Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
o00DuIdf3j.exe

Overview

General Information

Sample name:o00DuIdf3j.exe
renamed because original name is a hash value
Original sample name:6801fc9f21096f135e42d3a2b9ea1385c0c7ebd41c43e76d3083d769efd46480.exe
Analysis ID:1480325
MD5:838ffbf08e5c7f0efa1eecf16fbf5503
SHA1:7a21e68072a9a7e19ceedb271efc6a3febad5c68
SHA256:6801fc9f21096f135e42d3a2b9ea1385c0c7ebd41c43e76d3083d769efd46480
Tags:exe
Infos:

Detection

Xmrig
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Xmrig cryptocurrency miner
AI detected suspicious sample
Changes security center settings (notifications, updates, antivirus, firewall)
Detected Stratum mining protocol
Found strings related to Crypto-Mining
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Yara signature match

Classification

  • System is w10x64
  • o00DuIdf3j.exe (PID: 5736 cmdline: "C:\Users\user\Desktop\o00DuIdf3j.exe" MD5: 838FFBF08E5C7F0EFA1EECF16FBF5503)
    • conhost.exe (PID: 6840 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 5996 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7184 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • Sgrmuserer.exe (PID: 7224 cmdline: C:\Windows\system32\Sgrmuserer.exe MD5: 3BA1A18A0DC30A0545E7765CB97D8E63)
  • svchost.exe (PID: 7296 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7352 cmdline: C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7360 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • MpCmdRun.exe (PID: 7928 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: B3676839B2EE96983F9ED735CD044159)
      • conhost.exe (PID: 7936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 7852 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
o00DuIdf3j.exeJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    o00DuIdf3j.exeLinux_Trojan_Pornoasset_927f314funknownunknown
    • 0x12d358:$a: C3 D3 CB D3 C3 48 31 C3 48 0F AF F0 48 0F AF F0 48 0F AF F0 48
    o00DuIdf3j.exeMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
    • 0x6407fe:$x1: donate.ssl.xmrig.com
    • 0x640cb9:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
    • 0x6d22b3:$s2: \\?\pipe\uv\%p-%lu
    o00DuIdf3j.exeMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
    • 0x641d17:$s1: %s/%s (Windows NT %lu.%lu
    • 0x6464b0:$s3: \\.\WinRing0_
    • 0x5ee1e2:$s4: pool_wallet
    • 0x5e6380:$s5: cryptonight
    • 0x5e638e:$s5: cryptonight
    • 0x5e639d:$s5: cryptonight
    • 0x5e63ab:$s5: cryptonight
    • 0x5e63c0:$s5: cryptonight
    • 0x5e63cf:$s5: cryptonight
    • 0x5e63dd:$s5: cryptonight
    • 0x5e63f2:$s5: cryptonight
    • 0x5e6401:$s5: cryptonight
    • 0x5e6412:$s5: cryptonight
    • 0x5e6429:$s5: cryptonight
    • 0x5e6437:$s5: cryptonight
    • 0x5e6445:$s5: cryptonight
    • 0x5e6455:$s5: cryptonight
    • 0x5e6467:$s5: cryptonight
    • 0x5e6478:$s5: cryptonight
    • 0x5e6488:$s5: cryptonight
    • 0x5e6498:$s5: cryptonight
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.3717041462.0000018F0312F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      00000000.00000002.3717041462.0000018F03156000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
        00000000.00000002.3716653542.0000018F01765000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
          00000000.00000003.1253197542.0000018F03140000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
            00000000.00000003.1253197542.0000018F03131000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
              Click to see the 3 entries
              SourceRuleDescriptionAuthorStrings
              0.0.o00DuIdf3j.exe.7ff6cb120000.0.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                0.0.o00DuIdf3j.exe.7ff6cb120000.0.unpackLinux_Trojan_Pornoasset_927f314funknownunknown
                • 0x12d358:$a: C3 D3 CB D3 C3 48 31 C3 48 0F AF F0 48 0F AF F0 48 0F AF F0 48
                0.0.o00DuIdf3j.exe.7ff6cb120000.0.unpackMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
                • 0x6407fe:$x1: donate.ssl.xmrig.com
                • 0x640cb9:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
                • 0x6d22b3:$s2: \\?\pipe\uv\%p-%lu
                0.0.o00DuIdf3j.exe.7ff6cb120000.0.unpackMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
                • 0x641d17:$s1: %s/%s (Windows NT %lu.%lu
                • 0x6464b0:$s3: \\.\WinRing0_
                • 0x5ee1e2:$s4: pool_wallet
                • 0x5e6380:$s5: cryptonight
                • 0x5e638e:$s5: cryptonight
                • 0x5e639d:$s5: cryptonight
                • 0x5e63ab:$s5: cryptonight
                • 0x5e63c0:$s5: cryptonight
                • 0x5e63cf:$s5: cryptonight
                • 0x5e63dd:$s5: cryptonight
                • 0x5e63f2:$s5: cryptonight
                • 0x5e6401:$s5: cryptonight
                • 0x5e6412:$s5: cryptonight
                • 0x5e6429:$s5: cryptonight
                • 0x5e6437:$s5: cryptonight
                • 0x5e6445:$s5: cryptonight
                • 0x5e6455:$s5: cryptonight
                • 0x5e6467:$s5: cryptonight
                • 0x5e6478:$s5: cryptonight
                • 0x5e6488:$s5: cryptonight
                • 0x5e6498:$s5: cryptonight

                System Summary

                barindex
                Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k NetworkService -p, CommandLine: C:\Windows\System32\svchost.exe -k NetworkService -p, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\System32\svchost.exe -k NetworkService -p, ProcessId: 5996, ProcessName: svchost.exe
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: o00DuIdf3j.exeReversingLabs: Detection: 52%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 85.4% probability
                Source: o00DuIdf3j.exeJoe Sandbox ML: detected

                Bitcoin Miner

                barindex
                Source: Yara matchFile source: o00DuIdf3j.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.o00DuIdf3j.exe.7ff6cb120000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.3717041462.0000018F0312F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.3717041462.0000018F03156000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.3716653542.0000018F01765000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.1253197542.0000018F03140000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.1253197542.0000018F03131000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.1251503134.00007FF6CB707000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: o00DuIdf3j.exe PID: 5736, type: MEMORYSTR
                Source: global trafficTCP traffic: 192.168.2.10:49704 -> 88.198.117.174:80 payload: data raw: 7b 22 69 64 22 3a 31 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6c 6f 67 69 6e 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 6c 6f 67 69 6e 22 3a 22 34 37 54 55 44 35 57 63 71 48 78 59 66 65 69 4d 31 71 33 52 50 71 4d 6e 42 51 4a 6e 46 4e 7a 55 38 67 61 79 38 59 6a 54 71 59 48 59 33 73 36 70 31 31 67 64 72 43 59 52 41 5a 51 35 34 57 79 59 46 77 50 7a 4b 6b 57 39 56 74 73 67 32 56 65 50 50 43 4b 37 78 70 73 62 4b 4c 41 59 61 43 43 2b 31 30 30 30 30 30 22 2c 22 70 61 73 73 22 3a 22 78 22 2c 22 61 67 65 6e 74 22 3a 22 4d 69 63 72 6f 73 6f 66 74 20 53 51 4c 20 53 65 72 76 65 72 2f 31 30 2e 35 30 2e 31 36 30 30 2e 32 20 28 57 69 6e 64 6f 77 73 20 4e 54 20 31 30 2e 30 3b 20 57 69 6e 36 34 3b 20 78 36 34 29 20 6c 69 62 75 76 2f 31 2e 33 38 2e 30 20 67 63 63 2f 31 33 2e 32 2e 30 22 2c 22 61 6c 67 6f 22 3a 5b 22 63 6e 2f 31 22 2c 22 63 6e 2f 32 22 2c 22 63 6e 2f 72 22 2c 22 63 6e 2f 66 61 73 74 22 2c 22 63 6e 2f 68 61 6c 66 22 2c 22 63 6e 2f 78 61 6f 22 2c 22 63 6e 2f 72 74 6f 22 2c 22 63 6e 2f 72 77 7a 22 2c 22 63 6e 2f 7a 6c 73 22 2c 22 63 6e 2f 64 6f 75 62 6c 65 22 2c 22 63 6e 2f 63 63 78 22 2c 22 63 6e 2d 6c 69 74 65 2f 31 22 2c 22 63 6e 2d 68 65 61 76 79 2f 30 22 2c 22 63 6e 2d 68 65 61 76 79 2f 74 75 62 65 22 2c 22 63 6e 2d 68 65 61 76 79 2f 78 68 76 22 2c 22 63 6e 2d 70 69 63 6f 22 2c 22 63 6e 2d 70 69 63 6f 2f 74 6c 6f 22 2c 22 63 6e 2f 75 70 78 32 22 2c 22 72 78 2f 30 22 2c 22 72 78 2f 77 6f 77 22 2c 22 72 78 2f 61 72 71 22 2c 22 72 78 2f 67 72 61 66 74 22 2c 22 72 78 2f 73 66 78 22 2c 22 72 78 2f 6b 65 76 61 22 2c 22 61 72 67 6f 6e 32 2f 63 68 75 6b 77 61 22 2c 22 61 72 67 6f 6e 32 2f 63 68 75 6b 77 61 76 32 22 2c 22 61 72 67 6f 6e 32 2f 6e 69 6e 6a 61 22 2c 22 67 68 6f 73 74 72 69 64 65 72 22 5d 7d 7d 0a data ascii: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"47tud5wcqhxyfeim1q3rpqmnbqjnfnzu8gay8yjtqyhy3s6p11gdrcyrazq54wyyfwpzkkw9vtsg2veppck7xpsbklayacc+100000","pass":"x","agent":"microsoft sql server/10.50.1600.2 (windows nt 10.0; win64; x64) libuv/1.38.0 gcc/13.2.0","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"]}}
                Source: o00DuIdf3j.exe, 00000000.00000000.1251503134.00007FF6CB707000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: stratum+ssl://
                Source: o00DuIdf3j.exe, 00000000.00000000.1251503134.00007FF6CB707000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: cryptonight/0
                Source: o00DuIdf3j.exe, 00000000.00000000.1251503134.00007FF6CB707000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: -o, --url=URL URL of mining server
                Source: o00DuIdf3j.exe, 00000000.00000000.1251503134.00007FF6CB707000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: stratum+tcp://
                Source: o00DuIdf3j.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: auto.c3pool.org
                Source: svchost.exe, 00000007.00000002.3716655348.000002C0DB518000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3716056560.000002C0DAC87000.00000004.00000020.00020000.00000000.sdmp, regid.1991-06.com.microsoft_Windows-10-Pro.swidtag.7.drString found in binary or memory: http://standards.iso.org/iso/19770/-2/2009/schema.xsd
                Source: svchost.exe, 00000003.00000002.1384056385.000001C564A13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
                Source: svchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
                Source: svchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384216194.000001C564A59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
                Source: svchost.exe, 00000003.00000002.1384297466.000001C564A63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384395517.000001C564A70000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1382863849.000001C564A41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1370310762.000001C564A62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384183155.000001C564A42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1370250511.000001C564A6E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1377550046.000001C564A5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
                Source: svchost.exe, 00000003.00000002.1384395517.000001C564A70000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1370250511.000001C564A6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
                Source: svchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
                Source: svchost.exe, 00000003.00000003.1370283068.000001C564A67000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384339680.000001C564A68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
                Source: svchost.exe, 00000003.00000002.1384395517.000001C564A70000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1370250511.000001C564A6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
                Source: svchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
                Source: svchost.exe, 00000003.00000002.1384297466.000001C564A63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1370310762.000001C564A62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384141634.000001C564A2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1377550046.000001C564A5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
                Source: svchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
                Source: svchost.exe, 00000003.00000003.1370283068.000001C564A67000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384339680.000001C564A68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384141634.000001C564A2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
                Source: svchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
                Source: svchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
                Source: svchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
                Source: svchost.exe, 00000003.00000002.1384297466.000001C564A63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1370310762.000001C564A62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384141634.000001C564A2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
                Source: svchost.exe, 00000003.00000003.1382863849.000001C564A41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384183155.000001C564A42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
                Source: svchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
                Source: svchost.exe, 00000003.00000002.1384297466.000001C564A63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1370310762.000001C564A62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
                Source: svchost.exe, 00000003.00000002.1384141634.000001C564A2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
                Source: svchost.exe, 00000003.00000002.1384183155.000001C564A42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
                Source: svchost.exe, 00000003.00000002.1384297466.000001C564A63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1370310762.000001C564A62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
                Source: svchost.exe, 00000003.00000003.1382863849.000001C564A41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384183155.000001C564A42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
                Source: svchost.exe, 00000003.00000002.1384216194.000001C564A59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
                Source: svchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
                Source: svchost.exe, 00000003.00000003.1269417045.000001C564A36000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/
                Source: svchost.exe, 00000003.00000003.1370283068.000001C564A67000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384339680.000001C564A68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384141634.000001C564A2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
                Source: svchost.exe, 00000003.00000003.1382863849.000001C564A41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
                Source: svchost.exe, 00000003.00000003.1378936057.000001C564A48000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384183155.000001C564A42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384141634.000001C564A2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1269417045.000001C564A36000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
                Source: svchost.exe, 00000003.00000003.1269417045.000001C564A36000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384216194.000001C564A59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
                Source: svchost.exe, 00000003.00000002.1384141634.000001C564A2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
                Source: svchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
                Source: svchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384216194.000001C564A59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
                Source: o00DuIdf3j.exeString found in binary or memory: https://xmrig.com/docs/algorithms
                Source: o00DuIdf3j.exeString found in binary or memory: https://xmrig.com/wizard
                Source: o00DuIdf3j.exeString found in binary or memory: https://xmrig.com/wizard%s

                System Summary

                barindex
                Source: o00DuIdf3j.exe, type: SAMPLEMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                Source: o00DuIdf3j.exe, type: SAMPLEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                Source: o00DuIdf3j.exe, type: SAMPLEMatched rule: Detects coinmining malware Author: ditekSHen
                Source: 0.0.o00DuIdf3j.exe.7ff6cb120000.0.unpack, type: UNPACKEDPEMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                Source: 0.0.o00DuIdf3j.exe.7ff6cb120000.0.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                Source: 0.0.o00DuIdf3j.exe.7ff6cb120000.0.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                Source: 00000000.00000000.1250365416.00007FF6CB121000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeProcess Stats: CPU usage > 49%
                Source: o00DuIdf3j.exeStatic PE information: Number of sections : 11 > 10
                Source: o00DuIdf3j.exe, 00000000.00000000.1251789201.00007FF6CBBF8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesqlservrJ vs o00DuIdf3j.exe
                Source: o00DuIdf3j.exeBinary or memory string: OriginalFilenamesqlservrJ vs o00DuIdf3j.exe
                Source: o00DuIdf3j.exe, type: SAMPLEMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                Source: o00DuIdf3j.exe, type: SAMPLEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                Source: o00DuIdf3j.exe, type: SAMPLEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                Source: 0.0.o00DuIdf3j.exe.7ff6cb120000.0.unpack, type: UNPACKEDPEMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                Source: 0.0.o00DuIdf3j.exe.7ff6cb120000.0.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                Source: 0.0.o00DuIdf3j.exe.7ff6cb120000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                Source: 00000000.00000000.1250365416.00007FF6CB121000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                Source: classification engineClassification label: mal88.evad.mine.winEXE@12/3@1/1
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6840:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7936:120:WilError_03
                Source: o00DuIdf3j.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: o00DuIdf3j.exeReversingLabs: Detection: 52%
                Source: o00DuIdf3j.exeString found in binary or memory: --help
                Source: o00DuIdf3j.exeString found in binary or memory: --help
                Source: o00DuIdf3j.exeString found in binary or memory: -h, --help display this help and exit
                Source: o00DuIdf3j.exeString found in binary or memory: -h, --help display this help and exit
                Source: o00DuIdf3j.exeString found in binary or memory: a:c:kBp:Px:r:R:s:t:T:o:u:O:v:l:Sx:Microsoft SQL Server 10.50.1600.2-h--help-V--version--versions--export-topology--print-platformsUsage: Microsoft SQL Server [OPTIONS]
                Source: o00DuIdf3j.exeString found in binary or memory: a:c:kBp:Px:r:R:s:t:T:o:u:O:v:l:Sx:Microsoft SQL Server 10.50.1600.2-h--help-V--version--versions--export-topology--print-platformsUsage: Microsoft SQL Server [OPTIONS]
                Source: o00DuIdf3j.exeString found in binary or memory: if(p-start_p>size_limit)
                Source: o00DuIdf3j.exeString found in binary or memory: id-cmc-addExtensions
                Source: o00DuIdf3j.exeString found in binary or memory: set-addPolicy
                Source: o00DuIdf3j.exeString found in binary or memory: 9Hcrypto/store/loader_file.c
                Source: o00DuIdf3j.exeString found in binary or memory: 9Hcrypto/store/loader_file.cpass phrasePRIVATE KEYPUBLIC KEYPARAMETERSX509 CRLTRUSTED CERTIFICATEX509 CERTIFICATECERTIFICATEENCRYPTED PRIVATE KEYPKCS8 decrypt passwordPKCS12 import passwordfile:localhost/rb-----BEGIN %08lx/PEM'PEM type is 'file
                Source: unknownProcess created: C:\Users\user\Desktop\o00DuIdf3j.exe "C:\Users\user\Desktop\o00DuIdf3j.exe"
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup
                Source: unknownProcess created: C:\Windows\System32\Sgrmuserer.exe C:\Windows\system32\Sgrmuserer.exe
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenableJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: explorerframe.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: moshost.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mapsbtsvc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mosstorage.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mapconfiguration.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: aphostservice.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: networkhelper.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: userdataplatformhelperutil.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mccspal.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dmcfgutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dmcmnutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dmxmlhelputils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: inproclogger.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: windows.networking.connectivity.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: synccontroller.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: pimstore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: aphostclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: accountaccessor.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dsclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: systemeventsusererclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: userdatalanguageutil.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mccsengineshared.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cemapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: userdatatypehelperutil.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: phoneutil.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: storsvc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: fltlib.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bcd.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cabinet.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: storageusage.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: licensemanagersvc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: licensemanager.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: mpclient.dllJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: version.dllJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wscapi.dllJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: slc.dllJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
                Source: o00DuIdf3j.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: o00DuIdf3j.exeStatic PE information: Image base 0x140000000 > 0x60000000
                Source: o00DuIdf3j.exeStatic file information: File size 8249344 > 1048576
                Source: o00DuIdf3j.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x5d5e00
                Source: o00DuIdf3j.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x15f400
                Source: o00DuIdf3j.exeStatic PE information: More than 200 imports for KERNEL32.dll
                Source: o00DuIdf3j.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                Source: o00DuIdf3j.exeStatic PE information: section name: .xdata
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
                Source: C:\Users\user\Desktop\o00DuIdf3j.exeWindow / User API: threadDelayed 9985Jump to behavior
                Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\Windows\System32 FullSizeInformationJump to behavior
                Source: svchost.exe, 00000006.00000002.3716212051.000002530B04B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                Source: svchost.exe, 00000006.00000002.3716387057.000002530B074000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                Source: svchost.exe, 00000006.00000002.3716061237.000002530B02B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: svchost.exe, 00000006.00000002.3715995786.000002530B013000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: b2f05e9306}\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
                Source: o00DuIdf3j.exe, 00000000.00000002.3716774479.0000018F01797000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: svchost.exe, 00000006.00000002.3715904728.000002530B000000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
                Source: svchost.exe, 00000006.00000002.3716756250.000002530B102000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                Source: svchost.exe, 00000006.00000002.3716387057.000002530B064000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &@SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000es
                Source: conhost.exe, 00000002.00000002.3717087297.00000236F3811000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: conhost.exe, 00000002.00000002.3717087297.00000236F3811000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: conhost.exe, 00000002.00000002.3717087297.00000236F3811000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: EProgram Manager
                Source: conhost.exe, 00000002.00000002.3717087297.00000236F3811000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior

                Lowering of HIPS / PFW / Operating System Security Settings

                barindex
                Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
                Source: svchost.exe, 00000008.00000002.3717171359.000002E4B3B02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gramFiles%\Windows Defender\MsMpeng.exe
                Source: svchost.exe, 00000008.00000002.3717171359.000002E4B3B02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA &apos;AntiVirusProduct&apos; OR TargetInstance ISA &apos;FirewallProduct&apos; OR TargetInstance ISA &apos;AntiSpywareProduct&apos;
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Windows Management Instrumentation
                1
                DLL Side-Loading
                2
                Process Injection
                1
                Disable or Modify Tools
                OS Credential Dumping141
                Security Software Discovery
                Remote ServicesData from Local System1
                Non-Application Layer Protocol
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts2
                Command and Scripting Interpreter
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                12
                Virtualization/Sandbox Evasion
                LSASS Memory12
                Virtualization/Sandbox Evasion
                Remote Desktop ProtocolData from Removable Media1
                Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
                Process Injection
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                DLL Side-Loading
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets22
                System Information Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1480325 Sample: o00DuIdf3j.exe Startdate: 24/07/2024 Architecture: WINDOWS Score: 88 24 auto.c3pool.org 2->24 28 Malicious sample detected (through community Yara rule) 2->28 30 Multi AV Scanner detection for submitted file 2->30 32 Yara detected Xmrig cryptocurrency miner 2->32 34 3 other signatures 2->34 8 o00DuIdf3j.exe 1 2->8         started        12 svchost.exe 2->12         started        14 svchost.exe 1 2->14         started        16 5 other processes 2->16 signatures3 process4 dnsIp5 26 88.198.117.174, 49704, 80 HETZNER-ASDE Germany 8->26 36 Query firmware table information (likely to detect VMs) 8->36 38 Found strings related to Crypto-Mining 8->38 18 conhost.exe 8->18         started        40 Changes security center settings (notifications, updates, antivirus, firewall) 12->40 20 MpCmdRun.exe 1 12->20         started        signatures6 process7 process8 22 conhost.exe 20->22         started       

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                o00DuIdf3j.exe53%ReversingLabsWin64.Trojan.Casdet
                o00DuIdf3j.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://dev.ditu.live.com/REST/v1/Routes/0%Avira URL Cloudsafe
                https://dev.ditu.live.com/REST/v1/Transit/Stops/0%Avira URL Cloudsafe
                https://dev.virtualearth.net/REST/v1/Routes/0%Avira URL Cloudsafe
                https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx0%Avira URL Cloudsafe
                https://dev.virtualearth.net/REST/v1/Routes/Driving0%Avira URL Cloudsafe
                https://dev.virtualearth.net/REST/v1/Traffic/Incidents/0%Avira URL Cloudsafe
                https://xmrig.com/wizard%s0%Avira URL Cloudsafe
                https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=0%Avira URL Cloudsafe
                https://dev.virtualearth.net/REST/v1/Routes/Walking0%Avira URL Cloudsafe
                https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx0%Avira URL Cloudsafe
                https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=0%Avira URL Cloudsafe
                https://xmrig.com/wizard0%Avira URL Cloudsafe
                https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?0%Avira URL Cloudsafe
                https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=0%Avira URL Cloudsafe
                https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/0%Avira URL Cloudsafe
                https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/0%Avira URL Cloudsafe
                http://standards.iso.org/iso/19770/-2/2009/schema.xsd0%Avira URL Cloudsafe
                https://dev.virtualearth.net/REST/v1/Locations0%Avira URL Cloudsafe
                https://dev.ditu.live.com/mapcontrol/logging.ashx0%Avira URL Cloudsafe
                https://dev.virtualearth.net/mapcontrol/logging.ashx0%Avira URL Cloudsafe
                https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=0%Avira URL Cloudsafe
                https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=0%Avira URL Cloudsafe
                https://dev.ditu.live.com/REST/v1/Imagery/Copyright/0%Avira URL Cloudsafe
                https://dev.virtualearth.net/REST/v1/Transit/Schedules/0%Avira URL Cloudsafe
                https://dev.virtualearth.net/REST/v1/Routes/Transit0%Avira URL Cloudsafe
                https://dynamic.t0%Avira URL Cloudsafe
                https://xmrig.com/docs/algorithms0%Avira URL Cloudsafe
                https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=0%Avira URL Cloudsafe
                https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=0%Avira URL Cloudsafe
                https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen0%Avira URL Cloudsafe
                http://www.bingmapsportal.com0%Avira URL Cloudsafe
                https://dev.ditu.live.com/REST/v1/Locations0%Avira URL Cloudsafe
                https://dev.virtualearth.net/REST/v1/Imagery/Copyright/0%Avira URL Cloudsafe
                https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/0%Avira URL Cloudsafe
                https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/0%Avira URL Cloudsafe
                https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                auto.c3pool.org
                5.75.158.61
                truefalse
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 00000003.00000003.1370283068.000001C564A67000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384339680.000001C564A68000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 00000003.00000003.1382863849.000001C564A41000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.ditu.live.com/REST/v1/Transit/Stops/svchost.exe, 00000003.00000002.1384395517.000001C564A70000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1370250511.000001C564A6E000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 00000003.00000003.1370283068.000001C564A67000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384339680.000001C564A68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384141634.000001C564A2B000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.virtualearth.net/REST/v1/Traffic/Incidents/svchost.exe, 00000003.00000002.1384297466.000001C564A63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1370310762.000001C564A62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384141634.000001C564A2B000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://xmrig.com/wizard%so00DuIdf3j.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 00000003.00000003.1269417045.000001C564A36000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384216194.000001C564A59000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=svchost.exe, 00000003.00000003.1382863849.000001C564A41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384183155.000001C564A42000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 00000003.00000002.1384297466.000001C564A63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1370310762.000001C564A62000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 00000003.00000003.1378936057.000001C564A48000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384183155.000001C564A42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384141634.000001C564A2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1269417045.000001C564A36000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://xmrig.com/wizardo00DuIdf3j.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/svchost.exe, 00000003.00000003.1269417045.000001C564A36000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/svchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384216194.000001C564A59000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://standards.iso.org/iso/19770/-2/2009/schema.xsdsvchost.exe, 00000007.00000002.3716655348.000002C0DB518000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3716056560.000002C0DAC87000.00000004.00000020.00020000.00000000.sdmp, regid.1991-06.com.microsoft_Windows-10-Pro.swidtag.7.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 00000003.00000002.1384297466.000001C564A63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384395517.000001C564A70000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1382863849.000001C564A41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1370310762.000001C564A62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384183155.000001C564A42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1370250511.000001C564A6E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1377550046.000001C564A5A000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 00000003.00000002.1384141634.000001C564A2B000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 00000003.00000002.1384183155.000001C564A42000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 00000003.00000003.1382863849.000001C564A41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384183155.000001C564A42000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dynamic.tsvchost.exe, 00000003.00000002.1384216194.000001C564A59000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://xmrig.com/docs/algorithmso00DuIdf3j.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=svchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384216194.000001C564A59000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 00000003.00000002.1384297466.000001C564A63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1370310762.000001C564A62000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.bingmapsportal.comsvchost.exe, 00000003.00000002.1384056385.000001C564A13000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000003.00000002.1384297466.000001C564A63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1370310762.000001C564A62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1374818728.000001C564A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384141634.000001C564A2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1377550046.000001C564A5A000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000003.00000003.1370283068.000001C564A67000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384339680.000001C564A68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1384141634.000001C564A2B000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 00000003.00000002.1384395517.000001C564A70000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1370250511.000001C564A6E000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 00000003.00000002.1384141634.000001C564A2B000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  88.198.117.174
                  unknownGermany
                  24940HETZNER-ASDEtrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1480325
                  Start date and time:2024-07-24 17:35:03 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 6m 59s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:14
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:o00DuIdf3j.exe
                  renamed because original name is a hash value
                  Original Sample Name:6801fc9f21096f135e42d3a2b9ea1385c0c7ebd41c43e76d3083d769efd46480.exe
                  Detection:MAL
                  Classification:mal88.evad.mine.winEXE@12/3@1/1
                  EGA Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240s for sample files taking high CPU consumption
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • VT rate limit hit for: o00DuIdf3j.exe
                  TimeTypeDescription
                  11:36:54API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  88.198.117.174xB6r0wPRyb.exeGet hashmaliciousXmrigBrowse
                    c3p.exeGet hashmaliciousXmrigBrowse
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      auto.c3pool.orgxB6r0wPRyb.exeGet hashmaliciousXmrigBrowse
                      • 5.75.158.61
                      K4gsPJGEi4.exeGet hashmaliciousXmrigBrowse
                      • 5.75.158.61
                      x00zm3KVwb.exeGet hashmaliciousXmrigBrowse
                      • 88.198.117.174
                      4xHN38uqxB.exeGet hashmaliciousDoublePulsar, ETERNALBLUE, XmrigBrowse
                      • 5.161.70.189
                      UO2z4n1Sxx.exeGet hashmaliciousUnknownBrowse
                      • 88.198.117.174
                      4xHN38uqxB.exeGet hashmaliciousXmrigBrowse
                      • 88.198.117.174
                      c3p.exeGet hashmaliciousXmrigBrowse
                      • 88.198.117.174
                      SecuriteInfo.com.FileRepMalware.25283.7828.exeGet hashmaliciousBlackMoonBrowse
                      • 5.161.70.189
                      pg_ctlk.exeGet hashmaliciousXmrigBrowse
                      • 188.34.196.123
                      logor.elfGet hashmaliciousXmrigBrowse
                      • 5.161.70.189
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      HETZNER-ASDE674F2D1AFFFFC011E997D1BEC6A1B4A08AC66AB3A6159C084CF31A4F27151D9B.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                      • 188.40.141.211
                      xB6r0wPRyb.exeGet hashmaliciousXmrigBrowse
                      • 88.198.117.174
                      5AECB2A5BC5447DC736C29882193FEF4F2B007299A1817C664E1BA6A028363CF.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                      • 188.40.141.211
                      58BB54DE7A3ED504F85202B0CD55AC2DA9FC821B5695AA854703F885CD80B044.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                      • 188.40.141.211
                      weH771UOWv.exeGet hashmaliciousSalityBrowse
                      • 78.46.2.155
                      54E3EE54FAC434E25C03DED56A4680F1EA40A245D657440AC9C51BE7F27EF656.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                      • 188.40.141.211
                      483E.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                      • 188.40.141.211
                      3B830041B11819A0FDF72F85D27C1C9D7327ED8264D414E1F996D774FD843BBF.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                      • 188.40.141.211
                      353F5750A1B5537C368E78DF89E95E9A470E139FAC957DEF3C709C7D2C74F4CE.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                      • 188.40.141.211
                      21E24220AA645B202184B2B6C637DAFFB1EBF14ADE9A24D5DE09B0E342FAD6E4.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                      • 188.40.141.211
                      No context
                      No context
                      Process:C:\Windows\System32\svchost.exe
                      File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):999
                      Entropy (8bit):4.966299883488245
                      Encrypted:false
                      SSDEEP:24:Jd4T7gw4TchTGBLtKEHcHGuDyeHRuDye6MGFiP6euDyRtz:34T53VGLv8HGuDyeHRuDye6MGFiP6euy
                      MD5:24567B9212F806F6E3E27CDEB07728C0
                      SHA1:371AE77042FFF52327BF4B929495D5603404107D
                      SHA-256:82F352AD3C9B3E58ECD3207EDC38D5F01B14D968DA908406BD60FD93230B69F6
                      SHA-512:5D5E65FCD9061DADC760C9B3124547F2BABEB49FD56A2FD2FE2AD2211A1CB15436DB24308A0B5A87DA24EC6AB2A9B0C5242D828BE85BD1B2683F9468CE310904
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview:.<?xml version="1.0" encoding="utf-8"?>..<software_identification_tag xmlns="http://standards.iso.org/iso/19770/-2/2009/schema.xsd">...<entitlement_required_indicator>true</entitlement_required_indicator>...<product_title>Windows 10 Pro</product_title>...<product_version>....<name>10.0.19041.1865</name>....<numeric>.....<major>10</major>.....<minor>0</minor>.....<build>19041</build>.....<review>1865</review>....</numeric>...</product_version>...<software_creator>....<name>Microsoft Corporation</name>....<regid>regid.1991-06.com.microsoft</regid>...</software_creator>...<software_licensor>....<name>Microsoft Corporation</name>....<regid>regid.1991-06.com.microsoft</regid>...</software_licensor>...<software_id>....<unique_id>Windows-10-Pro</unique_id>....<tag_creator_regid>regid.1991-06.com.microsoft</tag_creator_regid>...</software_id>...<tag_creator>....<name>Microsoft Corporation</name>....<regid>regid.1991-06.com.microsoft</regid>...</tag_creator>..</software_identification_tag>..
                      Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:modified
                      Size (bytes):4926
                      Entropy (8bit):3.2477636167666715
                      Encrypted:false
                      SSDEEP:48:FaqdF7w8l0+AAHdKoqKFxcxkF28lraqdF7u+AAHdKoqKFxcxkFe:cEG+AAsoJjykcEu+AAsoJjyko
                      MD5:B51F0E4DD3E5A14E47A09F469577B4C6
                      SHA1:50032F780DEA38BC0CC283F6B20A2722C683E8DD
                      SHA-256:58E1D56587F1599C9FE2C36596D68CF2255C852D3442355B37417CE6BF26AD63
                      SHA-512:835C5EB8C489A6DFB6687738CC2972E9197BCBD5EC9D2B633553AF56E8F4BA121A885D9127334FCD516885526D7B0980ED4827D8EDF8A756719397622E246183
                      Malicious:false
                      Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. T.h.u. .. O.c.t. .. 0.5. .. 2.0.2.3. .1.2.:.2.8.:.3.6.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .W.S.C. .S.t.a.t.e. .I.n.f.o. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .A.n.t.i.V.i.r.u.s.P.r.o.d.u.c.t. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....d.i.s.p.l.a.y.N.a.m.e. .=. .[.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.].....p.a.t.h.T.o.S.i.g.n.e.d.P.r.o.d.u.c.t.E.x.e. .=. .[.w.i.n.d.o.w.s.d.
                      Process:C:\Users\user\Desktop\o00DuIdf3j.exe
                      File Type:ASCII text, with CRLF, CR line terminators
                      Category:dropped
                      Size (bytes):261
                      Entropy (8bit):5.127855223224985
                      Encrypted:false
                      SSDEEP:6:o98fLCkAG25zZvRfpChZxaF1vRfxwEHzCkXuxaF1vn:o+jgROkiETR+S
                      MD5:32B6F7D626FA89B715BBD48F0DF4C5EF
                      SHA1:4B75182217414273C3A73B6AB5C44FA895DB65F5
                      SHA-256:E127682B273818811EA14C9515B8E27535427066B0244BFE4025841BCE4458D2
                      SHA-512:AFE3BA3687367FB6B007D8DF68FF7F0CE0CE59FEC05AF104D8C5EBA817F1BD1331213882C3841F217D6ACD0D15314B33F89CA1B06C993DC908B061DE45EDB8B8
                      Malicious:false
                      Preview:[2024-07-24 13:27:54.863] unable to open "C:\Users\user\Desktop\config.json"....[2024-07-24 13:27:54.869] unable to open "C:\Users\user\.Microsoft SQL Server.json"....[2024-07-24 13:27:54.870] unable to open "C:\Users\user\.config\Microsoft SQL Server.json"....
                      File type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                      Entropy (8bit):6.638536357915922
                      TrID:
                      • Win64 Executable (generic) (12005/4) 74.95%
                      • Generic Win/DOS Executable (2004/3) 12.51%
                      • DOS Executable Generic (2002/1) 12.50%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                      File name:o00DuIdf3j.exe
                      File size:8'249'344 bytes
                      MD5:838ffbf08e5c7f0efa1eecf16fbf5503
                      SHA1:7a21e68072a9a7e19ceedb271efc6a3febad5c68
                      SHA256:6801fc9f21096f135e42d3a2b9ea1385c0c7ebd41c43e76d3083d769efd46480
                      SHA512:54fb7392efb35536b3a01622f4325a2115b68c0fdc3b2a1dc7d7ddd1806d984e6ca1fc474de868317d1639fa65086e2fa6e40ba92da17bc39bb34e33aada5618
                      SSDEEP:98304:eHZycwKostlQKukSPs0UcomhXMmNH1W5GJw/PAqxKW0dVsS9gMZyT+REWRVd4ch2:G4jmxKmJe5LuGsMPZBkP
                      TLSH:C9866C57F19350ECC56BD174871BAB73FA31B8590134BE6B2664EB302E22F905B2EB14
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...<.4e...............).^]...}...2............@.............................P......@g~...`... ............................
                      Icon Hash:2a23233166de9a24
                      Entrypoint:0x1400013f0
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x140000000
                      Subsystem:windows cui
                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                      Time Stamp:0x65340B3C [Sat Oct 21 17:32:44 2023 UTC]
                      TLS Callbacks:0x4040ca50, 0x1, 0x4040ca20, 0x1, 0x4041bea0, 0x1
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:c919645bdd0df86085334c6ba40cf3db
                      Instruction
                      dec eax
                      sub esp, 28h
                      dec eax
                      mov eax, dword ptr [00729165h]
                      mov dword ptr [eax], 00000000h
                      call 00007FE0A50E0C8Fh
                      nop
                      nop
                      dec eax
                      add esp, 28h
                      ret
                      nop dword ptr [eax]
                      dec eax
                      sub esp, 28h
                      call 00007FE0A54F8D44h
                      dec eax
                      cmp eax, 01h
                      sbb eax, eax
                      dec eax
                      add esp, 28h
                      ret
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      dec eax
                      lea ecx, dword ptr [00000009h]
                      jmp 00007FE0A50E0EE9h
                      nop dword ptr [eax+00h]
                      ret
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      inc ecx
                      push ebp
                      inc ecx
                      push esp
                      push ebp
                      push edi
                      push esi
                      push ebx
                      dec eax
                      sub esp, 28h
                      inc ecx
                      mov eax, dword ptr [eax]
                      dec ecx
                      cmp dword ptr [ecx+18h], 00000000h
                      dec esp
                      mov esp, dword ptr [esp+00000080h]
                      dec eax
                      mov ebp, dword ptr [esp+00000090h]
                      mov dword ptr [ecx], eax
                      inc ecx
                      mov eax, dword ptr [ecx+04h]
                      dec eax
                      mov ebx, ecx
                      dec ecx
                      mov ebp, edx
                      setne byte ptr [ecx+08h]
                      dec esp
                      mov esi, ecx
                      dec esp
                      mov edi, eax
                      mov dword ptr [ecx+04h], eax
                      dec esp
                      mov ecx, ecx
                      call 00007FE0A5161CD0h
                      mov edx, dword ptr [edi]
                      dec esp
                      mov dword ptr [ebx+18h], ebp
                      movzx eax, al
                      mov ah, byte ptr [esi+0Bh]
                      mov word ptr [ebx+09h], ax
                      mov eax, dword ptr [esi+10h]
                      mov dword ptr [ebx+0Ch], eax
                      dec ecx
                      mov eax, dword ptr [esp]
                      dec eax
                      mov dword ptr [ebx+10h], eax
                      dec eax
                      mov eax, dword ptr [esp+00000088h]
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xad10000x4454.idata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xad80000x232c4.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x7470000x2e6d4.pdata
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xafc0000x8cf0.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x727ba00x28.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0xad1fa00xeb0.idata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x5d5d280x5d5e00795d4e773fb25475b6a7d7c8ba1434bdunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .data0x5d70000xf5200xf60078a411f4eff945c088c1e9322b2313d3False0.2164157774390244data3.467041723866877IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rdata0x5e70000x15f2f00x15f4009af38b2bf908a7ee6c697bc49c21b4c3False0.37503614323843415data6.467848612868718IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .pdata0x7470000x2e6d40x2e800d68ecc9a6c062ca0df8457aec4b51cd8False0.5202137936827957data6.374333995669526IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .xdata0x7760000x39e840x3a000e10f21c41760bc550d1328812cb2d396False0.2164811759159483data5.053964180227404IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .bss0x7b00000x3208a00x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .idata0xad10000x44540x4600c0fd96646f0d23b54544d71a4de7629eFalse0.28152901785714285SysEx File - Oberheim4.664601370946822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .CRT0xad60000x680x2002d9156f678950ca7ee5519d501f821d8False0.078125data0.3987580953115579IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .tls0xad70000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0xad80000x240000x23400b71d404b61051077167b6a9a6b988424False0.3685588430851064data5.419328638649052IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0xafc0000x8cf00x8e006a6cb945a9e191f08fca38159ba4986aFalse0.2566571302816901data5.459578566267068IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0xad8fd00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.37283236994219654
                      RT_ICON0xad95380x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5212765957446809
                      RT_ICON0xad99a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.6362815884476535
                      RT_ICON0xada2480x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.21951219512195122
                      RT_ICON0xadb2f00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.6962996389891697
                      RT_ICON0xadbb980x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.5317919075144508
                      RT_ICON0xadc1000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.37124765478424016
                      RT_ICON0xadd1a80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.5354609929078015
                      RT_ICON0xadd6100x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.7793321299638989
                      RT_ICON0xaddeb80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.634393063583815
                      RT_ICON0xade4200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.6306285178236398
                      RT_ICON0xadf4c80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.6214539007092199
                      RT_ICON0xadf9300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.4029783393501805
                      RT_ICON0xae01d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.45664739884393063
                      RT_ICON0xae07400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.2668855534709193
                      RT_ICON0xae17e80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5487588652482269
                      RT_ICON0xae1c500x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.6935920577617328
                      RT_ICON0xae24f80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.4458092485549133
                      RT_ICON0xae2a600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.4047842401500938
                      RT_ICON0xae3b080x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.4734042553191489
                      RT_ICON0xae3f700x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.5893501805054152
                      RT_ICON0xae48180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.5361271676300579
                      RT_ICON0xae4d800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.40290806754221387
                      RT_ICON0xae5e280x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6391843971631206
                      RT_ICON0xae62900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.5979241877256317
                      RT_ICON0xae6b380x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.476878612716763
                      RT_ICON0xae70a00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.40924015009380865
                      RT_ICON0xae81480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6161347517730497
                      RT_ICON0xae85b00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.7779783393501805
                      RT_ICON0xae8e580x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.661849710982659
                      RT_ICON0xae93c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.6303939962476548
                      RT_ICON0xaea4680x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.6400709219858156
                      RT_ICON0xaea8d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.5857400722021661
                      RT_ICON0xaeb1780x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.6271676300578035
                      RT_ICON0xaeb6e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.5446750902527075
                      RT_ICON0xaebf880x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.6286127167630058
                      RT_ICON0xaec4f00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.6358303249097473
                      RT_ICON0xaecd980x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.4761560693641618
                      RT_ICON0xaed3000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.42354596622889307
                      RT_ICON0xaee3a80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6072695035460993
                      RT_ICON0xaee8100x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.6358303249097473
                      RT_ICON0xaef0b80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.4761560693641618
                      RT_ICON0xaef6200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.42354596622889307
                      RT_ICON0xaf06c80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6072695035460993
                      RT_ICON0xaf0b300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.4851083032490975
                      RT_ICON0xaf13d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.3836705202312139
                      RT_ICON0xaf19400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.27650093808630394
                      RT_ICON0xaf29e80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.4778368794326241
                      RT_ICON0xaf2e500x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.4864864864864865
                      RT_ICON0xaf2f780x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.342485549132948
                      RT_ICON0xaf34e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.37677304964539005
                      RT_ICON0xaf39480x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.271505376344086
                      RT_ICON0xaf3c300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.6403429602888087
                      RT_ICON0xaf44d80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.34849906191369606
                      RT_ICON0xaf55800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.3786127167630058
                      RT_ICON0xaf5ae80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.46897163120567376
                      RT_ICON0xaf5f500x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.6471119133574007
                      RT_ICON0xaf67f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.3611632270168856
                      RT_ICON0xaf78a00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.32803468208092484
                      RT_ICON0xaf7e080x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3723404255319149
                      RT_ICON0xaf82700x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.5848375451263538
                      RT_ICON0xaf8b180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.5267341040462428
                      RT_ICON0xaf90800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.40290806754221387
                      RT_ICON0xafa1280x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6453900709219859
                      RT_GROUP_ICON0xafa5900x3edataEnglishUnited States0.7903225806451613
                      RT_GROUP_ICON0xafa5d00x3edataEnglishUnited States0.8064516129032258
                      RT_GROUP_ICON0xafa6100x3edataEnglishUnited States0.8064516129032258
                      RT_GROUP_ICON0xafa6500x3edataEnglishUnited States0.8064516129032258
                      RT_GROUP_ICON0xafa6900x3edataEnglishUnited States0.8064516129032258
                      RT_GROUP_ICON0xafa6d00x3edataEnglishUnited States0.8225806451612904
                      RT_GROUP_ICON0xafa7100x3edataEnglishUnited States0.8225806451612904
                      RT_GROUP_ICON0xafa7500x3edataEnglishUnited States0.8225806451612904
                      RT_GROUP_ICON0xafa7900x3edataEnglishUnited States0.6774193548387096
                      RT_GROUP_ICON0xafa7d00x3edataEnglishUnited States0.8225806451612904
                      RT_GROUP_ICON0xafa8100x3edataEnglishUnited States0.8225806451612904
                      RT_GROUP_ICON0xafa8500x3edataEnglishUnited States0.8387096774193549
                      RT_GROUP_ICON0xafa8900x5adataEnglishUnited States0.7666666666666667
                      RT_GROUP_ICON0xafa8ec0x3edataEnglishUnited States0.8387096774193549
                      RT_GROUP_ICON0xafa92c0x22dataEnglishUnited States1.0294117647058822
                      RT_GROUP_ICON0xafa9500x3edataEnglishUnited States0.8387096774193549
                      RT_VERSION0xafa9900x4a4dataEnglishUnited States0.4393939393939394
                      RT_MANIFEST0xafae340x48fXML 1.0 document, ASCII text0.40102827763496146
                      DLLImport
                      ADVAPI32.dllAdjustTokenPrivileges, AllocateAndInitializeSid, CloseServiceHandle, ControlService, CreateServiceW, CryptAcquireContextW, CryptCreateHash, CryptDecrypt, CryptDestroyHash, CryptDestroyKey, CryptEnumProvidersW, CryptExportKey, CryptGenRandom, CryptGetProvParam, CryptGetUserKey, CryptReleaseContext, CryptSetHashParam, CryptSignHashW, DeleteService, DeregisterEventSource, FreeSid, GetSecurityInfo, GetTokenInformation, GetUserNameW, LookupPrivilegeValueW, LsaAddAccountRights, LsaClose, LsaOpenPolicy, OpenProcessToken, OpenSCManagerW, OpenServiceW, QueryServiceConfigA, QueryServiceStatus, RegCloseKey, RegGetValueW, RegOpenKeyExW, RegQueryValueExW, RegisterEventSourceW, ReportEventW, SetEntriesInAclA, SetSecurityInfo, StartServiceW, SystemFunction036
                      CRYPT32.dllCertCloseStore, CertDuplicateCertificateContext, CertEnumCertificatesInStore, CertFindCertificateInStore, CertFreeCertificateContext, CertGetCertificateContextProperty, CertOpenStore
                      IPHLPAPI.DLLConvertInterfaceIndexToLuid, ConvertInterfaceLuidToNameW, GetAdaptersAddresses
                      KERNEL32.dllAddVectoredExceptionHandler, AssignProcessToJobObject, CancelIo, CancelIoEx, CancelSynchronousIo, CloseHandle, ConnectNamedPipe, ConvertFiberToThread, ConvertThreadToFiber, CopyFileW, CreateDirectoryW, CreateEventA, CreateFiber, CreateFileA, CreateFileMappingA, CreateFileW, CreateHardLinkW, CreateIoCompletionPort, CreateJobObjectW, CreateNamedPipeA, CreateNamedPipeW, CreateProcessW, CreateSemaphoreA, CreateSemaphoreW, CreateSymbolicLinkW, CreateToolhelp32Snapshot, DebugBreak, DeleteCriticalSection, DeleteFiber, DeviceIoControl, DuplicateHandle, EnterCriticalSection, ExpandEnvironmentStringsA, FileTimeToSystemTime, FillConsoleOutputAttribute, FillConsoleOutputCharacterW, FindClose, FindFirstFileW, FindNextFileW, FindResourceW, FlushFileBuffers, FlushInstructionCache, FlushViewOfFile, FormatMessageA, FormatMessageW, FreeConsole, FreeEnvironmentStringsW, FreeLibrary, GetConsoleCursorInfo, GetConsoleMode, GetConsoleScreenBufferInfo, GetConsoleTitleW, GetConsoleWindow, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetDiskFreeSpaceW, GetEnvironmentStringsW, GetEnvironmentVariableW, GetExitCodeProcess, GetFileAttributesA, GetFileAttributesW, GetFileInformationByHandle, GetFileInformationByHandleEx, GetFileSizeEx, GetFileType, GetFinalPathNameByHandleW, GetFullPathNameW, GetHandleInformation, GetLargePageMinimum, GetLastError, GetLongPathNameW, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetNamedPipeHandleStateA, GetNativeSystemInfo, GetNumberOfConsoleInputEvents, GetPriorityClass, GetProcAddress, GetProcessAffinityMask, GetProcessHeap, GetProcessIoCounters, GetProcessTimes, GetQueuedCompletionStatus, GetShortPathNameW, GetStartupInfoW, GetStdHandle, GetSystemFirmwareTable, GetSystemInfo, GetSystemPowerStatus, GetSystemTime, GetSystemTimeAdjustment, GetSystemTimeAsFileTime, GetTempPathW, GetThreadContext, GetThreadPriority, GetThreadTimes, GetTickCount, GetTickCount64, GetVersion, GetVersionExW, GlobalMemoryStatusEx, HeapAlloc, HeapFree, InitializeConditionVariable, InitializeCriticalSection, InitializeCriticalSectionAndSpinCount, IsDBCSLeadByteEx, IsDebuggerPresent, IsProcessorFeaturePresent, LCMapStringW, LeaveCriticalSection, LoadLibraryA, LoadLibraryExW, LoadLibraryW, LoadResource, LocalAlloc, LocalFree, LockResource, MapViewOfFile, MoveFileExW, MultiByteToWideChar, OpenProcess, OutputDebugStringA, PeekNamedPipe, PostQueuedCompletionStatus, Process32First, Process32Next, QueryPerformanceCounter, QueryPerformanceFrequency, QueueUserWorkItem, RaiseException, ReOpenFile, ReadConsoleA, ReadConsoleInputW, ReadConsoleW, ReadDirectoryChangesW, ReadFile, RegisterWaitForSingleObject, ReleaseSemaphore, RemoveDirectoryW, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, RtlCaptureContext, RtlLookupFunctionEntry, RtlUnwindEx, RtlVirtualUnwind, SetConsoleCtrlHandler, SetConsoleCursorInfo, SetConsoleCursorPosition, SetConsoleMode, SetConsoleTextAttribute, SetConsoleTitleA, SetConsoleTitleW, SetCurrentDirectoryW, SetEnvironmentVariableW, SetErrorMode, SetEvent, SetFileCompletionNotificationModes, SetFilePointerEx, SetFileTime, SetHandleInformation, SetInformationJobObject, SetLastError, SetNamedPipeHandleState, SetPriorityClass, SetProcessAffinityMask, SetSystemTime, SetThreadAffinityMask, SetThreadContext, SetThreadPriority, SetUnhandledExceptionFilter, SizeofResource, Sleep, SleepConditionVariableCS, SuspendThread, SwitchToFiber, SwitchToThread, SystemTimeToFileTime, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryEnterCriticalSection, UnmapViewOfFile, UnregisterWait, UnregisterWaitEx, VerSetConditionMask, VerifyVersionInfoA, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WaitNamedPipeW, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteConsoleInputW, WriteConsoleW, WriteFile, __C_specific_handler
                      msvcrt.dll___lc_codepage_func, ___mb_cur_max_func, __argv, __doserrno, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _assert, _beginthreadex, _cexit, _close, _commode, _close, _endthreadex, _errno, _exit, _fdopen, _fileno, _findclose, _fileno, _findfirst64, _findnext64, _fmode, _fstat64, _fullpath, _get_osfhandle, _gmtime64, _initterm, _isatty, _localtime64, _lock, _lseeki64, _mkdir, _onexit, _open, _open_osfhandle, _read, _read, _setjmp, _setmode, _snwprintf, _stat64, _strdup, _strdup, _stricmp, _strnicmp, _strtoi64, _strtoui64, _time64, _ultoa, _umask, _unlock, _vscprintf, _vsnprintf, _vsnwprintf, _wchmod, _wcsdup, _wcsnicmp, _wcsrev, _wfopen, _wmkdir, _wopen, _write, _write, _wrmdir, abort, atof, atoi, calloc, exit, fclose, feof, ferror, fflush, fgets, fopen, fprintf, fputc, fputs, fread, free, fseek, ftell, fwrite, getenv, isspace, iswctype, localeconv, longjmp, malloc, memchr, memcmp, memcpy, memmove, memset, printf, qsort, raise, rand, realloc, setlocale, setvbuf, signal, sprintf, srand, sscanf, strcat, strchr, strcmp, strcoll, strcpy, strcspn, strerror, strftime, strlen, strncmp, strncpy, strrchr, strspn, strstr, strtol, strtoul, strxfrm, tolower, toupper, towlower, towupper, vfprintf, wcschr, wcscmp, wcscoll, wcscpy, wcsftime, wcslen, wcsncmp, wcsncpy, wcspbrk, wcsrchr, wcsstr, wcstombs, wcsxfrm
                      ole32.dllCoCreateInstance, CoInitializeEx, CoUninitialize
                      PSAPI.DLLGetProcessMemoryInfo
                      SHELL32.dllSHGetSpecialFolderPathA
                      USER32.dllDispatchMessageA, GetLastInputInfo, GetMessageA, GetProcessWindowStation, GetSystemMetrics, GetUserObjectInformationW, MapVirtualKeyW, MessageBoxW, ShowWindow, TranslateMessage
                      USERENV.dllGetUserProfileDirectoryW
                      WS2_32.dllFreeAddrInfoW, GetAddrInfoW, WSACleanup, WSADuplicateSocketW, WSAGetLastError, WSAIoctl, WSARecv, WSARecvFrom, WSASend, WSASendTo, WSASetLastError, WSASocketW, WSAStartup, accept, bind, closesocket, connect, freeaddrinfo, getaddrinfo, gethostbyname, gethostname, getnameinfo, getpeername, getsockname, getsockopt, htonl, htons, ioctlsocket, listen, ntohs, recv, select, send, setsockopt, shutdown, socket
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 24, 2024 17:35:52.844789982 CEST4970480192.168.2.1088.198.117.174
                      Jul 24, 2024 17:35:52.849952936 CEST804970488.198.117.174192.168.2.10
                      Jul 24, 2024 17:35:52.850090027 CEST4970480192.168.2.1088.198.117.174
                      Jul 24, 2024 17:35:52.874908924 CEST4970480192.168.2.1088.198.117.174
                      Jul 24, 2024 17:35:52.879864931 CEST804970488.198.117.174192.168.2.10
                      Jul 24, 2024 17:35:53.563493013 CEST804970488.198.117.174192.168.2.10
                      Jul 24, 2024 17:35:53.605326891 CEST4970480192.168.2.1088.198.117.174
                      Jul 24, 2024 17:36:48.223956108 CEST4970480192.168.2.1088.198.117.174
                      Jul 24, 2024 17:36:48.229032993 CEST804970488.198.117.174192.168.2.10
                      Jul 24, 2024 17:36:51.127362013 CEST804970488.198.117.174192.168.2.10
                      Jul 24, 2024 17:36:51.237922907 CEST4970480192.168.2.1088.198.117.174
                      Jul 24, 2024 17:37:51.260251999 CEST4970480192.168.2.1088.198.117.174
                      Jul 24, 2024 17:37:51.267816067 CEST804970488.198.117.174192.168.2.10
                      Jul 24, 2024 17:37:51.461868048 CEST804970488.198.117.174192.168.2.10
                      Jul 24, 2024 17:37:51.522640944 CEST4970480192.168.2.1088.198.117.174
                      Jul 24, 2024 17:38:51.977926970 CEST804970488.198.117.174192.168.2.10
                      Jul 24, 2024 17:38:52.058753967 CEST4970480192.168.2.1088.198.117.174
                      Jul 24, 2024 17:39:03.810759068 CEST4970480192.168.2.1088.198.117.174
                      Jul 24, 2024 17:39:03.869538069 CEST804970488.198.117.174192.168.2.10
                      Jul 24, 2024 17:39:12.970422983 CEST804970488.198.117.174192.168.2.10
                      Jul 24, 2024 17:39:13.058747053 CEST4970480192.168.2.1088.198.117.174
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 24, 2024 17:35:52.822762012 CEST6425353192.168.2.101.1.1.1
                      Jul 24, 2024 17:35:52.833714008 CEST53642531.1.1.1192.168.2.10
                      Jul 24, 2024 17:36:19.066660881 CEST53506231.1.1.1192.168.2.10
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Jul 24, 2024 17:35:52.822762012 CEST192.168.2.101.1.1.10x3a50Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Jul 24, 2024 17:35:52.833714008 CEST1.1.1.1192.168.2.100x3a50No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                      Jul 24, 2024 17:35:52.833714008 CEST1.1.1.1192.168.2.100x3a50No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.104970488.198.117.174805736C:\Users\user\Desktop\o00DuIdf3j.exe
                      TimestampBytes transferredDirectionData
                      Jul 24, 2024 17:35:52.874908924 CEST589OUTData Raw: 7b 22 69 64 22 3a 31 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6c 6f 67 69 6e 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 6c 6f 67 69 6e 22 3a 22 34 37 54 55 44 35 57 63 71 48 78 59 66 65 69 4d 31 71 33 52 50 71
                      Data Ascii: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"47TUD5WcqHxYfeiM1q3RPqMnBQJnFNzU8gay8YjTqYHY3s6p11gdrCYRAZQ54WyYFwPzKkW9Vtsg2VePPCK7xpsbKLAYaCC+100000","pass":"x","agent":"Microsoft SQL Server/10.50.1600.2 (Windows NT 10.0; Win64;
                      Jul 24, 2024 17:35:53.563493013 CEST413INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 69 64 22 3a 31 2c 22 65 72 72 6f 72 22 3a 6e 75 6c 6c 2c 22 72 65 73 75 6c 74 22 3a 7b 22 69 64 22 3a 22 34 34 37 36 38 39 39 35 22 2c 22 6a 6f 62 22 3a 7b 22 62 6c 6f 62 22 3a 22 30 31 30 31
                      Data Ascii: {"jsonrpc":"2.0","id":1,"error":null,"result":{"id":"44768995","job":{"blob":"0101f2ba84b506deff32223c7ac54f58611e2f2d4f00871b961bcac2411eccc51ca74492fbf14f00000000fdd55d5c86ef32d4270cc91ae3c7708ba01ada4600d7e02e160bedf045cba2bb01","algo":"rx/
                      Jul 24, 2024 17:36:48.223956108 CEST185OUTData Raw: 7b 22 69 64 22 3a 32 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 73 75 62 6d 69 74 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 69 64 22 3a 22 34 34 37 36 38 39 39 35 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 34 34 37 36
                      Data Ascii: {"id":2,"jsonrpc":"2.0","method":"submit","params":{"id":"44768995","job_id":"44768996","nonce":"55080200","result":"ae6576d920222a6f8bc699aed42d9ad19b26320ff2911e476d02955d09800000"}}
                      Jul 24, 2024 17:36:51.127362013 CEST63INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 69 64 22 3a 32 2c 22 65 72 72 6f 72 22 3a 6e 75 6c 6c 2c 22 72 65 73 75 6c 74 22 3a 7b 22 73 74 61 74 75 73 22 3a 22 4f 4b 22 7d 7d 0a
                      Data Ascii: {"jsonrpc":"2.0","id":2,"error":null,"result":{"status":"OK"}}
                      Jul 24, 2024 17:37:51.260251999 CEST74OUTData Raw: 7b 22 69 64 22 3a 33 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6b 65 65 70 61 6c 69 76 65 64 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 69 64 22 3a 22 34 34 37 36 38 39 39 35 22 7d 7d 0a
                      Data Ascii: {"id":3,"jsonrpc":"2.0","method":"keepalived","params":{"id":"44768995"}}
                      Jul 24, 2024 17:37:51.461868048 CEST71INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 69 64 22 3a 33 2c 22 65 72 72 6f 72 22 3a 6e 75 6c 6c 2c 22 72 65 73 75 6c 74 22 3a 7b 22 73 74 61 74 75 73 22 3a 22 4b 45 45 50 41 4c 49 56 45 44 22 7d 7d 0a
                      Data Ascii: {"jsonrpc":"2.0","id":3,"error":null,"result":{"status":"KEEPALIVED"}}
                      Jul 24, 2024 17:38:51.977926970 CEST370INData Raw: 7b 22 6d 65 74 68 6f 64 22 3a 22 6a 6f 62 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 62 6c 6f 62 22 3a 22 30 31 30 31 66 38 62 66 38 34 62 35 30 36 32 31 32 30 32 30 61 36 35 63 34 36 61 30 66 31 34 65 66 35 39 64 65 39 35 32 61 66 62 32 36 36 63 33
                      Data Ascii: {"method":"job","params":{"blob":"0101f8bf84b506212020a65c46a0f14ef59de952afb266c3190654e39e3900966e56b276b2ea4900000000313ea04234374586413679abf378ccf9cb8146193e4cc257d4f424b026ee9d1f24","algo":"rx/0","height":17713,"seed_hash":"761a858c346f1
                      Jul 24, 2024 17:39:03.810759068 CEST185OUTData Raw: 7b 22 69 64 22 3a 34 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 73 75 62 6d 69 74 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 69 64 22 3a 22 34 34 37 36 38 39 39 35 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 34 34 38 36
                      Data Ascii: {"id":4,"jsonrpc":"2.0","method":"submit","params":{"id":"44768995","job_id":"44866432","nonce":"b9070000","result":"1122bfe2811fcc03f1736307610bf28075e423f726be3e2a42aee5b1f4900000"}}
                      Jul 24, 2024 17:39:12.970422983 CEST63INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 69 64 22 3a 34 2c 22 65 72 72 6f 72 22 3a 6e 75 6c 6c 2c 22 72 65 73 75 6c 74 22 3a 7b 22 73 74 61 74 75 73 22 3a 22 4f 4b 22 7d 7d 0a
                      Data Ascii: {"jsonrpc":"2.0","id":4,"error":null,"result":{"status":"OK"}}


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:11:35:51
                      Start date:24/07/2024
                      Path:C:\Users\user\Desktop\o00DuIdf3j.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Users\user\Desktop\o00DuIdf3j.exe"
                      Imagebase:0x7ff6cb120000
                      File size:8'249'344 bytes
                      MD5 hash:838FFBF08E5C7F0EFA1EECF16FBF5503
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000000.00000002.3717041462.0000018F0312F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000000.00000002.3717041462.0000018F03156000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000000.00000002.3716653542.0000018F01765000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000000.00000003.1253197542.0000018F03140000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000000.00000003.1253197542.0000018F03131000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000000.00000000.1251503134.00007FF6CB707000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: Linux_Trojan_Pornoasset_927f314f, Description: unknown, Source: 00000000.00000000.1250365416.00007FF6CB121000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                      Reputation:low
                      Has exited:false

                      Target ID:2
                      Start time:11:35:51
                      Start date:24/07/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff620390000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:3
                      Start time:11:35:52
                      Start date:24/07/2024
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                      Imagebase:0x7ff7df220000
                      File size:55'320 bytes
                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                      Has elevated privileges:true
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:4
                      Start time:11:35:52
                      Start date:24/07/2024
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\svchost.exe -k UnistackSvcGroup
                      Imagebase:0x7ff7df220000
                      File size:55'320 bytes
                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:5
                      Start time:11:35:53
                      Start date:24/07/2024
                      Path:C:\Windows\System32\Sgrmuserer.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\Sgrmuserer.exe
                      Imagebase:0x7ff74f320000
                      File size:329'504 bytes
                      MD5 hash:3BA1A18A0DC30A0545E7765CB97D8E63
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:6
                      Start time:11:35:53
                      Start date:24/07/2024
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                      Imagebase:0x7ff7df220000
                      File size:55'320 bytes
                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:7
                      Start time:11:35:53
                      Start date:24/07/2024
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC
                      Imagebase:0x7ff7df220000
                      File size:55'320 bytes
                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:8
                      Start time:11:35:53
                      Start date:24/07/2024
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
                      Imagebase:0x7ff7df220000
                      File size:55'320 bytes
                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                      Has elevated privileges:true
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:10
                      Start time:11:36:37
                      Start date:24/07/2024
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                      Imagebase:0x7ff7df220000
                      File size:55'320 bytes
                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                      Has elevated privileges:true
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:11
                      Start time:11:36:54
                      Start date:24/07/2024
                      Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Imagebase:0x7ff743970000
                      File size:468'120 bytes
                      MD5 hash:B3676839B2EE96983F9ED735CD044159
                      Has elevated privileges:true
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:12
                      Start time:11:36:54
                      Start date:24/07/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff620390000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      No disassembly