcessId: 6896, ParentProcessName: xjXIE2ZFFSw4.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"' & exit, ProcessId: 7108, ProcessName: cmd.exe
              Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\xjXIE2ZFFSw4.exe", ParentImage: C:\Users\user\Desktop\xjXIE2ZFFSw4.exe, ParentProcessId: 6896, ParentProcessName: xjXIE2ZFFSw4.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"' & exit, ProcessId: 7108, ProcessName: cmd.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"' , CommandLine: schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"' , CommandLine|base64offset|contains: mj,, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"' & exit, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7108, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"' , ProcessId: 7200, ProcessName: schtasks.exe
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: xjXIE2ZFFSw4.exeAvira: detected
              Source: C:\Users\user\AppData\Roaming\FULL.exeAvira: detection malicious, Label: HEUR/AGEN.1307453
              Source: xjXIE2ZFFSw4.exeMalware Configuration Extractor: AsyncRAT {"Ports": ["1993"], "Server": ["rusia.duckdns.org"], "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "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", "Server Signature": "iRdOmXtQOefRF9WysbiOmzSA9uTlIyCBU05GzEsxt8ZAkgdeYkuRzRii/l9vJYaefhsab8VeQeQWm3x9cxjwJVhRTfxqjmteK+RQu1f4WdvL5ar0f24/boAOcTn7E5SdMpW5+TeYiHRH8FeBUWlNiptG2VY45kj1wZepQEEQjeA="}
              Source: C:\Users\user\AppData\Roaming\FULL.exeReversingLabs: Detection: 76%
              Source: xjXIE2ZFFSw4.exeReversingLabs: Detection: 76%
              Source: C:\Users\user\AppData\Roaming\FULL.exeJoe Sandbox ML: detected
              Source: xjXIE2ZFFSw4.exeJoe Sandbox ML: detected
              Source: xjXIE2ZFFSw4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: unknownDNS query: name: rusia.duckdns.org
              Source: global trafficTCP traffic: 192.168.2.4:49730 -> 46.246.14.10:1993
              Source: Joe Sandbox ViewIP Address: 46.246.14.10 46.246.14.10
              Source: Joe Sandbox ViewASN Name: PORTLANEwwwportlanecomSE PORTLANEwwwportlanecomSE
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownDNS traffic detected: queries for: rusia.duckdns.org
              Source: xjXIE2ZFFSw4.exe, 00000000.00000002.1661055131.0000000002BFA000.00000004.00000800.00020000.00000000.sdmp, FULL.exe, 00000007.00000002.2880963232.0000000003548000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: xjXIE2ZFFSw4.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.xjXIE2ZFFSw4.exe.730000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1631861328.0000000000732000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1661055131.0000000002C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: xjXIE2ZFFSw4.exe PID: 6896, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\FULL.exe, type: DROPPED

              System Summary

              barindex
              Source: xjXIE2ZFFSw4.exe, type: SAMPLEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
              Source: xjXIE2ZFFSw4.exe, type: SAMPLEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
              Source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
              Source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
              Source: 0.0.xjXIE2ZFFSw4.exe.730000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
              Source: 0.0.xjXIE2ZFFSw4.exe.730000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
              Source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
              Source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
              Source: 00000008.00000002.1709688213.00000000013CC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
              Source: 00000008.00000002.1710297798.0000000003041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
              Source: 00000007.00000002.2880963232.0000000003021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
              Source: 00000000.00000002.1661055131.0000000002C16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
              Source: 00000000.00000002.1660448779.0000000000B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
              Source: 00000007.00000002.2879895307.0000000001011000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
              Source: 00000000.00000002.1661055131.0000000002A61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
              Source: 00000007.00000002.2880963232.000000000302D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
              Source: 00000008.00000002.1710297798.000000000304D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
              Source: Process Memory Space: xjXIE2ZFFSw4.exe PID: 6896, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
              Source: Process Memory Space: FULL.exe PID: 7256, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
              Source: Process Memory Space: FULL.exe PID: 7280, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
              Source: C:\Users\user\AppData\Roaming\FULL.exe, type: DROPPEDMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
              Source: C:\Users\user\AppData\Roaming\FULL.exe, type: DROPPEDMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeCode function: 0_2_00007FFD9B8A7418 NtProtectVirtualMemory,0_2_00007FFD9B8A7418
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeCode function: 0_2_00007FFD9B8A8708 NtProtectVirtualMemory,0_2_00007FFD9B8A8708
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 7_2_00007FFD9B8B7418 NtProtectVirtualMemory,7_2_00007FFD9B8B7418
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 7_2_00007FFD9B8B8708 NtProtectVirtualMemory,7_2_00007FFD9B8B8708
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 8_2_00007FFD9B8A7418 NtProtectVirtualMemory,8_2_00007FFD9B8A7418
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 8_2_00007FFD9B8A8708 NtProtectVirtualMemory,8_2_00007FFD9B8A8708
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeCode function: 0_2_00007FFD9B8A74180_2_00007FFD9B8A7418
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeCode function: 0_2_00007FFD9B8A5D660_2_00007FFD9B8A5D66
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeCode function: 0_2_00007FFD9B8A6B120_2_00007FFD9B8A6B12
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeCode function: 0_2_00007FFD9B8A7D8D0_2_00007FFD9B8A7D8D
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeCode function: 0_2_00007FFD9B8A847E0_2_00007FFD9B8A847E
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeCode function: 0_2_00007FFD9B8A04B80_2_00007FFD9B8A04B8
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 7_2_00007FFD9B8B74187_2_00007FFD9B8B7418
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 7_2_00007FFD9B8B5D667_2_00007FFD9B8B5D66
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 7_2_00007FFD9B8B6B127_2_00007FFD9B8B6B12
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 7_2_00007FFD9B8B7D8D7_2_00007FFD9B8B7D8D
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 7_2_00007FFD9B8B847E7_2_00007FFD9B8B847E
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 7_2_00007FFD9B8B04B87_2_00007FFD9B8B04B8
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 8_2_00007FFD9B8A5D668_2_00007FFD9B8A5D66
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 8_2_00007FFD9B8A74188_2_00007FFD9B8A7418
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 8_2_00007FFD9B8A6B128_2_00007FFD9B8A6B12
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 8_2_00007FFD9B8A7D8D8_2_00007FFD9B8A7D8D
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 8_2_00007FFD9B8A847E8_2_00007FFD9B8A847E
              Source: xjXIE2ZFFSw4.exe, 00000000.00000002.1661055131.0000000002C00000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe" vs xjXIE2ZFFSw4.exe
              Source: xjXIE2ZFFSw4.exe, 00000000.00000000.1631875385.0000000000742000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe" vs xjXIE2ZFFSw4.exe
              Source: xjXIE2ZFFSw4.exeBinary or memory string: OriginalFilenameClient.exe" vs xjXIE2ZFFSw4.exe
              Source: xjXIE2ZFFSw4.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
              Source: xjXIE2ZFFSw4.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
              Source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
              Source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
              Source: 0.0.xjXIE2ZFFSw4.exe.730000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
              Source: 0.0.xjXIE2ZFFSw4.exe.730000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
              Source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
              Source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
              Source: 00000008.00000002.1709688213.00000000013CC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
              Source: 00000008.00000002.1710297798.0000000003041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
              Source: 00000007.00000002.2880963232.0000000003021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
              Source: 00000000.00000002.1661055131.0000000002C16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
              Source: 00000000.00000002.1660448779.0000000000B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
              Source: 00000007.00000002.2879895307.0000000001011000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
              Source: 00000000.00000002.1661055131.0000000002A61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
              Source: 00000007.00000002.2880963232.000000000302D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
              Source: 00000008.00000002.1710297798.000000000304D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
              Source: Process Memory Space: xjXIE2ZFFSw4.exe PID: 6896, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
              Source: Process Memory Space: FULL.exe PID: 7256, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
              Source: Process Memory Space: FULL.exe PID: 7280, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
              Source: C:\Users\user\AppData\Roaming\FULL.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
              Source: C:\Users\user\AppData\Roaming\FULL.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
              Source: xjXIE2ZFFSw4.exe, Settings.csBase64 encoded string: 'L81/McLYqt/xwbq9N3RFCcoEoaFTB5pi6Y4Xe/ExZsXVTZOCAcEFMBMMI6Yu/+n7PrnrXEJLEhcLEqmvE0Y1qg==', 'QQ3szPY0U0oOqD6157M9zuulEC5OsUjV10mxjMEt8dGAjKyhHs+l7B1n/munOsfbijmPR69Xt9CRLBy8t5w41lrPMSrnMxKSPJIk8dtSIIA=', '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', 'lcE7UGMkol49PPlclNhvDN8dQKqiNdU2LvNm18yWq9c1S8yF9h7Hux+oANcSRamvRT3dO4JcPhLjyY82IHLQ6Q==', 'PduhHMbzFOBTicEuaWh2qiGquR0mzvWx6ZZ+aKwpcgAeE6mmgxOVqD3cEudwugjqFXz62Nsk/5twwNvTGuFryA==', 'l6JrTVOBlUtPxl2xzOVzHLrsGqlFH+/d1r4/SbZs30jpbEWKQdrEXJqQemlE5goc6pQ11+uBVqHNBMSkU3MFtg=='
              Source: FULL.exe.0.dr, Settings.csBase64 encoded string: 'L81/McLYqt/xwbq9N3RFCcoEoaFTB5pi6Y4Xe/ExZsXVTZOCAcEFMBMMI6Yu/+n7PrnrXEJLEhcLEqmvE0Y1qg==', 'QQ3szPY0U0oOqD6157M9zuulEC5OsUjV10mxjMEt8dGAjKyhHs+l7B1n/munOsfbijmPR69Xt9CRLBy8t5w41lrPMSrnMxKSPJIk8dtSIIA=', 'nKWNgfTepj31gG/0NbILZIJAkgCb5/heZrpSotu90RKl3v85xVHfut53kkWlbZS3KJApzDCdsQnjBTJT+cNyi8qtthk/K//ekcDh3Qgs0oRvKLqXuZSmmq6APOUs6KoyVQF5nCBw8OHh9pxFdV+IwWO7T6v7oj2dTZSF+nrOVpE2fcaDkW3uqNvpr0hI5nuHkKt4vxR66q+s5pHhUyLgLB748K/W69+zlhPtvk5/xW4iwnd9dwyepP+pEjmj7g+XljVloJrcazYo6XjuB+gcNhVR5+hRPH18Ju3xSStfH/CIvnxdXYfkC4VwHiKCshbR1qVHQqHVtDZ3XSvn1Rnxt5DSkGK2Sc/mWyViUYhsjaNjn+nagWUQr7daCs8aARI4v2NJb5J5p8ZS8Yf/PeH/CrXqJKCj1JnxX+KIUYFk2Hah5ebs902/VSnQuCoYsHoekb3WnvMlc3uUKPPZcu9k8uMaD4tEuDhRSAfnzOmBAB1AB6gJxfisLH1hLhiaL/QnXOpQX/byhu+DnWUgIFGn70uLPOCvJegtyvxBjQkbnXYdqzIPqpm81kLjYHToCCHqhO/78bLWTLGX6sIcyIMNcZ9v/s+19O/wC0y+m1GpH5jk7FrCu8ekeDTeWaUzC8gwxPFzIir3u2uxprYVKFjeD+07/IrBhhaQpxWPb4/hNxbL1iLs4xFJjBsI5zs8AF8OvpN/h7d0LuD3py0irTxFyvq3/DMMd8qWI19hkE4hpIhcu0I9NbAARXTgxYzLkSpyU3cIWjoyXjHoKGWGlx2eNSIs4jr5leKUXKd5LCToB3ROqmn8Ga5WJzSqqvcNtrOe5Zh2PiPeoXNSgNKdXoh/yW4XMi1dVyr8j0vDzAGoHXbrexGv4MpHBS+6MlgC4e7/pictaJMrruQIEBkiXn5hU6Cvi0Hsdt/emmsn3N1jaqrscZnE1gWK5EXzrzOd7A7VbkpP9VC+C/QgC1omzOaEOIlNJafIjni5UCNbaTvADopExnRRxgH4VLtTg5cbQMlKXloYybDmYBZZe6Hg6qzFcGX6Em5djDfzUHiKBOY3dqPfSuQkR1bN0Jn5oLCrvENn', 'lcE7UGMkol49PPlclNhvDN8dQKqiNdU2LvNm18yWq9c1S8yF9h7Hux+oANcSRamvRT3dO4JcPhLjyY82IHLQ6Q==', 'PduhHMbzFOBTicEuaWh2qiGquR0mzvWx6ZZ+aKwpcgAeE6mmgxOVqD3cEudwugjqFXz62Nsk/5twwNvTGuFryA==', 'l6JrTVOBlUtPxl2xzOVzHLrsGqlFH+/d1r4/SbZs30jpbEWKQdrEXJqQemlE5goc6pQ11+uBVqHNBMSkU3MFtg=='
              Source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.raw.unpack, Settings.csBase64 encoded string: 'L81/McLYqt/xwbq9N3RFCcoEoaFTB5pi6Y4Xe/ExZsXVTZOCAcEFMBMMI6Yu/+n7PrnrXEJLEhcLEqmvE0Y1qg==', 'QQ3szPY0U0oOqD6157M9zuulEC5OsUjV10mxjMEt8dGAjKyhHs+l7B1n/munOsfbijmPR69Xt9CRLBy8t5w41lrPMSrnMxKSPJIk8dtSIIA=', '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', 'lcE7UGMkol49PPlclNhvDN8dQKqiNdU2LvNm18yWq9c1S8yF9h7Hux+oANcSRamvRT3dO4JcPhLjyY82IHLQ6Q==', 'PduhHMbzFOBTicEuaWh2qiGquR0mzvWx6ZZ+aKwpcgAeE6mmgxOVqD3cEudwugjqFXz62Nsk/5twwNvTGuFryA==', 'l6JrTVOBlUtPxl2xzOVzHLrsGqlFH+/d1r4/SbZs30jpbEWKQdrEXJqQemlE5goc6pQ11+uBVqHNBMSkU3MFtg=='
              Source: xjXIE2ZFFSw4.exe, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: xjXIE2ZFFSw4.exe, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: FULL.exe.0.dr, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: FULL.exe.0.dr, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.raw.unpack, DInvokeCore.csSuspicious method names: .DInvokeCore.DynamicAPIInvoke
              Source: xjXIE2ZFFSw4.exe, DInvokeCore.csSuspicious method names: .DInvokeCore.DynamicAPIInvoke
              Source: FULL.exe.0.dr, DInvokeCore.csSuspicious method names: .DInvokeCore.DynamicAPIInvoke
              Source: FULL.exe, 00000007.00000002.2879895307.0000000001011000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <add name="persistenceProvider" type="System.Slnr
              Source: classification engineClassification label: mal100.troj.evad.winEXE@15/5@2/1
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeFile created: C:\Users\user\AppData\Roaming\FULL.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeMutant created: NULL
              Source: C:\Users\user\AppData\Roaming\FULL.exeMutant created: \Sessions\1\BaseNamedObjects\DcRatMutex_qwqdanchun
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7060:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6748:120:WilError_03
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF256.tmpJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpF256.tmp.bat""
              Source: xjXIE2ZFFSw4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: xjXIE2ZFFSw4.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: xjXIE2ZFFSw4.exeReversingLabs: Detection: 76%
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeFile read: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\xjXIE2ZFFSw4.exe "C:\Users\user\Desktop\xjXIE2ZFFSw4.exe"
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"' & exit
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpF256.tmp.bat""
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"'
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout 3
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\FULL.exe C:\Users\user\AppData\Roaming\FULL.exe
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\FULL.exe "C:\Users\user\AppData\Roaming\FULL.exe"
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"' & exitJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpF256.tmp.bat""Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"' Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout 3Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\FULL.exe "C:\Users\user\AppData\Roaming\FULL.exe" Jump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
              Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
              Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
              Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
              Source: xjXIE2ZFFSw4.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: xjXIE2ZFFSw4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeCode function: 0_2_00007FFD9B8A77DD push ecx; retf 0_2_00007FFD9B8A785C
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeCode function: 0_2_00007FFD9B8A2458 push ebx; retf 0_2_00007FFD9B8A252A
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeCode function: 0_2_00007FFD9B8A00BD pushad ; iretd 0_2_00007FFD9B8A00C1
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 7_2_00007FFD9B8B77DD push ecx; retf 7_2_00007FFD9B8B785C
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 7_2_00007FFD9B8B00BD pushad ; iretd 7_2_00007FFD9B8B00C1
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 8_2_00007FFD9B8A77DD push ecx; retf 8_2_00007FFD9B8A785C
              Source: C:\Users\user\AppData\Roaming\FULL.exeCode function: 8_2_00007FFD9B8A00BD pushad ; iretd 8_2_00007FFD9B8A00C1
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeFile created: C:\Users\user\AppData\Roaming\FULL.exeJump to dropped file

              Boot Survival

              barindex
              Source: Yara matchFile source: xjXIE2ZFFSw4.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.xjXIE2ZFFSw4.exe.730000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1631861328.0000000000732000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1661055131.0000000002C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: xjXIE2ZFFSw4.exe PID: 6896, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\FULL.exe, type: DROPPED
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"'
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: xjXIE2ZFFSw4.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.xjXIE2ZFFSw4.exe.730000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1631861328.0000000000732000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1661055131.0000000002C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: xjXIE2ZFFSw4.exe PID: 6896, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\FULL.exe, type: DROPPED
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_CacheMemory
              Source: C:\Users\user\AppData\Roaming\FULL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_CacheMemory
              Source: C:\Users\user\AppData\Roaming\FULL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_CacheMemory
              Source: xjXIE2ZFFSw4.exe, FULL.exe.0.drBinary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeMemory allocated: E80000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeMemory allocated: 1AA60000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeMemory allocated: 1270000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeMemory allocated: 1B020000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeMemory allocated: 16F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeMemory allocated: 1B040000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exe TID: 7088Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exe TID: 7260Thread sleep time: -55000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exe TID: 7300Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: FULL.exe, 00000007.00000002.2889039919.000000001BA7A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"' & exitJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpF256.tmp.bat""Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"' Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout 3Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\FULL.exe "C:\Users\user\AppData\Roaming\FULL.exe" Jump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeQueries volume information: C:\Users\user\Desktop\xjXIE2ZFFSw4.exe VolumeInformationJump to behavior
              Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeQueries volume information: C:\Users\user\AppData\Roaming\FULL.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\FULL.exeQueries volume information: C:\Users\user\AppData\Roaming\FULL.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\xjXIE2ZFFSw4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: Yara matchFile source: xjXIE2ZFFSw4.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.xjXIE2ZFFSw4.exe.730000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.xjXIE2ZFFSw4.exe.2c005e0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1631861328.0000000000732000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1661055131.0000000002C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: xjXIE2ZFFSw4.exe PID: 6896, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\FULL.exe, type: DROPPED
              Source: xjXIE2ZFFSw4.exe, 00000000.00000000.1631861328.0000000000732000.00000002.00000001.01000000.00000003.sdmp, xjXIE2ZFFSw4.exe, 00000000.00000002.1661055131.0000000002C00000.00000004.00000800.00020000.00000000.sdmp, FULL.exe.0.drBinary or memory string: MSASCui.exe
              Source: xjXIE2ZFFSw4.exe, 00000000.00000000.1631861328.0000000000732000.00000002.00000001.01000000.00000003.sdmp, xjXIE2ZFFSw4.exe, 00000000.00000002.1661055131.0000000002C00000.00000004.00000800.00020000.00000000.sdmp, FULL.exe.0.drBinary or memory string: procexp.exe
              Source: xjXIE2ZFFSw4.exe, 00000000.00000000.1631861328.0000000000732000.00000002.00000001.01000000.00000003.sdmp, xjXIE2ZFFSw4.exe, 00000000.00000002.1661055131.0000000002C00000.00000004.00000800.00020000.00000000.sdmp, FULL.exe.0.drBinary or memory string: MsMpEng.exe

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000000.00000002.1661055131.0000000002C16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2880963232.000000000302D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1710297798.000000000304D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: xjXIE2ZFFSw4.exe PID: 6896, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: FULL.exe PID: 7256, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: FULL.exe PID: 7280, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 00000000.00000002.1661055131.0000000002C16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2880963232.000000000302D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1710297798.000000000304D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: xjXIE2ZFFSw4.exe PID: 6896, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: FULL.exe PID: 7256, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: FULL.exe PID: 7280, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information1
              Scripting
              Valid Accounts1
              Windows Management Instrumentation
              2
              Scheduled Task/Job
              11
              Process Injection
              1
              Masquerading
              OS Credential Dumping311
              Security Software Discovery
              Remote Services1
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Scheduled Task/Job
              1
              Scripting
              2
              Scheduled Task/Job
              1
              Disable or Modify Tools
              LSASS Memory1
              Process Discovery
              Remote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAt1
              DLL Side-Loading
              1
              DLL Side-Loading
              31
              Virtualization/Sandbox Evasion
              Security Account Manager31
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
              Process Injection
              NTDS1
              File and Directory Discovery
              Distributed Component Object ModelInput Capture11
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script111
              Obfuscated Files or Information
              LSA Secrets13
              System Information Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1430613 Sample: xjXIE2ZFFSw4.exe Startdate: 24/04/2024 Architecture: WINDOWS Score: 100 32 rusia.duckdns.org 2->32 36 Found malware configuration 2->36 38 Malicious sample detected (through community Yara rule) 2->38 40 Antivirus / Scanner detection for submitted sample 2->40 44 7 other signatures 2->44 8 FULL.exe 2 2->8         started        12 xjXIE2ZFFSw4.exe 7 2->12         started        signatures3 42 Uses dynamic DNS services 32->42 process4 dnsIp5 34 rusia.duckdns.org 46.246.14.10, 1993, 49730, 49731 PORTLANEwwwportlanecomSE Sweden 8->34 46 Antivirus detection for dropped file 8->46 48 Multi AV Scanner detection for dropped file 8->48 50 Machine Learning detection for dropped file 8->50 30 C:\Users\user\AppData\Roaming\FULL.exe, PE32 12->30 dropped 52 Queries memory information (via WMI often done to detect virtual machines) 12->52 15 cmd.exe 1 12->15         started        18 cmd.exe 1 12->18         started        file6 signatures7 process8 signatures9 54 Uses schtasks.exe or at.exe to add and modify task schedules 15->54 20 conhost.exe 15->20         started        22 schtasks.exe 1 15->22         started        24 FULL.exe 3 18->24         started        26 conhost.exe 18->26         started        28 timeout.exe 1 18->28         started        process10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              xjXIE2ZFFSw4.exe76%ReversingLabsByteCode-MSIL.Backdoor.AsyncRAT
              xjXIE2ZFFSw4.exe100%AviraHEUR/AGEN.1307453
              xjXIE2ZFFSw4.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\FULL.exe100%AviraHEUR/AGEN.1307453
              C:\Users\user\AppData\Roaming\FULL.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\FULL.exe76%ReversingLabsByteCode-MSIL.Backdoor.AsyncRAT
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              rusia.duckdns.org
              46.246.14.10
              truetrue
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namexjXIE2ZFFSw4.exe, 00000000.00000002.1661055131.0000000002BFA000.00000004.00000800.00020000.00000000.sdmp, FULL.exe, 00000007.00000002.2880963232.0000000003548000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  46.246.14.10
                  rusia.duckdns.orgSweden
                  42708PORTLANEwwwportlanecomSEtrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1430613
                  Start date and time:2024-04-24 00:20:05 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 5m 29s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:14
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:xjXIE2ZFFSw4.exe
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@15/5@2/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 97%
                  • Number of executed functions: 24
                  • Number of non-executed functions: 3
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • VT rate limit hit for: xjXIE2ZFFSw4.exe
                  TimeTypeDescription
                  23:20:57Task SchedulerRun new task: FULL path: "C:\Users\user\AppData\Roaming\FULL.exe"
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  46.246.14.10xw8oKxLrOnt6.exeGet hashmaliciousRemcosBrowse
                    bPbV.exeGet hashmaliciousNjratBrowse
                      bOVV.exeGet hashmaliciousNjratBrowse
                        bOX1.exeGet hashmaliciousNjratBrowse
                          bOYE.exeGet hashmaliciousNjratBrowse
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            rusia.duckdns.orgxyyDAUDPeYEH.exeGet hashmaliciousNjratBrowse
                            • 46.246.6.20
                            x7RZVIWaDKb5.exeGet hashmaliciousNjratBrowse
                            • 46.246.14.17
                            x7RZVIWaDKb5.exeGet hashmaliciousNjratBrowse
                            • 46.246.14.17
                            bUBL.exeGet hashmaliciousNjratBrowse
                            • 46.246.14.17
                            x6Xw7vcuD9zM.exeGet hashmaliciousNjratBrowse
                            • 46.246.14.23
                            bTAB.exeGet hashmaliciousNjratBrowse
                            • 46.246.80.3
                            xbd0vU3xnyOS.exeGet hashmaliciousNjratBrowse
                            • 46.246.6.7
                            x38kbgLd6bPu.exeGet hashmaliciousNjratBrowse
                            • 46.246.12.24
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            PORTLANEwwwportlanecomSEBitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                            • 188.126.94.80
                            xVcsGL5R1Nbh.exeGet hashmaliciousNjratBrowse
                            • 46.246.6.20
                            xyyDAUDPeYEH.exeGet hashmaliciousNjratBrowse
                            • 46.246.6.20
                            xzcQo6GenFVf.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                            • 46.246.14.5
                            tajma.x86-20240422-0535.elfGet hashmaliciousMirai, OkiruBrowse
                            • 188.126.69.245
                            x7RZVIWaDKb5.exeGet hashmaliciousNjratBrowse
                            • 46.246.14.17
                            x7RZVIWaDKb5.exeGet hashmaliciousNjratBrowse
                            • 46.246.14.17
                            bUBL.exeGet hashmaliciousNjratBrowse
                            • 46.246.14.17
                            bUBD.exeGet hashmaliciousNjratBrowse
                            • 46.246.14.22
                            xutnF2gKGTTy.exeGet hashmaliciousAsyncRATBrowse
                            • 46.246.4.3
                            No context
                            No context
                            Process:C:\Users\user\AppData\Roaming\FULL.exe
                            File Type:CSV text
                            Category:dropped
                            Size (bytes):642
                            Entropy (8bit):5.349816875832946
                            Encrypted:false
                            SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6KhaWzAbDLI4MNepQZav:ML9E4KQwKDE4KGKZI6KhBsXE4Npv
                            MD5:55835A31031747B565CBC66334D871A1
                            SHA1:AF3A9B50351E526BCF1E92439582879058C5B61E
                            SHA-256:24767E6188A6BFB1E67FFE50E07D8637386463A8101E06B397B3DA6DF18CEBCD
                            SHA-512:65A2E4918D74455BEC6143AAD22234C4E5273B4F45D671933D64D45A76AEEEE8A82CFEBDDF774E2E8956BEEA5EB6DE903BF790D8112E67929D848E51A6185604
                            Malicious:false
                            Reputation:low
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Management\8af759007c012da690062882e06694f1\System.Management.ni.dll",0..
                            Process:C:\Users\user\Desktop\xjXIE2ZFFSw4.exe
                            File Type:CSV text
                            Category:dropped
                            Size (bytes):642
                            Entropy (8bit):5.349816875832946
                            Encrypted:false
                            SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6KhaWzAbDLI4MNepQZav:ML9E4KQwKDE4KGKZI6KhBsXE4Npv
                            MD5:55835A31031747B565CBC66334D871A1
                            SHA1:AF3A9B50351E526BCF1E92439582879058C5B61E
                            SHA-256:24767E6188A6BFB1E67FFE50E07D8637386463A8101E06B397B3DA6DF18CEBCD
                            SHA-512:65A2E4918D74455BEC6143AAD22234C4E5273B4F45D671933D64D45A76AEEEE8A82CFEBDDF774E2E8956BEEA5EB6DE903BF790D8112E67929D848E51A6185604
                            Malicious:false
                            Reputation:low
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Management\8af759007c012da690062882e06694f1\System.Management.ni.dll",0..
                            Process:C:\Users\user\Desktop\xjXIE2ZFFSw4.exe
                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):148
                            Entropy (8bit):5.071644389251521
                            Encrypted:false
                            SSDEEP:3:mKDDCMNqTtvL5ot+kiEaKC5MrVymqRDt+kiE2J5xAInTRIJ7HVZPy:hWKqTtT6wknaZ5Mrsmq1wkn23fTWVk
                            MD5:B993F8D6A94B04A2B2F3F97F165E4A58
                            SHA1:A02349D1054A14A2A3638A0C78468D4C4DB6DCFE
                            SHA-256:D13E45A58796A77AA5D2C6F45487365929EA0DFBCD1DC488AF9B2851E152211B
                            SHA-512:7FEC3DAF4D053DD34F95E06F587927376942A41049E5072F35AB5CFFA4CF4696780B0B12ACCF6B00D8FD7942BB08804F02211D31D558B0078C274CF6F1DED36A
                            Malicious:false
                            Reputation:low
                            Preview:@echo off..timeout 3 > NUL..START "" "C:\Users\user\AppData\Roaming\FULL.exe"..CD C:\Users\user\AppData\Local\Temp\..DEL "tmpF256.tmp.bat" /f /q..
                            Process:C:\Users\user\Desktop\xjXIE2ZFFSw4.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):64512
                            Entropy (8bit):5.825885449011946
                            Encrypted:false
                            SSDEEP:1536:FBtb3plA0aTdeKvR9GVyGbbuwk2iGRZVclN:FBtb3plA0aTRvR0kGbbudWzY
                            MD5:231E83DA0623F80D134940CC17528EB3
                            SHA1:99E2C48F98984B2802E62F8E54EC5773088E6B13
                            SHA-256:EC722B1E3FDF6F67C84676D86E717A7BD559F0EB0E28E53F6BCACC97581D6654
                            SHA-512:A04A6261D0F06130D19C9E2C753FAB53E55579E630D645AD9EBD5C392932C79C089CA3E6CFAA03AA056607023B607303A7B37B4A9FC6E700F8605E152F252328
                            Malicious:true
                            Yara Hits:
                            • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Roaming\FULL.exe, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice, Description: Detects executables attemping to enumerate video devices using WMI, Source: C:\Users\user\AppData\Roaming\FULL.exe, Author: ditekSHen
                            • Rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy, Description: Detects executables containing the string DcRatBy, Source: C:\Users\user\AppData\Roaming\FULL.exe, Author: ditekSHen
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 76%
                            Reputation:low
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a................................. ... ....@.. .......................`............@.................................\...O.... .......................@....................................................... ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H........e..|............................................................W......H3.......W......3........./.\.....(....*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.~....*.......*.~....*.......*.~....*.......**.(C......*2~.....oD...*.s....%r...po....(h...r...p(....o....o....o....( ... ....(....*.s....%r...po....r...po....%r...po.....o....o....( ...*Vs.........si........*.~"...*..."...*F.(+...~!...o....*&...o.
                            Process:C:\Windows\System32\timeout.exe
                            File Type:ASCII text, with CRLF line terminators, with overstriking
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.41440934524794
                            Encrypted:false
                            SSDEEP:3:hYFqdLGAR+mQRKVxLZXt0sn:hYFqGaNZKsn
                            MD5:3DD7DD37C304E70A7316FE43B69F421F
                            SHA1:A3754CFC33E9CA729444A95E95BCB53384CB51E4
                            SHA-256:4FA27CE1D904EA973430ADC99062DCF4BAB386A19AB0F8D9A4185FA99067F3AA
                            SHA-512:713533E973CF0FD359AC7DB22B1399392C86D9FD1E715248F5724AAFBBF0EEB5EAC0289A0E892167EB559BE976C2AD0A0A0D8EFC407FFAF5B3C3A32AA9A0AAA4
                            Malicious:false
                            Preview:..Waiting for 3 seconds, press a key to continue ....2.1.0..
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):5.825885449011946
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                            • Win32 Executable (generic) a (10002005/4) 49.75%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Windows Screen Saver (13104/52) 0.07%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            File name:xjXIE2ZFFSw4.exe
                            File size:64'512 bytes
                            MD5:231e83da0623f80d134940cc17528eb3
                            SHA1:99e2c48f98984b2802e62f8e54ec5773088e6b13
                            SHA256:ec722b1e3fdf6f67c84676d86e717a7bd559f0eb0e28e53f6bcacc97581d6654
                            SHA512:a04a6261d0f06130d19c9e2c753fab53e55579e630d645ad9ebd5c392932c79c089ca3e6cfaa03aa056607023b607303a7b37b4a9fc6e700f8605e152f252328
                            SSDEEP:1536:FBtb3plA0aTdeKvR9GVyGbbuwk2iGRZVclN:FBtb3plA0aTRvR0kGbbudWzY
                            TLSH:83535B00279CC965E2AD4AF8BCF2950146B1C9772102DA5E7CC814DB6B9FFC64A123FE
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a................................. ... ....@.. .......................`............@................................
                            Icon Hash:90cececece8e8eb0
                            Entrypoint:0x4109ae
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x61CAEDB8 [Tue Dec 28 10:58:00 2021 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x1095c0x4f.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000xdf7.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x140000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000xe9b40xea00e3729c70e0a03a9468a36df865e30103False0.492588141025641data5.8593627761280365IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0x120000xdf70xe006abcb87f121c4b14112361dcefec0ef9False0.40122767857142855data5.110115746826057IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x140000xc0x200b1388e694154bf6e19835a68482b6ee3False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_VERSION0x120a00x2d4data0.4350828729281768
                            RT_MANIFEST0x123740xa83XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.40245261984392416
                            DLLImport
                            mscoree.dll_CorExeMain
                            TimestampSource PortDest PortSource IPDest IP
                            Apr 24, 2024 00:21:00.927364111 CEST497301993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:01.359601974 CEST19934973046.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:01.862138033 CEST497301993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:02.342142105 CEST19934973046.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:02.846611977 CEST497301993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:03.361687899 CEST19934973046.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:03.862139940 CEST497301993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:04.298540115 CEST19934973046.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:04.799644947 CEST497301993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:05.216152906 CEST19934973046.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:10.264822960 CEST497311993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:10.783751965 CEST19934973146.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:11.283997059 CEST497311993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:11.704761028 CEST19934973146.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:12.208487988 CEST497311993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:12.704704046 CEST19934973146.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:13.205907106 CEST497311993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:13.674380064 CEST19934973146.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:14.174633026 CEST497311993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:14.657335043 CEST19934973146.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:19.660396099 CEST497381993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:20.105123043 CEST19934973846.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:20.612176895 CEST497381993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:21.007555962 CEST19934973846.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:21.518482924 CEST497381993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:21.916994095 CEST19934973846.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:22.424686909 CEST497381993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:22.897321939 CEST19934973846.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:23.409111977 CEST497381993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:23.881187916 CEST19934973846.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:28.894610882 CEST497391993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:29.374242067 CEST19934973946.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:29.877783060 CEST497391993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:30.335619926 CEST19934973946.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:30.846566916 CEST497391993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:31.275182009 CEST19934973946.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:31.784148932 CEST497391993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:32.225373030 CEST19934973946.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:32.737202883 CEST497391993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:33.208398104 CEST19934973946.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:38.222635031 CEST497401993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:38.702404976 CEST19934974046.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:39.205915928 CEST497401993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:39.668797970 CEST19934974046.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:40.174690008 CEST497401993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:40.604600906 CEST19934974046.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:41.112211943 CEST497401993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:41.530150890 CEST19934974046.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:42.034046888 CEST497401993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:42.497343063 CEST19934974046.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:47.503839970 CEST497411993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:47.992697001 CEST19934974146.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:48.502810001 CEST497411993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:48.958600998 CEST19934974146.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:49.471615076 CEST497411993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:49.946408033 CEST19934974146.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:50.455929041 CEST497411993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:50.893457890 CEST19934974146.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:51.409046888 CEST497411993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:51.910841942 CEST19934974146.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:56.925884962 CEST497431993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:57.404757977 CEST19934974346.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:57.909204960 CEST497431993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:58.310458899 CEST19934974346.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:58.815351963 CEST497431993192.168.2.446.246.14.10
                            Apr 24, 2024 00:21:59.241559982 CEST19934974346.246.14.10192.168.2.4
                            Apr 24, 2024 00:21:59.752953053 CEST497431993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:00.238116026 CEST19934974346.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:00.752815962 CEST497431993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:01.184041023 CEST19934974346.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:06.568893909 CEST497441993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:07.056308031 CEST19934974446.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:07.565326929 CEST497441993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:08.010200024 CEST19934974446.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:08.518476963 CEST497441993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:08.934366941 CEST19934974446.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:09.440520048 CEST497441993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:09.945023060 CEST19934974446.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:10.455949068 CEST497441993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:10.952145100 CEST19934974446.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:15.958380938 CEST497451993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:16.386327982 CEST19934974546.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:16.893609047 CEST497451993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:17.374826908 CEST19934974546.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:17.880045891 CEST497451993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:18.428427935 CEST19934974546.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:18.940581083 CEST497451993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:19.432857990 CEST19934974546.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:19.940453053 CEST497451993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:20.415724039 CEST19934974546.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:26.336668968 CEST497461993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:26.822957993 CEST19934974646.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:27.331048012 CEST497461993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:27.792258978 CEST19934974646.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:28.299756050 CEST497461993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:28.778945923 CEST19934974646.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:29.284157991 CEST497461993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:29.763557911 CEST19934974646.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:30.268685102 CEST497461993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:30.727788925 CEST19934974646.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:35.738709927 CEST497471993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:36.140537024 CEST19934974746.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:36.643506050 CEST497471993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:37.061086893 CEST19934974746.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:37.565406084 CEST497471993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:37.971230984 CEST19934974746.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:38.487369061 CEST497471993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:38.964709997 CEST19934974746.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:39.471693039 CEST497471993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:39.964049101 CEST19934974746.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:44.979595900 CEST497481993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:45.379686117 CEST19934974846.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:45.893712044 CEST497481993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:46.290133953 CEST19934974846.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:46.799812078 CEST497481993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:47.213186026 CEST19934974846.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:47.721756935 CEST497481993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:48.116842031 CEST19934974846.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:48.627939939 CEST497481993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:49.016241074 CEST19934974846.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:54.020977020 CEST497491993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:54.471116066 CEST19934974946.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:54.987315893 CEST497491993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:55.399317980 CEST19934974946.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:55.909197092 CEST497491993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:56.374089956 CEST19934974946.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:56.877937078 CEST497491993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:57.336500883 CEST19934974946.246.14.10192.168.2.4
                            Apr 24, 2024 00:22:57.846710920 CEST497491993192.168.2.446.246.14.10
                            Apr 24, 2024 00:22:58.375329971 CEST19934974946.246.14.10192.168.2.4
                            TimestampSource PortDest PortSource IPDest IP
                            Apr 24, 2024 00:21:00.686517000 CEST5314853192.168.2.41.1.1.1
                            Apr 24, 2024 00:21:00.921545029 CEST53531481.1.1.1192.168.2.4
                            Apr 24, 2024 00:22:06.333283901 CEST4983853192.168.2.41.1.1.1
                            Apr 24, 2024 00:22:06.567931890 CEST53498381.1.1.1192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Apr 24, 2024 00:21:00.686517000 CEST192.168.2.41.1.1.10x258bStandard query (0)rusia.duckdns.orgA (IP address)IN (0x0001)false
                            Apr 24, 2024 00:22:06.333283901 CEST192.168.2.41.1.1.10x4460Standard query (0)rusia.duckdns.orgA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Apr 24, 2024 00:21:00.921545029 CEST1.1.1.1192.168.2.40x258bNo error (0)rusia.duckdns.org46.246.14.10A (IP address)IN (0x0001)false
                            Apr 24, 2024 00:22:06.567931890 CEST1.1.1.1192.168.2.40x4460No error (0)rusia.duckdns.org46.246.14.10A (IP address)IN (0x0001)false

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:00:20:52
                            Start date:24/04/2024
                            Path:C:\Users\user\Desktop\xjXIE2ZFFSw4.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\xjXIE2ZFFSw4.exe"
                            Imagebase:0x730000
                            File size:64'512 bytes
                            MD5 hash:231E83DA0623F80D134940CC17528EB3
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.1631861328.0000000000732000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.1661055131.0000000002C00000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 00000000.00000002.1661055131.0000000002C16000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.1661055131.0000000002C16000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.1660448779.0000000000B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.1661055131.0000000002A61000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Reputation:low
                            Has exited:true

                            Target ID:1
                            Start time:00:20:55
                            Start date:24/04/2024
                            Path:C:\Windows\System32\cmd.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"' & exit
                            Imagebase:0x7ff6f21c0000
                            File size:289'792 bytes
                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:2
                            Start time:00:20:55
                            Start date:24/04/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:3
                            Start time:00:20:55
                            Start date:24/04/2024
                            Path:C:\Windows\System32\cmd.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpF256.tmp.bat""
                            Imagebase:0x7ff6f21c0000
                            File size:289'792 bytes
                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:00:20:55
                            Start date:24/04/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:5
                            Start time:00:20:55
                            Start date:24/04/2024
                            Path:C:\Windows\System32\schtasks.exe
                            Wow64 process (32bit):false
                            Commandline:schtasks /create /f /sc onlogon /rl highest /tn "FULL" /tr '"C:\Users\user\AppData\Roaming\FULL.exe"'
                            Imagebase:0x7ff76f990000
                            File size:235'008 bytes
                            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:6
                            Start time:00:20:55
                            Start date:24/04/2024
                            Path:C:\Windows\System32\timeout.exe
                            Wow64 process (32bit):false
                            Commandline:timeout 3
                            Imagebase:0x7ff65a1b0000
                            File size:32'768 bytes
                            MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:7
                            Start time:00:20:57
                            Start date:24/04/2024
                            Path:C:\Users\user\AppData\Roaming\FULL.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Users\user\AppData\Roaming\FULL.exe
                            Imagebase:0xb30000
                            File size:64'512 bytes
                            MD5 hash:231E83DA0623F80D134940CC17528EB3
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000007.00000002.2880963232.0000000003021000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000007.00000002.2879895307.0000000001011000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 00000007.00000002.2880963232.000000000302D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000007.00000002.2880963232.000000000302D000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Roaming\FULL.exe, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice, Description: Detects executables attemping to enumerate video devices using WMI, Source: C:\Users\user\AppData\Roaming\FULL.exe, Author: ditekSHen
                            • Rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy, Description: Detects executables containing the string DcRatBy, Source: C:\Users\user\AppData\Roaming\FULL.exe, Author: ditekSHen
                            Antivirus matches:
                            • Detection: 100%, Avira
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 76%, ReversingLabs
                            Reputation:low
                            Has exited:false

                            Target ID:8
                            Start time:00:20:58
                            Start date:24/04/2024
                            Path:C:\Users\user\AppData\Roaming\FULL.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\AppData\Roaming\FULL.exe"
                            Imagebase:0xe90000
                            File size:64'512 bytes
                            MD5 hash:231E83DA0623F80D134940CC17528EB3
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000008.00000002.1709688213.00000000013CC000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000008.00000002.1710297798.0000000003041000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 00000008.00000002.1710297798.000000000304D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000008.00000002.1710297798.000000000304D000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Reputation:low
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:18.3%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:44.9%
                              Total number of Nodes:49
                              Total number of Limit Nodes:3
                              execution_graph 3398 7ffd9b8a7b55 3399 7ffd9b8a7b5f 3398->3399 3402 7ffd9b8a04b8 3399->3402 3401 7ffd9b8a7c4c 3404 7ffd9b8a7da0 3402->3404 3403 7ffd9b8a7f0b 3403->3401 3404->3403 3407 7ffd9b8a7420 3404->3407 3406 7ffd9b8a812f 3406->3401 3408 7ffd9b8a81e0 3407->3408 3414 7ffd9b8a7408 3408->3414 3410 7ffd9b8a81f6 3410->3406 3411 7ffd9b8a81f1 3411->3410 3419 7ffd9b8a7418 3411->3419 3413 7ffd9b8a8294 3413->3406 3415 7ffd9b8a8270 3414->3415 3416 7ffd9b8a7418 NtProtectVirtualMemory 3415->3416 3418 7ffd9b8a829c 3415->3418 3417 7ffd9b8a8294 3416->3417 3417->3411 3421 7ffd9b8a84b0 3419->3421 3420 7ffd9b8a861b 3420->3413 3421->3420 3422 7ffd9b8a87a4 NtProtectVirtualMemory 3421->3422 3423 7ffd9b8a87e5 3422->3423 3423->3413 3435 7ffd9b8a8708 3436 7ffd9b8a870f NtProtectVirtualMemory 3435->3436 3438 7ffd9b8a87e5 3436->3438 3431 7ffd9b8a7ff8 3432 7ffd9b8a8000 3431->3432 3433 7ffd9b8a7420 NtProtectVirtualMemory 3432->3433 3434 7ffd9b8a812f 3433->3434 3424 7ffd9b8a7c7c 3427 7ffd9b8a7430 3424->3427 3428 7ffd9b8a8000 3427->3428 3429 7ffd9b8a7420 NtProtectVirtualMemory 3428->3429 3430 7ffd9b8a7c87 3429->3430 3439 7ffd9b8a744d 3441 7ffd9b8a7457 3439->3441 3440 7ffd9b8a73ff 3441->3440 3442 7ffd9b8a7420 NtProtectVirtualMemory 3441->3442 3443 7ffd9b8a812f 3442->3443 3444 7ffd9b8a7d8d 3446 7ffd9b8a7da0 3444->3446 3445 7ffd9b8a7f0b 3446->3445 3447 7ffd9b8a7420 NtProtectVirtualMemory 3446->3447 3448 7ffd9b8a812f 3447->3448 3454 7ffd9b8a847e 3456 7ffd9b8a84af 3454->3456 3455 7ffd9b8a861b 3456->3455 3457 7ffd9b8a87a4 NtProtectVirtualMemory 3456->3457 3458 7ffd9b8a87e5 3457->3458

                              Control-flow Graph

                              Memory Dump Source
                              • Source File: 00000000.00000002.1665787514.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ffd9b8a0000_xjXIE2ZFFSw4.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c9d82b24f36b2c5ee425dbc0b767a3a54e553ed839866c74f8d85b5e625d359a
                              • Instruction ID: f4c263bc0c94faadbc55bfe45bc482ccbd418ebe55316afae3ae00f3ebb86363
                              • Opcode Fuzzy Hash: c9d82b24f36b2c5ee425dbc0b767a3a54e553ed839866c74f8d85b5e625d359a
                              • Instruction Fuzzy Hash: C4C14831E0CA0D4FE72DEB6898266F977E1EF99310F44417ED45AC31DAEE2868078791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 148 7ffd9b8a8708-7ffd9b8a87e3 NtProtectVirtualMemory 153 7ffd9b8a87e5 148->153 154 7ffd9b8a87eb-7ffd9b8a8816 148->154 153->154
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1665787514.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ffd9b8a0000_xjXIE2ZFFSw4.jbxd
                              Similarity
                              • API ID: MemoryProtectVirtual
                              • String ID:
                              • API String ID: 2706961497-0
                              • Opcode ID: 9bcc4dc18577248d41b7f47d7d0d92544910e75f818dda8f48d7917facc0de07
                              • Instruction ID: 7a87d1f70402374b3ab96592078dce3dd5f84a488bc3b45e1d58c29d38a7dc05
                              • Opcode Fuzzy Hash: 9bcc4dc18577248d41b7f47d7d0d92544910e75f818dda8f48d7917facc0de07
                              • Instruction Fuzzy Hash: B431B331A1CB4C8FDB5CDB5CA8166ED77E1EB98320F00426FE04DD3296DA74A9458BC1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 260 7ffd9b8a5d66-7ffd9b8a5d73 261 7ffd9b8a5d75-7ffd9b8a5d7d 260->261 262 7ffd9b8a5d7e-7ffd9b8a5e47 260->262 261->262 265 7ffd9b8a5e49-7ffd9b8a5e52 262->265 266 7ffd9b8a5eb3 262->266 265->266 267 7ffd9b8a5e54-7ffd9b8a5e60 265->267 268 7ffd9b8a5eb5-7ffd9b8a5eda 266->268 269 7ffd9b8a5e99-7ffd9b8a5eb1 267->269 270 7ffd9b8a5e62-7ffd9b8a5e74 267->270 274 7ffd9b8a5f46 268->274 275 7ffd9b8a5edc-7ffd9b8a5ee5 268->275 269->268 272 7ffd9b8a5e76 270->272 273 7ffd9b8a5e78-7ffd9b8a5e8b 270->273 272->273 273->273 276 7ffd9b8a5e8d-7ffd9b8a5e95 273->276 278 7ffd9b8a5f48-7ffd9b8a5ff0 274->278 275->274 277 7ffd9b8a5ee7-7ffd9b8a5ef3 275->277 276->269 279 7ffd9b8a5ef5-7ffd9b8a5f07 277->279 280 7ffd9b8a5f2c-7ffd9b8a5f44 277->280 289 7ffd9b8a605e 278->289 290 7ffd9b8a5ff2-7ffd9b8a5ffc 278->290 281 7ffd9b8a5f09 279->281 282 7ffd9b8a5f0b-7ffd9b8a5f1e 279->282 280->278 281->282 282->282 284 7ffd9b8a5f20-7ffd9b8a5f28 282->284 284->280 292 7ffd9b8a6060-7ffd9b8a6089 289->292 290->289 291 7ffd9b8a5ffe-7ffd9b8a600b 290->291 293 7ffd9b8a600d-7ffd9b8a601f 291->293 294 7ffd9b8a6044-7ffd9b8a605c 291->294 299 7ffd9b8a608b-7ffd9b8a6096 292->299 300 7ffd9b8a60f3 292->300 295 7ffd9b8a6021 293->295 296 7ffd9b8a6023-7ffd9b8a6036 293->296 294->292 295->296 296->296 298 7ffd9b8a6038-7ffd9b8a6040 296->298 298->294 299->300 302 7ffd9b8a6098-7ffd9b8a60a6 299->302 301 7ffd9b8a60f5-7ffd9b8a6186 300->301 310 7ffd9b8a618c-7ffd9b8a619b 301->310 303 7ffd9b8a60a8-7ffd9b8a60ba 302->303 304 7ffd9b8a60df-7ffd9b8a60f1 302->304 305 7ffd9b8a60bc 303->305 306 7ffd9b8a60be-7ffd9b8a60d1 303->306 304->301 305->306 306->306 308 7ffd9b8a60d3-7ffd9b8a60db 306->308 308->304 311 7ffd9b8a619d 310->311 312 7ffd9b8a61a3-7ffd9b8a6208 call 7ffd9b8a6224 310->312 311->312 319 7ffd9b8a620a 312->319 320 7ffd9b8a620f-7ffd9b8a6223 312->320 319->320
                              Memory Dump Source
                              • Source File: 00000000.00000002.1665787514.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ffd9b8a0000_xjXIE2ZFFSw4.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 56423adde24acd2833670a8dad534373116d9fff71c2404d1e83a9455164d82d
                              • Instruction ID: 7bdd2d656b8dc4f0aee64b2d317557b2fdb1ad3934a906236fa8347fd6f4b43b
                              • Opcode Fuzzy Hash: 56423adde24acd2833670a8dad534373116d9fff71c2404d1e83a9455164d82d
                              • Instruction Fuzzy Hash: C6F1C770A09A4D8FEBA8DF28C855BE977E1FF58310F04426EE85DC7295DF3499818B81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 321 7ffd9b8a6b12-7ffd9b8a6b1f 322 7ffd9b8a6b2a-7ffd9b8a6bf7 321->322 323 7ffd9b8a6b21-7ffd9b8a6b29 321->323 327 7ffd9b8a6bf9-7ffd9b8a6c02 322->327 328 7ffd9b8a6c63 322->328 323->322 327->328 329 7ffd9b8a6c04-7ffd9b8a6c10 327->329 330 7ffd9b8a6c65-7ffd9b8a6c8a 328->330 331 7ffd9b8a6c49-7ffd9b8a6c61 329->331 332 7ffd9b8a6c12-7ffd9b8a6c24 329->332 336 7ffd9b8a6cf6 330->336 337 7ffd9b8a6c8c-7ffd9b8a6c95 330->337 331->330 334 7ffd9b8a6c26 332->334 335 7ffd9b8a6c28-7ffd9b8a6c3b 332->335 334->335 335->335 338 7ffd9b8a6c3d-7ffd9b8a6c45 335->338 340 7ffd9b8a6cf8-7ffd9b8a6d1d 336->340 337->336 339 7ffd9b8a6c97-7ffd9b8a6ca3 337->339 338->331 341 7ffd9b8a6ca5-7ffd9b8a6cb7 339->341 342 7ffd9b8a6cdc-7ffd9b8a6cf4 339->342 347 7ffd9b8a6d8b 340->347 348 7ffd9b8a6d1f-7ffd9b8a6d29 340->348 343 7ffd9b8a6cb9 341->343 344 7ffd9b8a6cbb-7ffd9b8a6cce 341->344 342->340 343->344 344->344 346 7ffd9b8a6cd0-7ffd9b8a6cd8 344->346 346->342 349 7ffd9b8a6d8d-7ffd9b8a6dbb 347->349 348->347 350 7ffd9b8a6d2b-7ffd9b8a6d38 348->350 357 7ffd9b8a6e2b 349->357 358 7ffd9b8a6dbd-7ffd9b8a6dc8 349->358 351 7ffd9b8a6d3a-7ffd9b8a6d4c 350->351 352 7ffd9b8a6d71-7ffd9b8a6d89 350->352 353 7ffd9b8a6d4e 351->353 354 7ffd9b8a6d50-7ffd9b8a6d63 351->354 352->349 353->354 354->354 356 7ffd9b8a6d65-7ffd9b8a6d6d 354->356 356->352 359 7ffd9b8a6e2d-7ffd9b8a6f05 357->359 358->357 360 7ffd9b8a6dca-7ffd9b8a6dd8 358->360 370 7ffd9b8a6f0b-7ffd9b8a6f1a 359->370 361 7ffd9b8a6dda-7ffd9b8a6dec 360->361 362 7ffd9b8a6e11-7ffd9b8a6e29 360->362 364 7ffd9b8a6dee 361->364 365 7ffd9b8a6df0-7ffd9b8a6e03 361->365 362->359 364->365 365->365 367 7ffd9b8a6e05-7ffd9b8a6e0d 365->367 367->362 371 7ffd9b8a6f1c 370->371 372 7ffd9b8a6f22-7ffd9b8a6f84 call 7ffd9b8a6fa0 370->372 371->372 379 7ffd9b8a6f86 372->379 380 7ffd9b8a6f8b-7ffd9b8a6f9f 372->380 379->380
                              Memory Dump Source
                              • Source File: 00000000.00000002.1665787514.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ffd9b8a0000_xjXIE2ZFFSw4.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e824393bad76764ce350ffcdc3572a0085fddaaabf5cc96cbf2f88a2073f6742
                              • Instruction ID: 94a45c12613f6a0151621a340ece140a129be24aa7fe86fdf81ac9babcca309f
                              • Opcode Fuzzy Hash: e824393bad76764ce350ffcdc3572a0085fddaaabf5cc96cbf2f88a2073f6742
                              • Instruction Fuzzy Hash: 73E1D570A09A4D8FEBA8DF28C8657E977E1FF58310F04426ED84DC7295DF74A9418B81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1665787514.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ffd9b8a0000_xjXIE2ZFFSw4.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 888c65a30d67acf69043d46820a7a5e4ae5351785fa4dc662934aa77e83e54f4
                              • Instruction ID: 9373c4e5a02d19c6b822b02ec3ab51fe13ceea65765c2b15c0557083491c2aa2
                              • Opcode Fuzzy Hash: 888c65a30d67acf69043d46820a7a5e4ae5351785fa4dc662934aa77e83e54f4
                              • Instruction Fuzzy Hash: 1ED15621F0DA494FF72DAB6898665B977D1EF99310B04417EE49AC31EBED2878038391
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1665787514.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ffd9b8a0000_xjXIE2ZFFSw4.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a539f5738dd3b36994e7642b8aae479c7b39b984163811ac343aa0ebbcb5e797
                              • Instruction ID: 850af5916dad7896007a2a2ba3cbfdd3b3d69c7c393a53dc021dd0babc6adb38
                              • Opcode Fuzzy Hash: a539f5738dd3b36994e7642b8aae479c7b39b984163811ac343aa0ebbcb5e797
                              • Instruction Fuzzy Hash: B9513231E0DB494AE32ABBB18C654FA77E1EF99210B44447ED497C34DBED28B4078252
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1665787514.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ffd9b8a0000_xjXIE2ZFFSw4.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f6a2add857d59da24138b609c01089e6c1daf692ad1478f6fc543d7e2ece03f7
                              • Instruction ID: d586edc954e10b2a7de69623416d10b5e46713452eedaf848a6166832c137577
                              • Opcode Fuzzy Hash: f6a2add857d59da24138b609c01089e6c1daf692ad1478f6fc543d7e2ece03f7
                              • Instruction Fuzzy Hash: 5E411531E18A094AE72DFB618C665FA73E1EF58314F44443ED49BC34DAED38B5078682
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Execution Graph

                              Execution Coverage:18.3%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:58
                              Total number of Limit Nodes:4
                              execution_graph 3855 7ffd9b8b8708 3856 7ffd9b8b870f NtProtectVirtualMemory 3855->3856 3858 7ffd9b8b87e5 3856->3858 3802 7ffd9b8b7b55 3803 7ffd9b8b7b5f 3802->3803 3806 7ffd9b8b04b8 3803->3806 3805 7ffd9b8b7c4c 3808 7ffd9b8b7da0 3806->3808 3807 7ffd9b8b7f0b 3807->3805 3808->3807 3811 7ffd9b8b7420 3808->3811 3810 7ffd9b8b812f 3810->3805 3812 7ffd9b8b81e0 3811->3812 3818 7ffd9b8b7408 3812->3818 3814 7ffd9b8b81f1 3817 7ffd9b8b81f6 3814->3817 3823 7ffd9b8b7418 3814->3823 3816 7ffd9b8b8294 3816->3810 3817->3810 3819 7ffd9b8b8270 3818->3819 3820 7ffd9b8b7418 NtProtectVirtualMemory 3819->3820 3822 7ffd9b8b829c 3819->3822 3821 7ffd9b8b8294 3820->3821 3821->3814 3822->3814 3825 7ffd9b8b84b0 3823->3825 3824 7ffd9b8b861b 3824->3816 3825->3824 3826 7ffd9b8b87a4 NtProtectVirtualMemory 3825->3826 3827 7ffd9b8b87e5 3826->3827 3827->3816 3851 7ffd9b8b7415 3852 7ffd9b8b7421 3851->3852 3853 7ffd9b8b7420 NtProtectVirtualMemory 3852->3853 3854 7ffd9b8b812f 3853->3854 3828 7ffd9b8b7c7c 3831 7ffd9b8b7430 3828->3831 3832 7ffd9b8b8000 3831->3832 3833 7ffd9b8b7420 NtProtectVirtualMemory 3832->3833 3834 7ffd9b8b7c87 3833->3834 3859 7ffd9b8b744d 3861 7ffd9b8b73ff 3859->3861 3860 7ffd9b8b7464 3861->3860 3862 7ffd9b8b7420 NtProtectVirtualMemory 3861->3862 3863 7ffd9b8b812f 3862->3863 3873 7ffd9b8b847e 3875 7ffd9b8b84af 3873->3875 3874 7ffd9b8b861b 3875->3874 3876 7ffd9b8b87a4 NtProtectVirtualMemory 3875->3876 3877 7ffd9b8b87e5 3876->3877 3864 7ffd9b8b965d 3865 7ffd9b8b968f 3864->3865 3866 7ffd9b8b74f0 NtProtectVirtualMemory 3865->3866 3867 7ffd9b8b9cb8 3865->3867 3866->3865 3835 7ffd9b8b0bb1 3836 7ffd9b8b0bcf 3835->3836 3838 7ffd9b8b0620 3836->3838 3839 7ffd9b8b9690 3838->3839 3841 7ffd9b8b9cb8 3839->3841 3842 7ffd9b8b74f0 3839->3842 3841->3836 3844 7ffd9b8b73ff 3842->3844 3843 7ffd9b8b7464 3843->3839 3844->3843 3845 7ffd9b8b7420 NtProtectVirtualMemory 3844->3845 3846 7ffd9b8b812f 3845->3846 3846->3839

                              Control-flow Graph

                              Memory Dump Source
                              • Source File: 00000007.00000002.2890201364.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_7ffd9b8b0000_FULL.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4dd7834e23a39fa11d29bac8ba648241efa7edd9452ee47092491d2baeb2b760
                              • Instruction ID: b694c71774a9cfbad8bc88f29105e5ec1e6669de1eec19787f1753921094f901
                              • Opcode Fuzzy Hash: 4dd7834e23a39fa11d29bac8ba648241efa7edd9452ee47092491d2baeb2b760
                              • Instruction Fuzzy Hash: 6BC11831E0CA0D4FE72DAB7898666FA77E1EF99310F04417ED45AC31DADE2868078781
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 148 7ffd9b8b8708-7ffd9b8b87e3 NtProtectVirtualMemory 153 7ffd9b8b87e5 148->153 154 7ffd9b8b87eb-7ffd9b8b8816 148->154 153->154
                              APIs
                              Memory Dump Source
                              • Source File: 00000007.00000002.2890201364.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_7_2_7ffd9b8b0000_FULL.jbxd
                              Similarity
                              • API ID: MemoryProtectVirtual
                              • String ID:
                              • API String ID: 2706961497-0
                              • Opcode ID: 22eea38f2f0d70449b339aa630a95c665c9df49eade625dd0150f0ec411f3b30
                              • Instruction ID: 2def842cec042165d48fcdccfdf9d1222ef4da15783f207aaf866525d11a62a8
                              • Opcode Fuzzy Hash: 22eea38f2f0d70449b339aa630a95c665c9df49eade625dd0150f0ec411f3b30
                              • Instruction Fuzzy Hash: 0931B331A1CB5C8FDB1C9B5CA8166ED77E1EB98320F00426FE04ED3296DA70A9458BC1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Execution Graph

                              Execution Coverage:19.9%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:42
                              Total number of Limit Nodes:3
                              execution_graph 2673 7ffd9b8a7485 2675 7ffd9b8a7447 2673->2675 2674 7ffd9b8a73ff 2675->2674 2676 7ffd9b8a7420 NtProtectVirtualMemory 2675->2676 2677 7ffd9b8a812f 2676->2677 2683 7ffd9b8a8708 2684 7ffd9b8a870f NtProtectVirtualMemory 2683->2684 2686 7ffd9b8a87e5 2684->2686 2649 7ffd9b8a7c7c 2652 7ffd9b8a7430 2649->2652 2653 7ffd9b8a8000 2652->2653 2656 7ffd9b8a7420 2653->2656 2655 7ffd9b8a7c87 2657 7ffd9b8a81e0 2656->2657 2663 7ffd9b8a7408 2657->2663 2659 7ffd9b8a81f1 2662 7ffd9b8a81f6 2659->2662 2668 7ffd9b8a7418 2659->2668 2661 7ffd9b8a8294 2661->2655 2662->2655 2664 7ffd9b8a8270 2663->2664 2665 7ffd9b8a7418 NtProtectVirtualMemory 2664->2665 2667 7ffd9b8a829c 2664->2667 2666 7ffd9b8a8294 2665->2666 2666->2659 2670 7ffd9b8a84b0 2668->2670 2669 7ffd9b8a861b 2669->2661 2670->2669 2671 7ffd9b8a87a4 NtProtectVirtualMemory 2670->2671 2672 7ffd9b8a87e5 2671->2672 2672->2661 2678 7ffd9b8a7d8d 2680 7ffd9b8a7dcc 2678->2680 2679 7ffd9b8a7f0b 2680->2679 2681 7ffd9b8a7420 NtProtectVirtualMemory 2680->2681 2682 7ffd9b8a812f 2681->2682 2692 7ffd9b8a744d 2694 7ffd9b8a7457 2692->2694 2693 7ffd9b8a73ff 2694->2693 2695 7ffd9b8a7420 NtProtectVirtualMemory 2694->2695 2696 7ffd9b8a812f 2695->2696 2687 7ffd9b8a847e 2689 7ffd9b8a84af 2687->2689 2688 7ffd9b8a861b 2689->2688 2690 7ffd9b8a87a4 NtProtectVirtualMemory 2689->2690 2691 7ffd9b8a87e5 2690->2691

                              Control-flow Graph

                              Memory Dump Source
                              • Source File: 00000008.00000002.1716733410.00007FFD9B8A5000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A5000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7ffd9b8a5000_FULL.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3552f14b8a0a0f5acd744e700b69946686f9d6657a8d414b0e79fcf55e80b19a
                              • Instruction ID: f4c263bc0c94faadbc55bfe45bc482ccbd418ebe55316afae3ae00f3ebb86363
                              • Opcode Fuzzy Hash: 3552f14b8a0a0f5acd744e700b69946686f9d6657a8d414b0e79fcf55e80b19a
                              • Instruction Fuzzy Hash: C4C14831E0CA0D4FE72DEB6898266F977E1EF99310F44417ED45AC31DAEE2868078791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 48 7ffd9b8a8708-7ffd9b8a87e3 NtProtectVirtualMemory 53 7ffd9b8a87e5 48->53 54 7ffd9b8a87eb-7ffd9b8a8816 48->54 53->54
                              APIs
                              Memory Dump Source
                              • Source File: 00000008.00000002.1716733410.00007FFD9B8A5000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A5000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7ffd9b8a5000_FULL.jbxd
                              Similarity
                              • API ID: MemoryProtectVirtual
                              • String ID:
                              • API String ID: 2706961497-0
                              • Opcode ID: 18c29e9bd076a72736ec96729a141eac9de9078362c304bf8389e5fc56cdfe82
                              • Instruction ID: 7a87d1f70402374b3ab96592078dce3dd5f84a488bc3b45e1d58c29d38a7dc05
                              • Opcode Fuzzy Hash: 18c29e9bd076a72736ec96729a141eac9de9078362c304bf8389e5fc56cdfe82
                              • Instruction Fuzzy Hash: B431B331A1CB4C8FDB5CDB5CA8166ED77E1EB98320F00426FE04DD3296DA74A9458BC1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 56 7ffd9b8a0bb1-7ffd9b8a0be3 58 7ffd9b8a0c18-7ffd9b8a0c23 56->58 59 7ffd9b8a0c25-7ffd9b8a0c27 58->59 60 7ffd9b8a0c29-7ffd9b8a0c39 58->60 61 7ffd9b8a0c52-7ffd9b8a0c54 59->61 73 7ffd9b8a0c40-7ffd9b8a0c50 60->73 63 7ffd9b8a0c56-7ffd9b8a0c5d call 7ffd9b8a0498 61->63 64 7ffd9b8a0be5 61->64 69 7ffd9b8a0c67-7ffd9b8a0c72 63->69 70 7ffd9b8a0c5f-7ffd9b8a0c66 63->70 67 7ffd9b8a0bef-7ffd9b8a0c05 64->67 76 7ffd9b8a0c16 67->76 77 7ffd9b8a0c07-7ffd9b8a0c11 call 7ffd9b8a0198 67->77 71 7ffd9b8a0c78-7ffd9b8a0c7e 69->71 72 7ffd9b8a0c74-7ffd9b8a0c76 69->72 70->69 75 7ffd9b8a0c81-7ffd9b8a0c83 71->75 72->75 73->61 80 7ffd9b8a0c85-7ffd9b8a0c8a call 7ffd9b8a07a0 75->80 81 7ffd9b8a0c8b-7ffd9b8a0c98 call 7ffd9b8a04e0 call 7ffd9b8a0500 75->81 76->58 77->76 80->81 90 7ffd9b8a0c9a 81->90 91 7ffd9b8a0ca2-7ffd9b8a0cae 81->91 95 7ffd9b8a0ca1 90->95 92 7ffd9b8a0cb0-7ffd9b8a0cb2 91->92 93 7ffd9b8a0cb4-7ffd9b8a0cba 91->93 94 7ffd9b8a0cbd-7ffd9b8a0cbf 92->94 93->94 97 7ffd9b8a0cc7-7ffd9b8a0cd3 94->97 98 7ffd9b8a0cc1-7ffd9b8a0cc6 call 7ffd9b8a0738 94->98 95->91 100 7ffd9b8a0cd5-7ffd9b8a0cd7 97->100 101 7ffd9b8a0cd9-7ffd9b8a0cdf 97->101 98->97 103 7ffd9b8a0ce2-7ffd9b8a0ce4 100->103 101->103 105 7ffd9b8a0ce6-7ffd9b8a0ced call 7ffd9b8a0528 103->105 106 7ffd9b8a0cf5-7ffd9b8a0d01 103->106 105->106 112 7ffd9b8a0cef-7ffd9b8a0cf4 call 7ffd9b8a06b0 105->112 108 7ffd9b8a0d07-7ffd9b8a0d0d 106->108 109 7ffd9b8a0d03-7ffd9b8a0d05 106->109 111 7ffd9b8a0d10-7ffd9b8a0d12 108->111 109->111 114 7ffd9b8a0d1a-7ffd9b8a0d27 call 7ffd9b8a0558 call 7ffd9b8a0528 111->114 115 7ffd9b8a0d14-7ffd9b8a0d19 call 7ffd9b8a0690 111->115 112->106 124 7ffd9b8a0d29-7ffd9b8a0d2e call 7ffd9b8a0568 114->124 125 7ffd9b8a0d2f-7ffd9b8a0d37 114->125 115->114 124->125 127 7ffd9b8a0d39-7ffd9b8a0d43 call 7ffd9b8a0638 call 7ffd9b8a0620 125->127 128 7ffd9b8a0d44-7ffd9b8a0d64 125->128 127->128 128->125 136 7ffd9b8a0d66-7ffd9b8a0d75 call 7ffd9b8a0198 128->136 136->125
                              Strings
                              Memory Dump Source
                              • Source File: 00000008.00000002.1716733410.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7ffd9b8a0000_FULL.jbxd
                              Similarity
                              • API ID:
                              • String ID: #CM_^
                              • API String ID: 0-2311673530
                              • Opcode ID: daf2283f92c0b0683a7b50a3465dc679255bd3ffee826fca48caf50eb2deee17
                              • Instruction ID: fc78bfe2832b67cad1a6543e190289a393b222483232a9862f5478331f1e9faf
                              • Opcode Fuzzy Hash: daf2283f92c0b0683a7b50a3465dc679255bd3ffee826fca48caf50eb2deee17
                              • Instruction Fuzzy Hash: 6551B021F2F65F4AFBB577E480716BD6290AF49B08F120439E45D961E3DD1DBA4082A2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 139 7ffd9b8a0738-7ffd9b8a0749 142 7ffd9b8a0788-7ffd9b8a07de 139->142 143 7ffd9b8a074b-7ffd9b8a0787 139->143 143->142
                              Strings
                              Memory Dump Source
                              • Source File: 00000008.00000002.1716733410.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7ffd9b8a0000_FULL.jbxd
                              Similarity
                              • API ID:
                              • String ID: M_^)
                              • API String ID: 0-1230036679
                              • Opcode ID: e3699e87c4f444fb4092538a707958e28fd05ae6c2b53af5d9232b40a53aae62
                              • Instruction ID: fdeb46232630ab7c81770d154210313dbb116fb3575b88d415d4133cefc6ae23
                              • Opcode Fuzzy Hash: e3699e87c4f444fb4092538a707958e28fd05ae6c2b53af5d9232b40a53aae62
                              • Instruction Fuzzy Hash: 3A212563B094698BE65AB76CACB95E937D0DF9422C70502B2D09CCB0D3EC2834879695
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              Memory Dump Source
                              • Source File: 00000008.00000002.1716733410.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7ffd9b8a0000_FULL.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 56be7f81c8a7c1f120b3fb8a6649a8ad3ae59f617e40f42a86d23a2b706f6b64
                              • Instruction ID: 98d99aae012a555fe69b8cbe7ea34a5ba99fdff19505b834c7ea25cec82b96c0
                              • Opcode Fuzzy Hash: 56be7f81c8a7c1f120b3fb8a6649a8ad3ae59f617e40f42a86d23a2b706f6b64
                              • Instruction Fuzzy Hash: C9913A62F1E94E4FE7A9B77C58696B877D2EF99200B0502BBD05DC72DBDD186C028381
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              Memory Dump Source
                              • Source File: 00000008.00000002.1716733410.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7ffd9b8a0000_FULL.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a6e5d15d2e0cfc31f2158725a86c720101cdf51e780c6f35d34ed8c3e4296c8e
                              • Instruction ID: a44ca32d30f5d1b094973a20cd3a91cb7f53fda9db44d76e041328278ac1f6e2
                              • Opcode Fuzzy Hash: a6e5d15d2e0cfc31f2158725a86c720101cdf51e780c6f35d34ed8c3e4296c8e
                              • Instruction Fuzzy Hash: 2091F931B0E94E4FEBB8AFA885655B977D2FF98350B05017AD00EC32E6DE28BD418751
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              Memory Dump Source
                              • Source File: 00000008.00000002.1716733410.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7ffd9b8a0000_FULL.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1107400f7df2b4c5d86a95dc32f84696af3fcaf22755371019b446bfa822b773
                              • Instruction ID: f07a2f1cb4ecb41d31431b24bc44b7d0d2093eb5e6dad88ce516775b4e66b558
                              • Opcode Fuzzy Hash: 1107400f7df2b4c5d86a95dc32f84696af3fcaf22755371019b446bfa822b773
                              • Instruction Fuzzy Hash: F7911A20B1EA898FC756F77884709A53BE2EF8A20079540F9E04CC7597CE3E9942C792
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 555 7ffd9b8a365c-7ffd9b8a3663 556 7ffd9b8a3665-7ffd9b8a366d 555->556 557 7ffd9b8a366e-7ffd9b8a3727 555->557 556->557 561 7ffd9b8a3735-7ffd9b8a37b9 557->561 562 7ffd9b8a3729-7ffd9b8a3732 557->562 565 7ffd9b8a37bf-7ffd9b8a37d1 561->565 562->561 566 7ffd9b8a37d9-7ffd9b8a383d call 7ffd9b8a383e 565->566 567 7ffd9b8a37d3 565->567 567->566
                              Memory Dump Source
                              • Source File: 00000008.00000002.1716733410.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7ffd9b8a0000_FULL.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c32d2352d3ca071bb7c93c31028c8b336ea088bcae2c8a1a972a3fe13778fd69
                              • Instruction ID: b60a4a27c676790c5c6327d1d282ede0e35e89bcb4bc0a6f74d6d1d7d3063aa2
                              • Opcode Fuzzy Hash: c32d2352d3ca071bb7c93c31028c8b336ea088bcae2c8a1a972a3fe13778fd69
                              • Instruction Fuzzy Hash: 56518471908A1C8FDB68DF58D855BE9BBF1FF59310F0082AAD04DD3292DE34A9858F81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              Memory Dump Source
                              • Source File: 00000008.00000002.1716733410.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7ffd9b8a0000_FULL.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7922aac201a0a7820adf3709a20df0e55f4ca82e4ff97432fc63f1ff1ab6957d
                              • Instruction ID: a799c31b59e5e71fe55a9bf8f7d296a2b63fd4f38d7716752e5a27afb6daa331
                              • Opcode Fuzzy Hash: 7922aac201a0a7820adf3709a20df0e55f4ca82e4ff97432fc63f1ff1ab6957d
                              • Instruction Fuzzy Hash: D8517321B1990D4FEB98FBAC84A5BB873E2EF9C750F550179D00ED32D6DE28A842C750
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              Memory Dump Source
                              • Source File: 00000008.00000002.1716733410.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7ffd9b8a0000_FULL.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b56bc92a4919b4212dd402bd6f31d904882f51678d24678c6aebc61bb471555b
                              • Instruction ID: d5447bd7158733f7ef50430bec305985b4a54c6c088b24c312a363e0952cf6a2
                              • Opcode Fuzzy Hash: b56bc92a4919b4212dd402bd6f31d904882f51678d24678c6aebc61bb471555b
                              • Instruction Fuzzy Hash: DE411A21B1DA490FE759E75894267B977D1EF9A314F0501BEE48EC32D6DE18AC028392
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.1716733410.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7ffd9b8a0000_FULL.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7dc285f7e4c0bd0d75a8cd670513ea122d523811abec723c8b8585925281a381
                              • Instruction ID: 0c06afddde69e74ac1137c5a78ad2bbc3c254cc36583afe4566637f3da4fe6be
                              • Opcode Fuzzy Hash: 7dc285f7e4c0bd0d75a8cd670513ea122d523811abec723c8b8585925281a381
                              • Instruction Fuzzy Hash: B641133190CB588FDB2CDFA898566E97BE0EF55321F00426FD08AC3292DE74A4468791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.1716733410.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7ffd9b8a0000_FULL.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3a4d13351f46df7530dad4e527a317202b46582ded233817c78d8c27d194a67a
                              • Instruction ID: b78d5f07ec49b9ba991c7b6fa1e0f0fbe03b9904ad85372d64b928e89bd1d94f
                              • Opcode Fuzzy Hash: 3a4d13351f46df7530dad4e527a317202b46582ded233817c78d8c27d194a67a
                              • Instruction Fuzzy Hash: F2413A30F09A894FD796FB7888696B97BE1EF89314B0400FAE00CC71E3DE289841C741
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.1716733410.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7ffd9b8a0000_FULL.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7d54bca8d07e797d01b69738f8c381f10c9e9b247fa23a3ff3a4c8c3aae6db53
                              • Instruction ID: f14604e7489d855c4c14295e5846e5ab6963d1b12d7b690938d2c1d2845fdbbc
                              • Opcode Fuzzy Hash: 7d54bca8d07e797d01b69738f8c381f10c9e9b247fa23a3ff3a4c8c3aae6db53
                              • Instruction Fuzzy Hash: EE215131B1991D8FDBA8FBACD4655BDB3E2EF8D611B410276D11ED3295CE24A8018790
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.1716733410.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7ffd9b8a0000_FULL.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bf5c95ac88546809c1cbad396418b83f34c88f76b949baa1b2c1b9a22fb86012
                              • Instruction ID: ce4ca9a39ea6f1560b09a14ebbd89854e6cb6376956f6c2f309510d68cf0ca96
                              • Opcode Fuzzy Hash: bf5c95ac88546809c1cbad396418b83f34c88f76b949baa1b2c1b9a22fb86012
                              • Instruction Fuzzy Hash: 2C11A320A0FAC84FE387E3785868AA47FE1AF8B214B1A01F7D088CB0B7C9584945C312
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.1716733410.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7ffd9b8a0000_FULL.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b6f3be14a6fe67dd0eee1965fc07e3c4acf90ee6837214139eca04deaab3684f
                              • Instruction ID: 20240a29d1770219f8fe7148459786c1f71cd96a4baac1cbd356f0cee0ef46f1
                              • Opcode Fuzzy Hash: b6f3be14a6fe67dd0eee1965fc07e3c4acf90ee6837214139eca04deaab3684f
                              • Instruction Fuzzy Hash: 06F02B21B0981D5FF798F26C54F8AFD27D1DF9C22971400B7E04CC3197EC18A8828341
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.1716733410.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7ffd9b8a0000_FULL.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1902addfb70e577174bc903c6ad7a2700bbd20b7b9a2d40a19ad955d3a6e93e1
                              • Instruction ID: dd308aa31df0770a939f7a460617637933b6e0e7efa980725fdee659fda5858c
                              • Opcode Fuzzy Hash: 1902addfb70e577174bc903c6ad7a2700bbd20b7b9a2d40a19ad955d3a6e93e1
                              • Instruction Fuzzy Hash: 70E0E57250D64C1EEB08AA59AC17CF77BA8DA87274B00015FF29D81063F0127923C266
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.1716733410.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7ffd9b8a0000_FULL.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ea7498fe73d2e0c44fb775c7bba7234e8303c2806aa19779d28cf7d0c020e363
                              • Instruction ID: 10d73a90174af0be67b8a6da6ff5583b7bdf36568e2a0bc72608b9866e1da4be
                              • Opcode Fuzzy Hash: ea7498fe73d2e0c44fb775c7bba7234e8303c2806aa19779d28cf7d0c020e363
                              • Instruction Fuzzy Hash: 93E02B21B15C0C1FE7D4F76C4498F7D12C1EB9C2157110076E40CC32AADC149C818351
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000008.00000002.1716733410.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7ffd9b8a0000_FULL.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b3ea6f61483fe33f1df37bac147940462f8ee128e6ed77072dc074a202811cb9
                              • Instruction ID: 3cb401cfc91bce11a837f61182e150bc9549f742821392fb34b965e7280f05d1
                              • Opcode Fuzzy Hash: b3ea6f61483fe33f1df37bac147940462f8ee128e6ed77072dc074a202811cb9
                              • Instruction Fuzzy Hash: DCC01210E9B20B00ECF437F416721B412411F0D704FC60874D89D411E3DD5FF6550472
                              Uniqueness

                              Uniqueness Score: -1.00%