Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe
Analysis ID:1515709
MD5:3d6e1d057586142252bfda5c5f551f55
SHA1:315ff32c3874ce106f451024492ca92ab5067314
SHA256:d70343ca7ab0028fb1218096640e1327f7bd204f1eb924c3af6f30c63f39859a
Tags:exe
Infos:

Detection

SheetRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
System process connects to network (likely due to code injection or exploit)
Yara detected SheetRat
.NET source code contains potential unpacker
AI detected suspicious sample
Allows loading of unsigned dll using appinit_dll
Connects to many ports of the same IP (likely port scanning)
Contains functionality to capture screen (.Net source)
Creates an undocumented autostart registry key
Drops PE files with benign system names
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Suspect Svchost Activity
Sigma detected: System File Execution Location Anomaly
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
PE file does not import any functions
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion NT Autorun Keys Modification
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Uncommon Svchost Parent Process
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe (PID: 6672 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe" MD5: 3D6E1D057586142252BFDA5C5F551F55)
    • WmiPrvSE.exe (PID: 3224 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • cmd.exe (PID: 6212 cmdline: "CMD" netsh advfirewall firewall add rule name=")e7`;$<w;7R";h" dir=in action=allow program="C:\Windows\svchost.exe" enable=yes & exit MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2332 cmdline: "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST & exit MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 5012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 6200 cmdline: schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • cmd.exe (PID: 5396 cmdline: "cmd" /c schtasks /create /f /sc minute /mo 30 /tn "NvNodeLauncher" /tr "C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 4892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 5996 cmdline: schtasks /create /f /sc minute /mo 30 /tn "NvNodeLauncher" /tr "C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • svchost.exe (PID: 1484 cmdline: "C:\Windows\svchost.exe" MD5: 3D6E1D057586142252BFDA5C5F551F55)
  • svchost.exe (PID: 368 cmdline: C:\Windows\svchost.exe MD5: 3D6E1D057586142252BFDA5C5F551F55)
  • xdwdChrome.exe (PID: 7156 cmdline: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe MD5: 3D6E1D057586142252BFDA5C5F551F55)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Windows\xdwd.dllJoeSecurity_SheetRatYara detected SheetRatJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2168941941.00000000130F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SheetRatYara detected SheetRatJoe Security
      Process Memory Space: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe PID: 6672JoeSecurity_SheetRatYara detected SheetRatJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe.13113b30.0.raw.unpackJoeSecurity_SheetRatYara detected SheetRatJoe Security
          0.2.SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe.13113b30.0.unpackJoeSecurity_SheetRatYara detected SheetRatJoe Security

            System Summary

            barindex
            Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, ProcessId: 6672, TargetFilename: C:\Windows\svchost.exe
            Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST & exit, CommandLine: "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST & exit, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, ParentProcessId: 6672, ParentProcessName: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, ProcessCommandLine: "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST & exit, ProcessId: 2332, ProcessName: cmd.exe
            Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST & exit, CommandLine: "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST & exit, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, ParentProcessId: 6672, ParentProcessName: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, ProcessCommandLine: "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST & exit, ProcessId: 2332, ProcessName: cmd.exe
            Source: Process startedAuthor: David Burkett, @signalblur: Data: Command: C:\Windows\svchost.exe, CommandLine: C:\Windows\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\svchost.exe, NewProcessName: C:\Windows\svchost.exe, OriginalFileName: C:\Windows\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1064, ProcessCommandLine: C:\Windows\svchost.exe, ProcessId: 368, ProcessName: svchost.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: C:\Windows\svchost.exe, CommandLine: C:\Windows\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\svchost.exe, NewProcessName: C:\Windows\svchost.exe, OriginalFileName: C:\Windows\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1064, ProcessCommandLine: C:\Windows\svchost.exe, ProcessId: 368, ProcessName: svchost.exe
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Windows\System32\userinit.exe,C:\Windows\svchost.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, ProcessId: 6672, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /create /f /sc minute /mo 30 /tn "NvNodeLauncher" /tr "C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST , CommandLine: schtasks /create /f /sc minute /mo 30 /tn "NvNodeLauncher" /tr "C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST , CommandLine|base64offset|contains: mj,, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "cmd" /c schtasks /create /f /sc minute /mo 30 /tn "NvNodeLauncher" /tr "C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 5396, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks /create /f /sc minute /mo 30 /tn "NvNodeLauncher" /tr "C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST , ProcessId: 5996, ProcessName: schtasks.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\svchost.exe" , CommandLine: "C:\Windows\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Windows\svchost.exe, NewProcessName: C:\Windows\svchost.exe, OriginalFileName: C:\Windows\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, ParentProcessId: 6672, ParentProcessName: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, ProcessCommandLine: "C:\Windows\svchost.exe" , ProcessId: 1484, ProcessName: svchost.exe
            Source: Process startedAuthor: vburov: Data: Command: C:\Windows\svchost.exe, CommandLine: C:\Windows\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\svchost.exe, NewProcessName: C:\Windows\svchost.exe, OriginalFileName: C:\Windows\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1064, ProcessCommandLine: C:\Windows\svchost.exe, ProcessId: 368, ProcessName: svchost.exe

            Persistence and Installation Behavior

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST & exit, CommandLine: "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST & exit, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, ParentProcessId: 6672, ParentProcessName: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, ProcessCommandLine: "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST & exit, ProcessId: 2332, ProcessName: cmd.exe
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeAvira: detected
            Source: C:\Windows\svchost.exeAvira: detection malicious, Label: TR/Agent_AGen.cpenj
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeAvira: detection malicious, Label: TR/Agent_AGen.cpenj
            Source: everyone-subjective.gl.at.ply.ggVirustotal: Detection: 6%Perma Link
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeReversingLabs: Detection: 42%
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeVirustotal: Detection: 58%Perma Link
            Source: C:\Windows\svchost.exeReversingLabs: Detection: 42%
            Source: C:\Windows\svchost.exeVirustotal: Detection: 58%Perma Link
            Source: C:\Windows\xdwd.dllReversingLabs: Detection: 62%
            Source: C:\Windows\xdwd.dllVirustotal: Detection: 65%Perma Link
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeVirustotal: Detection: 58%Perma Link
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeReversingLabs: Detection: 42%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Windows\svchost.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeJoe Sandbox ML: detected
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeJoe Sandbox ML: detected
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: C:\Users\Malware\Desktop\hack tool\Backdoor\SheetRat\SheetRat\bin\Release\Stub\UserMode.pdb source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, 00000000.00000002.2168941941.00000000130F1000.00000004.00000800.00020000.00000000.sdmp, xdwd.dll.0.dr
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet ExplorerJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior

            Networking

            barindex
            Source: C:\Windows\svchost.exeNetwork Connect: 147.185.221.17 21093Jump to behavior
            Source: global trafficTCP traffic: 147.185.221.17 ports 0,1,2,3,9,21093
            Source: global trafficTCP traffic: 192.168.2.6:49711 -> 147.185.221.17:21093
            Source: Joe Sandbox ViewIP Address: 147.185.221.17 147.185.221.17
            Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: everyone-subjective.gl.at.ply.gg
            Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, 00000000.00000002.2164157987.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.3377191713.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.2169022479.00000000032B6000.00000004.00000800.00020000.00000000.sdmp, xdwdChrome.exe, 0000000D.00000002.2185771912.00000000027A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, -.cs.Net Code: @
            Source: svchost.exe.0.dr, -.cs.Net Code: @
            Source: xdwdChrome.exe.0.dr, -.cs.Net Code: @
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeCode function: 0_2_00007FFD347B289D NtProtectVirtualMemory,0_2_00007FFD347B289D
            Source: C:\Windows\svchost.exeCode function: 12_2_00007FFD3478289D NtProtectVirtualMemory,12_2_00007FFD3478289D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile created: C:\Windows\svchost.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile created: C:\Windows\xdwd.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeCode function: 0_2_00007FFD347AE5420_2_00007FFD347AE542
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeCode function: 0_2_00007FFD347AFF300_2_00007FFD347AFF30
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeCode function: 0_2_00007FFD347B16AD0_2_00007FFD347B16AD
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeCode function: 0_2_00007FFD347A78480_2_00007FFD347A7848
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeCode function: 0_2_00007FFD347AD7960_2_00007FFD347AD796
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeCode function: 0_2_00007FFD347B1BC00_2_00007FFD347B1BC0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeCode function: 0_2_00007FFD347A90FA0_2_00007FFD347A90FA
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeCode function: 0_2_00007FFD347B0D000_2_00007FFD347B0D00
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeCode function: 0_2_00007FFD347A046D0_2_00007FFD347A046D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeCode function: 0_2_00007FFD347B0C8D0_2_00007FFD347B0C8D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeCode function: 0_2_00007FFD347B0C3E0_2_00007FFD347B0C3E
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeCode function: 0_2_00007FFD347ACF950_2_00007FFD347ACF95
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeCode function: 0_2_00007FFD347B1BAD0_2_00007FFD347B1BAD
            Source: C:\Windows\svchost.exeCode function: 8_2_00007FFD3478E5428_2_00007FFD3478E542
            Source: C:\Windows\svchost.exeCode function: 8_2_00007FFD3478FEFA8_2_00007FFD3478FEFA
            Source: C:\Windows\svchost.exeCode function: 8_2_00007FFD3478D7968_2_00007FFD3478D796
            Source: C:\Windows\svchost.exeCode function: 8_2_00007FFD34791BC08_2_00007FFD34791BC0
            Source: C:\Windows\svchost.exeCode function: 8_2_00007FFD347890FA8_2_00007FFD347890FA
            Source: C:\Windows\svchost.exeCode function: 8_2_00007FFD3478046D8_2_00007FFD3478046D
            Source: C:\Windows\svchost.exeCode function: 8_2_00007FFD34789EF98_2_00007FFD34789EF9
            Source: C:\Windows\svchost.exeCode function: 8_2_00007FFD3478941D8_2_00007FFD3478941D
            Source: C:\Windows\svchost.exeCode function: 8_2_00007FFD347893FD8_2_00007FFD347893FD
            Source: C:\Windows\svchost.exeCode function: 12_2_00007FFD3477E54212_2_00007FFD3477E542
            Source: C:\Windows\svchost.exeCode function: 12_2_00007FFD3477FF3012_2_00007FFD3477FF30
            Source: C:\Windows\svchost.exeCode function: 12_2_00007FFD347816AD12_2_00007FFD347816AD
            Source: C:\Windows\svchost.exeCode function: 12_2_00007FFD3477784812_2_00007FFD34777848
            Source: C:\Windows\svchost.exeCode function: 12_2_00007FFD3477D79612_2_00007FFD3477D796
            Source: C:\Windows\svchost.exeCode function: 12_2_00007FFD34781BC012_2_00007FFD34781BC0
            Source: C:\Windows\svchost.exeCode function: 12_2_00007FFD347790FA12_2_00007FFD347790FA
            Source: C:\Windows\svchost.exeCode function: 12_2_00007FFD34780D0012_2_00007FFD34780D00
            Source: C:\Windows\svchost.exeCode function: 12_2_00007FFD3477046D12_2_00007FFD3477046D
            Source: C:\Windows\svchost.exeCode function: 12_2_00007FFD34780C8D12_2_00007FFD34780C8D
            Source: C:\Windows\svchost.exeCode function: 12_2_00007FFD3477941D12_2_00007FFD3477941D
            Source: C:\Windows\svchost.exeCode function: 12_2_00007FFD34780C3E12_2_00007FFD34780C3E
            Source: C:\Windows\svchost.exeCode function: 12_2_00007FFD34781BAD12_2_00007FFD34781BAD
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeCode function: 13_2_00007FFD3479046D13_2_00007FFD3479046D
            Source: Joe Sandbox ViewDropped File: C:\Windows\xdwd.dll 35C8D022E1D917F1AABDCEAE98097CCC072161B302F84C768CA63E4B32AC2B66
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeStatic PE information: No import functions for PE file found
            Source: xdwdChrome.exe.0.drStatic PE information: No import functions for PE file found
            Source: svchost.exe.0.drStatic PE information: No import functions for PE file found
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, 00000000.00000002.2164157987.00000000033B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesvchost.exelJ vs SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, 00000000.00000002.2164157987.0000000003388000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesvchost.exelJ vs SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, 00000000.00000000.2136415737.0000000000F02000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesvchost.exelJ vs SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, 00000000.00000002.2170293081.000000001BF4E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeBinary or memory string: OriginalFilenamesvchost.exelJ vs SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe
            Source: xdwdChrome.exe.0.dr, -.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: xdwdChrome.exe.0.dr, -.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: xdwdChrome.exe.0.dr, -.csSecurity API names: File.GetAccessControl
            Source: xdwdChrome.exe.0.dr, -.csSecurity API names: File.SetAccessControl
            Source: xdwdChrome.exe.0.dr, -.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, -.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, -.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: xdwdChrome.exe.0.dr, -.csSecurity API names: File.GetAccessControl
            Source: xdwdChrome.exe.0.dr, -.csSecurity API names: File.SetAccessControl
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, -.csSecurity API names: File.GetAccessControl
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, -.csSecurity API names: File.SetAccessControl
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, -.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, -.csSecurity API names: File.GetAccessControl
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, -.csSecurity API names: File.SetAccessControl
            Source: svchost.exe.0.dr, -.csSecurity API names: File.GetAccessControl
            Source: svchost.exe.0.dr, -.csSecurity API names: File.SetAccessControl
            Source: svchost.exe.0.dr, -.csSecurity API names: File.GetAccessControl
            Source: svchost.exe.0.dr, -.csSecurity API names: File.SetAccessControl
            Source: svchost.exe.0.dr, -.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
            Source: svchost.exe.0.dr, -.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: svchost.exe.0.dr, -.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@19/6@3/1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeMutant created: NULL
            Source: C:\Windows\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\y7pz%svk76dr209la0s5pwbm
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4892:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5012:120:WilError_03
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeVirustotal: Detection: 58%
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeReversingLabs: Detection: 42%
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess created: C:\Windows\System32\cmd.exe "CMD" netsh advfirewall firewall add rule name=")e7`;$<w;7R";h" dir=in action=allow program="C:\Windows\svchost.exe" enable=yes & exit
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess created: C:\Windows\System32\cmd.exe "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST & exit
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST
            Source: unknownProcess created: C:\Windows\svchost.exe C:\Windows\svchost.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess created: C:\Windows\System32\cmd.exe "cmd" /c schtasks /create /f /sc minute /mo 30 /tn "NvNodeLauncher" /tr "C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc minute /mo 30 /tn "NvNodeLauncher" /tr "C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess created: C:\Windows\svchost.exe "C:\Windows\svchost.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess created: C:\Windows\System32\cmd.exe "CMD" netsh advfirewall firewall add rule name=")e7`;$<w;7R";h" dir=in action=allow program="C:\Windows\svchost.exe" enable=yes & exitJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess created: C:\Windows\System32\cmd.exe "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST & exitJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess created: C:\Windows\System32\cmd.exe "cmd" /c schtasks /create /f /sc minute /mo 30 /tn "NvNodeLauncher" /tr "C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exitJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess created: C:\Windows\svchost.exe "C:\Windows\svchost.exe" Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc minute /mo 30 /tn "NvNodeLauncher" /tr "C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: twext.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: cscui.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: workfoldersshell.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: ntshrui.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: cscapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: twinapi.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: wtsapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: starttiledata.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: usermgrcli.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: usermgrproxy.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: acppage.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: msi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: aepic.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\cmd.exeSection loaded: winbrand.dllJump to behavior
            Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\svchost.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: C:\Users\Malware\Desktop\hack tool\Backdoor\SheetRat\SheetRat\bin\Release\Stub\UserMode.pdb source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, 00000000.00000002.2168941941.00000000130F1000.00000004.00000800.00020000.00000000.sdmp, xdwd.dll.0.dr

            Data Obfuscation

            barindex
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, -.cs.Net Code: @ System.AppDomain.Load(byte[])
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, -.cs.Net Code: @
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, -.cs.Net Code: @ System.Reflection.Assembly.Load(byte[])
            Source: svchost.exe.0.dr, -.cs.Net Code: @ System.AppDomain.Load(byte[])
            Source: svchost.exe.0.dr, -.cs.Net Code: @
            Source: svchost.exe.0.dr, -.cs.Net Code: @ System.Reflection.Assembly.Load(byte[])
            Source: xdwdChrome.exe.0.dr, -.cs.Net Code: @ System.AppDomain.Load(byte[])
            Source: xdwdChrome.exe.0.dr, -.cs.Net Code: @
            Source: xdwdChrome.exe.0.dr, -.cs.Net Code: @ System.Reflection.Assembly.Load(byte[])
            Source: xdwd.dll.0.drStatic PE information: section name: _RDATA
            Source: xdwd.dll.0.drStatic PE information: section name: .0Dev
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeCode function: 0_2_00007FFD347A00BD pushad ; iretd 0_2_00007FFD347A00C1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeCode function: 0_2_00007FFD347A7969 push ebx; retf 0_2_00007FFD347A796A
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeCode function: 0_2_00007FFD347A1EEA push FFFFFFE8h; ret 0_2_00007FFD347A1EF9
            Source: C:\Windows\svchost.exeCode function: 8_2_00007FFD347800BD pushad ; iretd 8_2_00007FFD347800C1
            Source: C:\Windows\svchost.exeCode function: 8_2_00007FFD34787969 push ebx; retf 8_2_00007FFD3478796A
            Source: C:\Windows\svchost.exeCode function: 8_2_00007FFD34781EEA push FFFFFFE8h; ret 8_2_00007FFD34781EF9
            Source: C:\Windows\svchost.exeCode function: 12_2_00007FFD347700BD pushad ; iretd 12_2_00007FFD347700C1
            Source: C:\Windows\svchost.exeCode function: 12_2_00007FFD34777969 push ebx; retf 12_2_00007FFD3477796A
            Source: C:\Windows\svchost.exeCode function: 12_2_00007FFD34771EEA push FFFFFFE8h; ret 12_2_00007FFD34771EF9
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeCode function: 13_2_00007FFD34791EEA push FFFFFFE8h; ret 13_2_00007FFD34791EF9
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeCode function: 13_2_00007FFD347900BD pushad ; iretd 13_2_00007FFD347900C1
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeCode function: 13_2_00007FFD34797969 push ebx; retf 13_2_00007FFD3479796A

            Persistence and Installation Behavior

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile created: C:\Windows\svchost.exeJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeExecutable created and started: C:\Windows\svchost.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile created: C:\Windows\xdwd.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile created: C:\Windows\svchost.exeJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile created: C:\Windows\xdwd.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile created: C:\Windows\svchost.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeRegistry value created: RequireSignedAppInit_DLLs 0Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon UserinitJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows AppInit_DLLsJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows LoadAppInit_DLLsJump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE PNPClass = &apos;Camera&apos;
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE PNPClass = &apos;Camera&apos;
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE PNPClass = &apos;Camera&apos;
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE PNPClass = &apos;Camera&apos;
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeMemory allocated: 2EF0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeMemory allocated: 1B0C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\svchost.exeMemory allocated: 26D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\svchost.exeMemory allocated: 1A6D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\svchost.exeMemory allocated: 13A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\svchost.exeMemory allocated: 1B2A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeMemory allocated: C50000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeMemory allocated: 1A790000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeDropped PE file which has not been started: C:\Windows\xdwd.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe TID: 5536Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\svchost.exe TID: 3560Thread sleep count: 183 > 30Jump to behavior
            Source: C:\Windows\svchost.exe TID: 3560Thread sleep time: -75000s >= -30000sJump to behavior
            Source: C:\Windows\svchost.exe TID: 1592Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe TID: 1396Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
            Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
            Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\svchost.exeLast function: Thread delayed
            Source: C:\Windows\svchost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet ExplorerJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
            Source: svchost.exe, 00000008.00000002.3383467270.000000001C096000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\svchost.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\svchost.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\svchost.exeNetwork Connect: 147.185.221.17 21093Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess created: C:\Windows\System32\cmd.exe "CMD" netsh advfirewall firewall add rule name=")e7`;$<w;7R";h" dir=in action=allow program="C:\Windows\svchost.exe" enable=yes & exitJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess created: C:\Windows\System32\cmd.exe "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST & exitJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess created: C:\Windows\System32\cmd.exe "cmd" /c schtasks /create /f /sc minute /mo 30 /tn "NvNodeLauncher" /tr "C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exitJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess created: C:\Windows\svchost.exe "C:\Windows\svchost.exe" Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc minute /mo 30 /tn "NvNodeLauncher" /tr "C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe VolumeInformationJump to behavior
            Source: C:\Windows\svchost.exeQueries volume information: C:\Windows\svchost.exe VolumeInformationJump to behavior
            Source: C:\Windows\svchost.exeQueries volume information: C:\Windows\svchost.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeProcess created: C:\Windows\System32\cmd.exe "CMD" netsh advfirewall firewall add rule name=")e7`;$<w;7R";h" dir=in action=allow program="C:\Windows\svchost.exe" enable=yes & exit
            Source: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, 00000000.00000002.2163874707.00000000014D0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.3383123525.000000001C043000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.3376690018.000000000088B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.2168689144.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.2168404377.0000000001476000.00000004.00000020.00020000.00000000.sdmp, xdwdChrome.exe, 0000000D.00000002.2185069269.0000000000AFB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Windows\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe.13113b30.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe.13113b30.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2168941941.00000000130F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe PID: 6672, type: MEMORYSTR
            Source: Yara matchFile source: C:\Windows\xdwd.dll, type: DROPPED

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe.13113b30.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe.13113b30.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2168941941.00000000130F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe PID: 6672, type: MEMORYSTR
            Source: Yara matchFile source: C:\Windows\xdwd.dll, type: DROPPED
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
            Windows Management Instrumentation
            1
            Scheduled Task/Job
            111
            Process Injection
            221
            Masquerading
            OS Credential Dumping431
            Security Software Discovery
            Remote Services1
            Screen Capture
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Scheduled Task/Job
            2
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            11
            Disable or Modify Tools
            LSASS Memory341
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt1
            DLL Side-Loading
            2
            Registry Run Keys / Startup Folder
            341
            Virtualization/Sandbox Evasion
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            111
            Process Injection
            NTDS223
            System Information Discovery
            Distributed Component Object ModelInput Capture1
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Obfuscated Files or Information
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Software Packing
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1515709 Sample: SecuriteInfo.com.Trojan.Sig... Startdate: 23/09/2024 Architecture: WINDOWS Score: 100 44 everyone-subjective.gl.at.ply.gg 2->44 46 171.39.242.20.in-addr.arpa 2->46 52 Multi AV Scanner detection for domain / URL 2->52 54 Antivirus / Scanner detection for submitted sample 2->54 56 Multi AV Scanner detection for dropped file 2->56 58 13 other signatures 2->58 8 SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe 1 5 2->8         started        12 svchost.exe 2 2->12         started        15 xdwdChrome.exe 1 2->15         started        signatures3 process4 dnsIp5 36 C:\Windows\xdwd.dll, PE32+ 8->36 dropped 38 C:\Windows\svchost.exe, PE32+ 8->38 dropped 40 C:\Users\user\AppData\...\xdwdChrome.exe, PE32+ 8->40 dropped 42 SecuriteInfo.com.T....19245.6407.exe.log, CSV 8->42 dropped 60 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 8->60 62 Creates an undocumented autostart registry key 8->62 64 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 8->64 76 4 other signatures 8->76 17 cmd.exe 1 8->17         started        20 cmd.exe 1 8->20         started        22 cmd.exe 1 8->22         started        24 2 other processes 8->24 48 everyone-subjective.gl.at.ply.gg 147.185.221.17, 21093, 49711, 49717 SALSGIVERUS United States 12->48 66 Antivirus detection for dropped file 12->66 68 System process connects to network (likely due to code injection or exploit) 12->68 70 Multi AV Scanner detection for dropped file 12->70 72 Machine Learning detection for dropped file 15->72 74 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 15->74 file6 signatures7 process8 signatures9 50 Uses schtasks.exe or at.exe to add and modify task schedules 17->50 26 conhost.exe 17->26         started        28 conhost.exe 20->28         started        30 schtasks.exe 1 20->30         started        32 conhost.exe 22->32         started        34 schtasks.exe 1 22->34         started        process10

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe58%VirustotalBrowse
            SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe42%ReversingLabsByteCode-MSIL.Trojan.Variadic
            SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe100%AviraTR/Agent_AGen.cpenj
            SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Windows\svchost.exe100%AviraTR/Agent_AGen.cpenj
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe100%AviraTR/Agent_AGen.cpenj
            C:\Windows\svchost.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe42%ReversingLabsByteCode-MSIL.Trojan.Variadic
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe58%VirustotalBrowse
            C:\Windows\svchost.exe42%ReversingLabsByteCode-MSIL.Trojan.Variadic
            C:\Windows\svchost.exe58%VirustotalBrowse
            C:\Windows\xdwd.dll62%ReversingLabsWin64.Trojan.Generic
            C:\Windows\xdwd.dll66%VirustotalBrowse
            No Antivirus matches
            SourceDetectionScannerLabelLink
            everyone-subjective.gl.at.ply.gg6%VirustotalBrowse
            171.39.242.20.in-addr.arpa0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            everyone-subjective.gl.at.ply.gg
            147.185.221.17
            truetrueunknown
            171.39.242.20.in-addr.arpa
            unknown
            unknownfalseunknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe, 00000000.00000002.2164157987.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.3377191713.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.2169022479.00000000032B6000.00000004.00000800.00020000.00000000.sdmp, xdwdChrome.exe, 0000000D.00000002.2185771912.00000000027A6000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            147.185.221.17
            everyone-subjective.gl.at.ply.ggUnited States
            12087SALSGIVERUStrue
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1515709
            Start date and time:2024-09-23 11:20:07 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 28s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:16
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe
            Detection:MAL
            Classification:mal100.troj.spyw.evad.winEXE@19/6@3/1
            EGA Information:
            • Successful, ratio: 50%
            HCA Information:
            • Successful, ratio: 69%
            • Number of executed functions: 57
            • Number of non-executed functions: 11
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
            • Excluded IPs from analysis (whitelisted): 13.85.23.86, 20.3.187.198, 20.242.39.171, 52.165.165.26
            • Excluded domains from analysis (whitelisted): client.wns.windows.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, ctldl.windowsupdate.com, glb.sls.prod.dcat.dsp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
            • Execution Graph export aborted for target svchost.exe, PID 368 because it is empty
            • Execution Graph export aborted for target xdwdChrome.exe, PID 7156 because it is empty
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            11:21:03Task SchedulerRun new task: NvDriverUpdateCheckDaily path: C:\Windows\svchost.exe
            11:21:05Task SchedulerRun new task: NvNodeLauncher path: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            147.185.221.1780c619d931fa4e5c89fe87aac0b6b143.exeGet hashmaliciousXWormBrowse
              6ab092aeab924edb854b3ff21ea579df.exeGet hashmaliciousXWormBrowse
                Hoodbyunlock.exeGet hashmaliciousXWormBrowse
                  x.exeGet hashmaliciousXWormBrowse
                    cougif6lqM.exeGet hashmaliciousDCRat, XWormBrowse
                      FUDE.bin.exeGet hashmaliciousXWormBrowse
                        system47.exeGet hashmaliciousXWormBrowse
                          setup.exeGet hashmaliciousXWormBrowse
                            APPoKkkk8h.exeGet hashmaliciousUnknownBrowse
                              hatabat.exeGet hashmaliciousBlank Grabber, DCRat, XWormBrowse
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                SALSGIVERUSjQ2ryeS5ZP.exeGet hashmaliciousPureCrypter, Revenge, CyberGate, DCRat, GuLoader, Njrat, PureLog StealerBrowse
                                • 147.185.221.22
                                AutoWizard.exeGet hashmaliciousQuasarBrowse
                                • 147.185.221.22
                                dsadsadsadsadsadsaw.exeGet hashmaliciousQuasarBrowse
                                • 147.185.221.22
                                killerdude.exeGet hashmaliciousQuasarBrowse
                                • 147.185.221.22
                                SecuriteInfo.com.Trojan.TR.Dropper.Gen.22332.4876.exeGet hashmaliciousUnknownBrowse
                                • 147.185.221.19
                                XyjvIO6D4m.exeGet hashmaliciousXWormBrowse
                                • 147.185.221.22
                                vtCneOrnat.exeGet hashmaliciousXWormBrowse
                                • 147.185.221.22
                                jbG3cpmy.exeGet hashmaliciousXWormBrowse
                                • 147.185.221.22
                                client.exeGet hashmaliciousQuasarBrowse
                                • 147.185.221.22
                                NzEsfIiAc0.exeGet hashmaliciousXWormBrowse
                                • 147.185.221.21
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                C:\Windows\xdwd.dllServer.exeGet hashmaliciousUnknownBrowse
                                  beK7HmoXro.exeGet hashmaliciousUnknownBrowse
                                    bJLd0SUHfj.exeGet hashmaliciousUnknownBrowse
                                      TYLtsVPB7g.exeGet hashmaliciousUnknownBrowse
                                        FWH67NqQmR.exeGet hashmaliciousUnknownBrowse
                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe
                                          File Type:CSV text
                                          Category:dropped
                                          Size (bytes):642
                                          Entropy (8bit):5.349816875832946
                                          Encrypted:false
                                          SSDEEP:12:Q3La/KDLI4MWuPXcp1WzAbDLI4MNepQZaOKbbDLI4MWuPOKfSSI6Khav:ML9E4KQMsXE4NpOKDE4KGKZI6Khk
                                          MD5:CE2C9B879749D2DDE6CEE82813F4ED9D
                                          SHA1:45614E9485EF4EEAD572387D9DD69480D1C79888
                                          SHA-256:8F7CD246CA33FC6FF7ED3C425842EEC6433FCDA26F4603C26C3A498273AE83CB
                                          SHA-512:5AB487F6AE9F2E749114FE50DB1EF9FB181B3B0968C92AA787362C59788376FF50F6411ECFAE835CD1001B68E9B1961398A695AB16D5412F09E49A44A769F5EE
                                          Malicious:true
                                          Reputation:low
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Management\8af759007c012da690062882e06694f1\System.Management.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..
                                          Process:C:\Windows\svchost.exe
                                          File Type:Unknown
                                          Category:dropped
                                          Size (bytes):642
                                          Entropy (8bit):5.349816875832946
                                          Encrypted:false
                                          SSDEEP:12:Q3La/KDLI4MWuPXcp1WzAbDLI4MNepQZaOKbbDLI4MWuPOKfSSI6Khav:ML9E4KQMsXE4NpOKDE4KGKZI6Khk
                                          MD5:CE2C9B879749D2DDE6CEE82813F4ED9D
                                          SHA1:45614E9485EF4EEAD572387D9DD69480D1C79888
                                          SHA-256:8F7CD246CA33FC6FF7ED3C425842EEC6433FCDA26F4603C26C3A498273AE83CB
                                          SHA-512:5AB487F6AE9F2E749114FE50DB1EF9FB181B3B0968C92AA787362C59788376FF50F6411ECFAE835CD1001B68E9B1961398A695AB16D5412F09E49A44A769F5EE
                                          Malicious:false
                                          Reputation:low
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Management\8af759007c012da690062882e06694f1\System.Management.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..
                                          Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe
                                          File Type:CSV text
                                          Category:dropped
                                          Size (bytes):642
                                          Entropy (8bit):5.349816875832946
                                          Encrypted:false
                                          SSDEEP:12:Q3La/KDLI4MWuPXcp1WzAbDLI4MNepQZaOKbbDLI4MWuPOKfSSI6Khav:ML9E4KQMsXE4NpOKDE4KGKZI6Khk
                                          MD5:CE2C9B879749D2DDE6CEE82813F4ED9D
                                          SHA1:45614E9485EF4EEAD572387D9DD69480D1C79888
                                          SHA-256:8F7CD246CA33FC6FF7ED3C425842EEC6433FCDA26F4603C26C3A498273AE83CB
                                          SHA-512:5AB487F6AE9F2E749114FE50DB1EF9FB181B3B0968C92AA787362C59788376FF50F6411ECFAE835CD1001B68E9B1961398A695AB16D5412F09E49A44A769F5EE
                                          Malicious:false
                                          Reputation:low
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Management\8af759007c012da690062882e06694f1\System.Management.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..
                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe
                                          File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):390144
                                          Entropy (8bit):6.403960503954171
                                          Encrypted:false
                                          SSDEEP:6144:sf6cYir38TnRwWT6Kydo0O/fKIe8r+HJOnHHCShDETb7:cnYiIlwBKD/fE8r+HJOnCSm
                                          MD5:3D6E1D057586142252BFDA5C5F551F55
                                          SHA1:315FF32C3874CE106F451024492CA92AB5067314
                                          SHA-256:D70343CA7AB0028FB1218096640E1327F7BD204F1EB924C3AF6F30C63F39859A
                                          SHA-512:81763C824DB95773EF0F945E0A93E9025F86C3CF50EB471F42D14F317685A626F99D91C20A3F1FD51316F35D6A6AC48ED80956DD467D5E89EAB7585C65FE8EEE
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 42%
                                          • Antivirus: Virustotal, Detection: 58%, Browse
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...a..f.........."...0.................. ....@...... .......................@............@.......................................................... ..=............................................................................................ ..H............text........ ...................... ..`.rsrc...=.... ......................@..@........................................H........P..(.......{....+...$..........................................".(V....*".(W....*".(X....*".(Y....*".(Z....*".([....*".(\....*".(^....*".(`....*".(a....*".(b....*".(c....*".(d....*".(e....*".(f....*".(g....*".(h....*".(i....*".(j....*".(k....*".(l....*".(m....*".(n....*".(o....*".(p....*".(q....*".(r....*".(s....*".(t....*".(u....*".(v....*".(~....*".(.....*".(.....*".(.....*".(.....*".(.....*".(.....*".(.....*".(.....*".(.....*".(.....*".(.....*".(.....*".(.....*".(.....*".
                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe
                                          File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):390144
                                          Entropy (8bit):6.403960503954171
                                          Encrypted:false
                                          SSDEEP:6144:sf6cYir38TnRwWT6Kydo0O/fKIe8r+HJOnHHCShDETb7:cnYiIlwBKD/fE8r+HJOnCSm
                                          MD5:3D6E1D057586142252BFDA5C5F551F55
                                          SHA1:315FF32C3874CE106F451024492CA92AB5067314
                                          SHA-256:D70343CA7AB0028FB1218096640E1327F7BD204F1EB924C3AF6F30C63F39859A
                                          SHA-512:81763C824DB95773EF0F945E0A93E9025F86C3CF50EB471F42D14F317685A626F99D91C20A3F1FD51316F35D6A6AC48ED80956DD467D5E89EAB7585C65FE8EEE
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 42%
                                          • Antivirus: Virustotal, Detection: 58%, Browse
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...a..f.........."...0.................. ....@...... .......................@............@.......................................................... ..=............................................................................................ ..H............text........ ...................... ..`.rsrc...=.... ......................@..@........................................H........P..(.......{....+...$..........................................".(V....*".(W....*".(X....*".(Y....*".(Z....*".([....*".(\....*".(^....*".(`....*".(a....*".(b....*".(c....*".(d....*".(e....*".(f....*".(g....*".(h....*".(i....*".(j....*".(k....*".(l....*".(m....*".(n....*".(o....*".(p....*".(q....*".(r....*".(s....*".(t....*".(u....*".(v....*".(~....*".(.....*".(.....*".(.....*".(.....*".(.....*".(.....*".(.....*".(.....*".(.....*".(.....*".(.....*".(.....*".(.....*".(.....*".
                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):139264
                                          Entropy (8bit):5.068434958112967
                                          Encrypted:false
                                          SSDEEP:3072:t0iX+jLyDcqaH9a6DFHo6MjD7VbZaZaZ8Xwlk4MHWZpt:t07yDSvdoRj2up
                                          MD5:16E5A492C9C6AE34C59683BE9C51FA31
                                          SHA1:97031B41F5C56F371C28AE0D62A2DF7D585ADABA
                                          SHA-256:35C8D022E1D917F1AABDCEAE98097CCC072161B302F84C768CA63E4B32AC2B66
                                          SHA-512:20FD369172EF5E3E2FDE388666B42E8FE5F0C2BFA338C0345F45E98AF6561A249BA3ECC48C3F16EFCC73F02ECB67B3DDB1E2E8F0E77D18FA00AC34E6379E50B6
                                          Malicious:true
                                          Yara Hits:
                                          • Rule: JoeSecurity_SheetRat, Description: Yara detected SheetRat, Source: C:\Windows\xdwd.dll, Author: Joe Security
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 62%
                                          • Antivirus: Virustotal, Detection: 66%, Browse
                                          Joe Sandbox View:
                                          • Filename: Server.exe, Detection: malicious, Browse
                                          • Filename: beK7HmoXro.exe, Detection: malicious, Browse
                                          • Filename: bJLd0SUHfj.exe, Detection: malicious, Browse
                                          • Filename: TYLtsVPB7g.exe, Detection: malicious, Browse
                                          • Filename: FWH67NqQmR.exe, Detection: malicious, Browse
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Y..8...8...8...S...8...S...8...S..|8...M...8...M...8...M...8...S...8...8...8..;M...8..;MT..8..;M...8..Rich.8..................PE..d......d.........." .................6....................................... ............`.................................................$...(...............................h....i..p............................j..8............................................text............................... ..`.rdata..6...........................@..@.data...(!..........................@....pdata..............................@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..h...........................@..B.0Dev.... ....... .................. ..`................................................................................................................................................................
                                          File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):6.403960503954171
                                          TrID:
                                          • Win64 Executable GUI Net Framework (217006/5) 49.88%
                                          • Win64 Executable GUI (202006/5) 46.43%
                                          • Win64 Executable (generic) (12005/4) 2.76%
                                          • Generic Win/DOS Executable (2004/3) 0.46%
                                          • DOS Executable Generic (2002/1) 0.46%
                                          File name:SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe
                                          File size:390'144 bytes
                                          MD5:3d6e1d057586142252bfda5c5f551f55
                                          SHA1:315ff32c3874ce106f451024492ca92ab5067314
                                          SHA256:d70343ca7ab0028fb1218096640e1327f7bd204f1eb924c3af6f30c63f39859a
                                          SHA512:81763c824db95773ef0f945e0a93e9025f86c3cf50eb471f42d14f317685a626f99d91c20a3f1fd51316f35d6a6ac48ed80956dd467d5e89eab7585c65fe8eee
                                          SSDEEP:6144:sf6cYir38TnRwWT6Kydo0O/fKIe8r+HJOnHHCShDETb7:cnYiIlwBKD/fE8r+HJOnCSm
                                          TLSH:228481686FA58A42E6842A3E85D70D01C72250F233237343371BFB725E45ADEDEAD1D6
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...a..f.........."...0.................. ....@...... .......................@............@................................
                                          Icon Hash:00928e8e8686b000
                                          Entrypoint:0x400000
                                          Entrypoint Section:
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x66CCF161 [Mon Aug 26 21:19:29 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:
                                          Instruction
                                          dec ebp
                                          pop edx
                                          nop
                                          add byte ptr [ebx], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax+eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x620000x63d.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000x5e9e80x5ea0075785557d49bb97adf7b688ba8a9fd73False0.5646672721268163data6.415828295538628IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0x620000x63d0x800ba4da90537330157db48292b2f05374eFalse0.35986328125data3.5971536636367016IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_VERSION0x620a00x3acdataEnglishUnited States0.45
                                          RT_MANIFEST0x6244c0x1f1XML 1.0 document, ASCII text, with CRLF line terminators0.5472837022132797
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          TimestampSource PortDest PortSource IPDest IP
                                          Sep 23, 2024 11:21:05.325195074 CEST4971121093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:21:05.332098961 CEST2109349711147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:21:05.332191944 CEST4971121093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:21:05.351538897 CEST4971121093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:21:05.356940985 CEST2109349711147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:21:26.705773115 CEST2109349711147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:21:26.705873013 CEST4971121093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:21:26.921915054 CEST4971121093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:21:26.923041105 CEST4971721093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:21:26.927098989 CEST2109349711147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:21:26.928169966 CEST2109349717147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:21:26.928288937 CEST4971721093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:21:26.928586960 CEST4971721093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:21:26.933659077 CEST2109349717147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:21:48.348813057 CEST2109349717147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:21:48.349052906 CEST4971721093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:21:48.601540089 CEST4971721093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:21:48.607021093 CEST2109349717147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:21:48.735968113 CEST5621321093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:21:48.741230965 CEST2109356213147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:21:48.741425037 CEST5621321093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:21:48.746134996 CEST5621321093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:21:48.751338005 CEST2109356213147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:22:10.110976934 CEST2109356213147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:22:10.111181021 CEST5621321093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:22:10.312827110 CEST5621321093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:22:10.314263105 CEST5621521093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:22:10.319683075 CEST2109356213147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:22:10.321891069 CEST2109356215147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:22:10.321971893 CEST5621521093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:22:10.322354078 CEST5621521093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:22:10.327146053 CEST2109356215147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:22:31.703845978 CEST2109356215147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:22:31.703950882 CEST5621521093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:22:31.906542063 CEST5621521093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:22:31.907769918 CEST5621621093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:22:31.912550926 CEST2109356215147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:22:31.913395882 CEST2109356216147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:22:31.913481951 CEST5621621093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:22:31.913862944 CEST5621621093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:22:31.918994904 CEST2109356216147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:22:53.313009977 CEST2109356216147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:22:53.313105106 CEST5621621093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:22:53.515660048 CEST5621621093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:22:53.517911911 CEST5621821093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:22:53.520559072 CEST2109356216147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:22:53.522898912 CEST2109356218147.185.221.17192.168.2.6
                                          Sep 23, 2024 11:22:53.522996902 CEST5621821093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:22:53.524066925 CEST5621821093192.168.2.6147.185.221.17
                                          Sep 23, 2024 11:22:53.529042006 CEST2109356218147.185.221.17192.168.2.6
                                          TimestampSource PortDest PortSource IPDest IP
                                          Sep 23, 2024 11:21:05.279608965 CEST6165353192.168.2.61.1.1.1
                                          Sep 23, 2024 11:21:05.315421104 CEST53616531.1.1.1192.168.2.6
                                          Sep 23, 2024 11:21:33.429485083 CEST5354846162.159.36.2192.168.2.6
                                          Sep 23, 2024 11:21:33.911623001 CEST5686153192.168.2.61.1.1.1
                                          Sep 23, 2024 11:21:33.918771982 CEST53568611.1.1.1192.168.2.6
                                          Sep 23, 2024 11:21:48.622703075 CEST6534253192.168.2.61.1.1.1
                                          Sep 23, 2024 11:21:48.656691074 CEST53653421.1.1.1192.168.2.6
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Sep 23, 2024 11:21:05.279608965 CEST192.168.2.61.1.1.10x97a0Standard query (0)everyone-subjective.gl.at.ply.ggA (IP address)IN (0x0001)false
                                          Sep 23, 2024 11:21:33.911623001 CEST192.168.2.61.1.1.10x1028Standard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                          Sep 23, 2024 11:21:48.622703075 CEST192.168.2.61.1.1.10x7c1fStandard query (0)everyone-subjective.gl.at.ply.ggA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Sep 23, 2024 11:21:05.315421104 CEST1.1.1.1192.168.2.60x97a0No error (0)everyone-subjective.gl.at.ply.gg147.185.221.17A (IP address)IN (0x0001)false
                                          Sep 23, 2024 11:21:33.918771982 CEST1.1.1.1192.168.2.60x1028Name error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                          Sep 23, 2024 11:21:48.656691074 CEST1.1.1.1192.168.2.60x7c1fNo error (0)everyone-subjective.gl.at.ply.gg147.185.221.17A (IP address)IN (0x0001)false

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:05:21:01
                                          Start date:23/09/2024
                                          Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.35475.19245.6407.exe"
                                          Imagebase:0xea0000
                                          File size:390'144 bytes
                                          MD5 hash:3D6E1D057586142252BFDA5C5F551F55
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_SheetRat, Description: Yara detected SheetRat, Source: 00000000.00000002.2168941941.00000000130F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:2
                                          Start time:05:21:02
                                          Start date:23/09/2024
                                          Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                          Imagebase:0x7ff717f30000
                                          File size:496'640 bytes
                                          MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:3
                                          Start time:05:21:02
                                          Start date:23/09/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:"CMD" netsh advfirewall firewall add rule name=")e7`;$<w;7R";h" dir=in action=allow program="C:\Windows\svchost.exe" enable=yes & exit
                                          Imagebase:0x7ff711cc0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:false

                                          Target ID:4
                                          Start time:05:21:02
                                          Start date:23/09/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff66e660000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:false

                                          Target ID:5
                                          Start time:05:21:02
                                          Start date:23/09/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:"cmd" /c schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST & exit
                                          Imagebase:0x7ff711cc0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:6
                                          Start time:05:21:02
                                          Start date:23/09/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff66e660000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:7
                                          Start time:05:21:02
                                          Start date:23/09/2024
                                          Path:C:\Windows\System32\schtasks.exe
                                          Wow64 process (32bit):false
                                          Commandline:schtasks /create /f /sc minute /mo 1 /tn "NvDriverUpdateCheckDaily" /tr "C:\Windows\svchost.exe" /RL HIGHEST
                                          Imagebase:0x7ff6ea6c0000
                                          File size:235'008 bytes
                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:8
                                          Start time:05:21:03
                                          Start date:23/09/2024
                                          Path:C:\Windows\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\svchost.exe
                                          Imagebase:0x2b0000
                                          File size:390'144 bytes
                                          MD5 hash:3D6E1D057586142252BFDA5C5F551F55
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Antivirus matches:
                                          • Detection: 100%, Avira
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 42%, ReversingLabs
                                          • Detection: 58%, Virustotal, Browse
                                          Reputation:low
                                          Has exited:false

                                          Target ID:9
                                          Start time:05:21:03
                                          Start date:23/09/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:"cmd" /c schtasks /create /f /sc minute /mo 30 /tn "NvNodeLauncher" /tr "C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit
                                          Imagebase:0x7ff711cc0000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:10
                                          Start time:05:21:03
                                          Start date:23/09/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff66e660000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:11
                                          Start time:05:21:03
                                          Start date:23/09/2024
                                          Path:C:\Windows\System32\schtasks.exe
                                          Wow64 process (32bit):false
                                          Commandline:schtasks /create /f /sc minute /mo 30 /tn "NvNodeLauncher" /tr "C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST
                                          Imagebase:0x7ff6ea6c0000
                                          File size:235'008 bytes
                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:12
                                          Start time:05:21:04
                                          Start date:23/09/2024
                                          Path:C:\Windows\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\svchost.exe"
                                          Imagebase:0xe20000
                                          File size:390'144 bytes
                                          MD5 hash:3D6E1D057586142252BFDA5C5F551F55
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Target ID:13
                                          Start time:05:21:05
                                          Start date:23/09/2024
                                          Path:C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe
                                          Imagebase:0x4c0000
                                          File size:390'144 bytes
                                          MD5 hash:3D6E1D057586142252BFDA5C5F551F55
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Antivirus matches:
                                          • Detection: 100%, Avira
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 42%, ReversingLabs
                                          • Detection: 58%, Virustotal, Browse
                                          Reputation:low
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:15.7%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:100%
                                            Total number of Nodes:3
                                            Total number of Limit Nodes:0
                                            execution_graph 9563 7ffd347b289d 9564 7ffd347b28af NtProtectVirtualMemory 9563->9564 9566 7ffd347b2985 9564->9566

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 7ffd347b289d-7ffd347b2983 NtProtectVirtualMemory 5 7ffd347b2985 0->5 6 7ffd347b298b-7ffd347b29ad 0->6 5->6 8 7ffd347b29ae-7ffd347b29c5 6->8 9 7ffd347b29c7-7ffd347b29cf 8->9 10 7ffd347b29d0-7ffd347b29e8 8->10 9->10 10->8 11 7ffd347b29ea 10->11 12 7ffd347b29ec-7ffd347b29f5 11->12 13 7ffd347b2a64 11->13 16 7ffd347b2a07 12->16 17 7ffd347b29f7-7ffd347b29fc 12->17 14 7ffd347b2a66 13->14 15 7ffd347b2a8e-7ffd347b2ab8 13->15 18 7ffd347b2a68-7ffd347b2a6f 14->18 19 7ffd347b2a8c 14->19 20 7ffd347b2b1b-7ffd347b2b52 15->20 21 7ffd347b2aba-7ffd347b2b1a call 7ffd347b2148 15->21 22 7ffd347b2a3f-7ffd347b2a41 16->22 23 7ffd347b2a09 16->23 17->22 19->15 33 7ffd347b2b57-7ffd347b2b5e 20->33 21->20 25 7ffd347b2a43-7ffd347b2a48 22->25 26 7ffd347b2a71-7ffd347b2a84 22->26 23->22 28 7ffd347b2a0b-7ffd347b2a2f call 7ffd347a9f50 * 2 23->28 31 7ffd347b2a55-7ffd347b2a57 25->31 32 7ffd347b2a4a 25->32 29 7ffd347b2a87-7ffd347b2a8a 26->29 53 7ffd347b2a30-7ffd347b2a38 call 7ffd347b1980 28->53 29->19 31->29 37 7ffd347b2a59-7ffd347b2a5e 31->37 32->31 36 7ffd347b2a4c-7ffd347b2a4e 32->36 38 7ffd347b2b89-7ffd347b2b90 33->38 39 7ffd347b2b60-7ffd347b2b82 call 7ffd347a9f50 33->39 45 7ffd347b2a60 36->45 46 7ffd347b2a50 36->46 37->45 47 7ffd347b29fe-7ffd347b2a00 37->47 43 7ffd347b2bd7-7ffd347b2bde 38->43 44 7ffd347b2b92-7ffd347b2b9b 38->44 39->44 66 7ffd347b2b84 39->66 51 7ffd347b2bff-7ffd347b2c06 43->51 52 7ffd347b2be0-7ffd347b2bf4 43->52 44->43 45->47 56 7ffd347b2a62 45->56 46->31 47->53 54 7ffd347b2a02 47->54 58 7ffd347b2c27-7ffd347b2c2e 51->58 59 7ffd347b2c08-7ffd347b2c1c 51->59 52->39 71 7ffd347b2bfa 52->71 53->32 68 7ffd347b2a3a 53->68 54->16 56->13 61 7ffd347b2c4a-7ffd347b2c51 58->61 62 7ffd347b2c30-7ffd347b2c3f call 7ffd347a7830 58->62 59->44 72 7ffd347b2c22 59->72 69 7ffd347b2c6d-7ffd347b2c74 61->69 70 7ffd347b2c53-7ffd347b2c62 call 7ffd347a7830 61->70 62->39 79 7ffd347b2c45 62->79 66->38 68->22 75 7ffd347b2c88-7ffd347b2c8f 69->75 76 7ffd347b2c76-7ffd347b2c83 call 7ffd347a7840 69->76 70->44 85 7ffd347b2c68 70->85 71->51 72->58 77 7ffd347b2c9b-7ffd347b2ca2 75->77 78 7ffd347b2c91-7ffd347b2c96 call 7ffd347a5850 75->78 76->75 83 7ffd347b2ca4-7ffd347b2cc6 call 7ffd347a9f50 77->83 84 7ffd347b2cd1-7ffd347b2cd8 77->84 78->77 79->61 105 7ffd347b2ccc 83->105 106 7ffd347b2d5e-7ffd347b2d80 call 7ffd347a9f50 83->106 89 7ffd347b2cec-7ffd347b2cf3 84->89 90 7ffd347b2cda-7ffd347b2ce7 call 7ffd347a7840 84->90 85->69 91 7ffd347b2cf5-7ffd347b2cfa call 7ffd347a5850 89->91 92 7ffd347b2cff-7ffd347b2d06 89->92 90->89 91->92 96 7ffd347b2d08-7ffd347b2d2a call 7ffd347a9f50 92->96 97 7ffd347b2d31-7ffd347b2d38 92->97 96->106 113 7ffd347b2d2c 96->113 102 7ffd347b2d3a 97->102 103 7ffd347b2d3f-7ffd347b2d46 97->103 102->103 103->33 107 7ffd347b2d4c-7ffd347b2d59 call 7ffd347a5850 103->107 105->84 116 7ffd347b2da0-7ffd347b2dba call 7ffd347b2060 106->116 117 7ffd347b2d82 call 7ffd347b2060 106->117 113->97 124 7ffd347b2dbc call 7ffd347a7808 116->124 125 7ffd347b2dc1-7ffd347b2dcc 116->125 121 7ffd347b2d87-7ffd347b2d99 117->121 121->116 126 7ffd347b2d9b call 7ffd347a7808 121->126 124->125 128 7ffd347b2dce-7ffd347b2deb 125->128 129 7ffd347b2e14-7ffd347b2e41 125->129 126->116 133 7ffd347b2ded-7ffd347b2e12 128->133 134 7ffd347b2e42-7ffd347b2e6d 128->134 133->129
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2171148266.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd347a0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: MemoryProtectVirtual
                                            • String ID: P!{4
                                            • API String ID: 2706961497-1052354785
                                            • Opcode ID: 0c7d9b59e45d759fe63bb943bc947129d39bfd2fa34d4a1aeab0b11b33643aa4
                                            • Instruction ID: 335e770258f2a2de79c3ee54a9710d487544a3cf40d7b6f4006d36d2967f356e
                                            • Opcode Fuzzy Hash: 0c7d9b59e45d759fe63bb943bc947129d39bfd2fa34d4a1aeab0b11b33643aa4
                                            • Instruction Fuzzy Hash: 54023961F1D64A8FE7A5AB6884A92B937E1EF86310F4401BAD54CC32D3DE6C7C0693C1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2171148266.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd347a0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f5f3add06782f34d1a98a71a82542199fa4eaf148d3c2d730e8839169c518df8
                                            • Instruction ID: 2766894c874f4cf18f66b0e56078d12d67026df01f151f301c8ce79582a303a8
                                            • Opcode Fuzzy Hash: f5f3add06782f34d1a98a71a82542199fa4eaf148d3c2d730e8839169c518df8
                                            • Instruction Fuzzy Hash: 5712B591F1D6868FFB6AA62488B52B53BA09F27304F0501B6D64CC71D3ED5C7C1993D2

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1133 7ffd347ad796-7ffd347ad7a3 1134 7ffd347ad7a5-7ffd347ad7ad 1133->1134 1135 7ffd347ad7ae-7ffd347ad877 1133->1135 1134->1135 1138 7ffd347ad879-7ffd347ad882 1135->1138 1139 7ffd347ad8e3 1135->1139 1138->1139 1141 7ffd347ad884-7ffd347ad890 1138->1141 1140 7ffd347ad8e5-7ffd347ad90a 1139->1140 1148 7ffd347ad976 1140->1148 1149 7ffd347ad90c-7ffd347ad915 1140->1149 1142 7ffd347ad8c9-7ffd347ad8e1 1141->1142 1143 7ffd347ad892-7ffd347ad8a4 1141->1143 1142->1140 1144 7ffd347ad8a8-7ffd347ad8bb 1143->1144 1145 7ffd347ad8a6 1143->1145 1144->1144 1147 7ffd347ad8bd-7ffd347ad8c5 1144->1147 1145->1144 1147->1142 1150 7ffd347ad978-7ffd347ada20 1148->1150 1149->1148 1151 7ffd347ad917-7ffd347ad923 1149->1151 1162 7ffd347ada8e 1150->1162 1163 7ffd347ada22-7ffd347ada2c 1150->1163 1152 7ffd347ad925-7ffd347ad937 1151->1152 1153 7ffd347ad95c-7ffd347ad974 1151->1153 1155 7ffd347ad93b-7ffd347ad94e 1152->1155 1156 7ffd347ad939 1152->1156 1153->1150 1155->1155 1158 7ffd347ad950-7ffd347ad958 1155->1158 1156->1155 1158->1153 1164 7ffd347ada90-7ffd347adab9 1162->1164 1163->1162 1165 7ffd347ada2e-7ffd347ada3b 1163->1165 1171 7ffd347adabb-7ffd347adac6 1164->1171 1172 7ffd347adb23 1164->1172 1166 7ffd347ada3d-7ffd347ada4f 1165->1166 1167 7ffd347ada74-7ffd347ada8c 1165->1167 1169 7ffd347ada53-7ffd347ada66 1166->1169 1170 7ffd347ada51 1166->1170 1167->1164 1169->1169 1173 7ffd347ada68-7ffd347ada70 1169->1173 1170->1169 1171->1172 1174 7ffd347adac8-7ffd347adad6 1171->1174 1175 7ffd347adb25-7ffd347adbb6 1172->1175 1173->1167 1176 7ffd347adad8-7ffd347adaea 1174->1176 1177 7ffd347adb0f-7ffd347adb21 1174->1177 1183 7ffd347adbbc-7ffd347adbcb 1175->1183 1178 7ffd347adaec 1176->1178 1179 7ffd347adaee-7ffd347adb01 1176->1179 1177->1175 1178->1179 1179->1179 1181 7ffd347adb03-7ffd347adb0b 1179->1181 1181->1177 1184 7ffd347adbcd 1183->1184 1185 7ffd347adbd3-7ffd347adc38 call 7ffd347adc54 1183->1185 1184->1185 1192 7ffd347adc3a 1185->1192 1193 7ffd347adc3f-7ffd347adc52 1185->1193 1192->1193
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2171148266.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd347a0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dd04aba8da903798b21bc08d4bc19d3ffecc91ec692cbfe699de8881d437f687
                                            • Instruction ID: 8d545ef52923469985b39e17c5f865c5fa3b270dcf2ed4601422465d748dc33f
                                            • Opcode Fuzzy Hash: dd04aba8da903798b21bc08d4bc19d3ffecc91ec692cbfe699de8881d437f687
                                            • Instruction Fuzzy Hash: D2F1A670A09A4E8FEBA8DF28C8557E937D1FF55310F04426EE84DC7291DF78A9458B82

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1194 7ffd347ae542-7ffd347ae54f 1195 7ffd347ae55a-7ffd347ae627 1194->1195 1196 7ffd347ae551-7ffd347ae559 1194->1196 1199 7ffd347ae629-7ffd347ae632 1195->1199 1200 7ffd347ae693 1195->1200 1196->1195 1199->1200 1201 7ffd347ae634-7ffd347ae640 1199->1201 1202 7ffd347ae695-7ffd347ae6ba 1200->1202 1203 7ffd347ae679-7ffd347ae691 1201->1203 1204 7ffd347ae642-7ffd347ae654 1201->1204 1209 7ffd347ae726 1202->1209 1210 7ffd347ae6bc-7ffd347ae6c5 1202->1210 1203->1202 1205 7ffd347ae658-7ffd347ae66b 1204->1205 1206 7ffd347ae656 1204->1206 1205->1205 1208 7ffd347ae66d-7ffd347ae675 1205->1208 1206->1205 1208->1203 1211 7ffd347ae728-7ffd347ae74d 1209->1211 1210->1209 1212 7ffd347ae6c7-7ffd347ae6d3 1210->1212 1219 7ffd347ae7bb 1211->1219 1220 7ffd347ae74f-7ffd347ae759 1211->1220 1213 7ffd347ae6d5-7ffd347ae6e7 1212->1213 1214 7ffd347ae70c-7ffd347ae724 1212->1214 1215 7ffd347ae6eb-7ffd347ae6fe 1213->1215 1216 7ffd347ae6e9 1213->1216 1214->1211 1215->1215 1218 7ffd347ae700-7ffd347ae708 1215->1218 1216->1215 1218->1214 1221 7ffd347ae7bd-7ffd347ae7eb 1219->1221 1220->1219 1222 7ffd347ae75b-7ffd347ae768 1220->1222 1228 7ffd347ae85b 1221->1228 1229 7ffd347ae7ed-7ffd347ae7f8 1221->1229 1223 7ffd347ae76a-7ffd347ae77c 1222->1223 1224 7ffd347ae7a1-7ffd347ae7b9 1222->1224 1226 7ffd347ae780-7ffd347ae793 1223->1226 1227 7ffd347ae77e 1223->1227 1224->1221 1226->1226 1230 7ffd347ae795-7ffd347ae79d 1226->1230 1227->1226 1232 7ffd347ae85d-7ffd347ae935 1228->1232 1229->1228 1231 7ffd347ae7fa-7ffd347ae808 1229->1231 1230->1224 1233 7ffd347ae80a-7ffd347ae81c 1231->1233 1234 7ffd347ae841-7ffd347ae859 1231->1234 1242 7ffd347ae93b-7ffd347ae94a 1232->1242 1235 7ffd347ae820-7ffd347ae833 1233->1235 1236 7ffd347ae81e 1233->1236 1234->1232 1235->1235 1238 7ffd347ae835-7ffd347ae83d 1235->1238 1236->1235 1238->1234 1243 7ffd347ae94c 1242->1243 1244 7ffd347ae952-7ffd347ae9b4 call 7ffd347ae9d0 1242->1244 1243->1244 1251 7ffd347ae9b6 1244->1251 1252 7ffd347ae9bb-7ffd347ae9ce 1244->1252 1251->1252
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2171148266.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd347a0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: eb3f11803a4922ebe29fda5850f359ec5b77f21220dbd03b526998fd414eed99
                                            • Instruction ID: 9ba6ead57eb6afcf581e1abec78db42b444e0f4fd7024ff15e7491916bab506c
                                            • Opcode Fuzzy Hash: eb3f11803a4922ebe29fda5850f359ec5b77f21220dbd03b526998fd414eed99
                                            • Instruction Fuzzy Hash: 85E1B470A19A4E8FEBA8DF28C8657E977D1FF55310F04426EE84DC7291DE78A84487C2

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1304 7ffd347aff30 1305 7ffd347b2236-7ffd347b2270 1304->1305 1309 7ffd347b2272 1305->1309 1310 7ffd347b22ec-7ffd347b23a1 1309->1310 1311 7ffd347b2274-7ffd347b2295 1309->1311 1333 7ffd347b23b3 1310->1333 1389 7ffd347b23a3 1310->1389 1312 7ffd347b22a7 1311->1312 1313 7ffd347b2297-7ffd347b229c 1311->1313 1315 7ffd347b22b9-7ffd347b22bb 1312->1315 1316 7ffd347b22a9 1312->1316 1313->1315 1317 7ffd347b22eb 1315->1317 1318 7ffd347b22bd-7ffd347b22c2 1315->1318 1316->1315 1319 7ffd347b22ab-7ffd347b22b2 1316->1319 1317->1310 1321 7ffd347b23a8-7ffd347b23aa 1318->1321 1322 7ffd347b22c8 1318->1322 1323 7ffd347b22c4-7ffd347b22c8 1319->1323 1324 7ffd347b22b4 1319->1324 1328 7ffd347b23ac-7ffd347b23b1 1321->1328 1329 7ffd347b23da-7ffd347b23db 1321->1329 1322->1321 1326 7ffd347b22ce-7ffd347b22e6 1322->1326 1323->1321 1323->1326 1324->1315 1326->1317 1332 7ffd347b23cd-7ffd347b23cf 1328->1332 1328->1333 1330 7ffd347b23e1-7ffd347b23e2 call 7ffd347a9f50 1329->1330 1342 7ffd347b23e3-7ffd347b23fb call 7ffd347a9f50 1330->1342 1336 7ffd347b23ff-7ffd347b2417 call 7ffd347b1e60 1332->1336 1337 7ffd347b23d1-7ffd347b23d6 1332->1337 1333->1332 1339 7ffd347b23b5-7ffd347b23b9 1333->1339 1356 7ffd347b241c-7ffd347b242b 1336->1356 1340 7ffd347b23d8 1337->1340 1341 7ffd347b2450-7ffd347b2452 1337->1341 1339->1342 1345 7ffd347b23bb 1339->1345 1340->1329 1340->1341 1347 7ffd347b2454-7ffd347b2459 1341->1347 1348 7ffd347b2482-7ffd347b2484 1341->1348 1342->1336 1345->1330 1351 7ffd347b23bd-7ffd347b23cc 1345->1351 1353 7ffd347b2466-7ffd347b2468 1347->1353 1354 7ffd347b245b 1347->1354 1357 7ffd347b2485-7ffd347b2497 1348->1357 1358 7ffd347b24cc-7ffd347b24df 1348->1358 1361 7ffd347b2498-7ffd347b24a7 1353->1361 1362 7ffd347b246a-7ffd347b246f 1353->1362 1354->1353 1360 7ffd347b245d-7ffd347b245f 1354->1360 1371 7ffd347b242c 1356->1371 1357->1361 1364 7ffd347b24ab-7ffd347b24b8 1357->1364 1376 7ffd347b24e0 1358->1376 1368 7ffd347b2471-7ffd347b2475 1360->1368 1369 7ffd347b2461 1360->1369 1361->1364 1362->1368 1370 7ffd347b229e-7ffd347b22a2 1362->1370 1373 7ffd347b24ba 1364->1373 1374 7ffd347b24e2-7ffd347b2541 1364->1374 1368->1370 1377 7ffd347b247b-7ffd347b2480 1368->1377 1369->1353 1370->1312 1378 7ffd347b2440-7ffd347b2445 1371->1378 1379 7ffd347b242e-7ffd347b243c 1371->1379 1373->1376 1382 7ffd347b24bc-7ffd347b24cb 1373->1382 1386 7ffd347b2549-7ffd347b256c 1374->1386 1387 7ffd347b2543-7ffd347b2547 1374->1387 1376->1374 1377->1348 1378->1377 1381 7ffd347b2447-7ffd347b2449 1378->1381 1379->1371 1384 7ffd347b243e-7ffd347b243f 1379->1384 1381->1354 1385 7ffd347b244b 1381->1385 1384->1378 1385->1341 1390 7ffd347b2576 1386->1390 1387->1386 1389->1321 1391 7ffd347b257b-7ffd347b2581 1390->1391 1392 7ffd347b256e-7ffd347b2574 1391->1392 1393 7ffd347b2583-7ffd347b258b call 7ffd347b1e58 1391->1393 1392->1390 1392->1391 1396 7ffd347b258d-7ffd347b2596 call 7ffd347b1ec0 1393->1396 1397 7ffd347b25a3-7ffd347b25ec 1393->1397 1400 7ffd347b259b-7ffd347b25a2 1396->1400 1406 7ffd347b25f6 1397->1406 1407 7ffd347b25fb-7ffd347b2601 1406->1407 1408 7ffd347b25ee-7ffd347b25f4 1407->1408 1409 7ffd347b2603-7ffd347b2606 call 7ffd347b1f48 1407->1409 1408->1406 1408->1407 1411 7ffd347b260b-7ffd347b260e 1409->1411 1412 7ffd347b2610-7ffd347b2622 call 7ffd347b1bc0 1411->1412 1413 7ffd347b2623-7ffd347b262c 1411->1413
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2171148266.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd347a0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9b78cd209ab8d0142eeb4281baa6cf3cf41c4480302fe003043fa2aee2ecccb0
                                            • Instruction ID: 7077bc2822fa9d393e6a4773969ad78575e1c61b1f85f7c647834007aa0143ce
                                            • Opcode Fuzzy Hash: 9b78cd209ab8d0142eeb4281baa6cf3cf41c4480302fe003043fa2aee2ecccb0
                                            • Instruction Fuzzy Hash: 83C1E1A2B0E7828FE75A962898AA1757BD0EF53310F1905BBD589C71E3DC5C7C0683D2

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1510 7ffd347b1bc0-7ffd347b1be2 1511 7ffd347b1be7-7ffd347b1bee 1510->1511 1512 7ffd347b1bf8-7ffd347b1bff 1511->1512 1513 7ffd347b1bf0-7ffd347b1bf3 1511->1513 1514 7ffd347b1c05-7ffd347b1c3d 1512->1514 1515 7ffd347b1d6a-7ffd347b1d71 1512->1515 1513->1512 1528 7ffd347b1c45-7ffd347b1c46 1514->1528 1529 7ffd347b1c3f-7ffd347b1c43 1514->1529 1516 7ffd347b1da3-7ffd347b1dae 1515->1516 1517 7ffd347b1d73-7ffd347b1d7a 1515->1517 1522 7ffd347b1db7-7ffd347b1e3b 1516->1522 1523 7ffd347b1db0-7ffd347b1db6 1516->1523 1520 7ffd347b1d7c-7ffd347b1d7d 1517->1520 1521 7ffd347b1d82-7ffd347b1d89 1517->1521 1520->1521 1521->1511 1524 7ffd347b1d8f-7ffd347b1da2 1521->1524 1539 7ffd347b1e46-7ffd347b1efd 1522->1539 1540 7ffd347b1e3d-7ffd347b1e45 1522->1540 1523->1522 1531 7ffd347b1c49-7ffd347b1cbd 1528->1531 1529->1531 1548 7ffd347b1d5f-7ffd347b1d62 1531->1548 1549 7ffd347b1cc3-7ffd347b1cca 1531->1549 1540->1539 1548->1524 1551 7ffd347b1d64-7ffd347b1d65 1548->1551 1552 7ffd347b1ccd-7ffd347b1cef 1549->1552 1551->1515 1556 7ffd347b1cf6-7ffd347b1d0b 1552->1556 1558 7ffd347b1d20-7ffd347b1d5c 1556->1558 1559 7ffd347b1d0d-7ffd347b1d1c 1556->1559 1558->1548 1559->1552 1560 7ffd347b1d1e 1559->1560 1560->1548
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2171148266.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd347a0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 85319bcd428a73eec6fb88899407cc7638640f77380dc695f3a6fec8dbe53f45
                                            • Instruction ID: 2c7af3b2c2214e35fb846cdce09f77ed697748033922ab997dfc1e602d5b7042
                                            • Opcode Fuzzy Hash: 85319bcd428a73eec6fb88899407cc7638640f77380dc695f3a6fec8dbe53f45
                                            • Instruction Fuzzy Hash: 68A12861F1CA5A4BE71DB67898A60FA77D5EF82320B0841BED58BC3193DD6C784742C1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2171148266.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd347a0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1e492e81364a967c4acfdd9940f231774d982f970b28bf28e5648b8e326c287b
                                            • Instruction ID: e28fee326737e6e160f891ec1832c9f6133081cdbe8ba51612fac95779d6db5f
                                            • Opcode Fuzzy Hash: 1e492e81364a967c4acfdd9940f231774d982f970b28bf28e5648b8e326c287b
                                            • Instruction Fuzzy Hash: 4661E2B1F1D64ACFEBA4DA24C8A56B977E0EF56340F0401B9D94AC3192EE6CBC0597C1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2171148266.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd347a0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fcdf607928909624adb65320ce196e7aee7009f3d44534e7cbb2c033846f41bb
                                            • Instruction ID: a50079a22b6a08beb908639b6fe6b026f38abd84a5c1788df2b3e9e13f655ba7
                                            • Opcode Fuzzy Hash: fcdf607928909624adb65320ce196e7aee7009f3d44534e7cbb2c033846f41bb
                                            • Instruction Fuzzy Hash: 5851E271F1CA1A4AE72CB66898A61FA32D6EF95310F55407DE98BC3197DCACBC8341C0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2171148266.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd347a0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ";$#;$?L_^$L_^d
                                            • API String ID: 0-743415685
                                            • Opcode ID: 532e96b01a20995cfe26d69eecab13c98ec81597bb17033b9496f65b4b23b120
                                            • Instruction ID: 67861501c76122bff366a9b92338e4a90ee53723dc933f083a382b72e8b31bc8
                                            • Opcode Fuzzy Hash: 532e96b01a20995cfe26d69eecab13c98ec81597bb17033b9496f65b4b23b120
                                            • Instruction Fuzzy Hash: EBD19187B0D96366E22136FD78670FF7B58DF8337EB084577D28C991838D09609682E6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2171148266.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd347a0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2b81d1fb778d09f5f28f203d2f01b6891dd751c23d8ee0ca5ad18b10ae30ac78
                                            • Instruction ID: 48571eb8ca99f81315cf0e12f568126e8d2af5cd247cab02373f9907831f6322
                                            • Opcode Fuzzy Hash: 2b81d1fb778d09f5f28f203d2f01b6891dd751c23d8ee0ca5ad18b10ae30ac78
                                            • Instruction Fuzzy Hash: 8D42F071E1C7898FE719CA28C4912A9B7E1FB96310F158579D5CEC3686DE78BC0287C2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2171148266.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd347a0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 26fc4bf89e0e657f3f6b0c7128d8f386d511bc6fcd8c44db8260d02c2f0c86f5
                                            • Instruction ID: 15b294c3fd2dfca099730e9da8dc68e92dddc59e46cfdb5ce4feac9d6661e3eb
                                            • Opcode Fuzzy Hash: 26fc4bf89e0e657f3f6b0c7128d8f386d511bc6fcd8c44db8260d02c2f0c86f5
                                            • Instruction Fuzzy Hash: 55120271F2C6458BE3198A28C491269B7E1FBD6310F258579D6CEC3686DE7CBC4283C2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2171148266.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd347a0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e37d963469615d422ceddbfbaf55b94cfa17d2753e9274f2295ed4fa1373015a
                                            • Instruction ID: c578d464a270b2df2c133cfa3366dd90c9290e26a6e79417407a560d61a48601
                                            • Opcode Fuzzy Hash: e37d963469615d422ceddbfbaf55b94cfa17d2753e9274f2295ed4fa1373015a
                                            • Instruction Fuzzy Hash: 8E02CE71F2CA458BE728CA18C495279B2D2FBD6310F658939D6CEC3685DE78BC4247C2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2171148266.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd347a0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 755fedab453bd97bedf70bece9bd9937a48aff0044e9ec5c314b7482d0ff985d
                                            • Instruction ID: 500440b5aff942039f426ef29f4a8d55b949e6000340af37e950c8bd010443d0
                                            • Opcode Fuzzy Hash: 755fedab453bd97bedf70bece9bd9937a48aff0044e9ec5c314b7482d0ff985d
                                            • Instruction Fuzzy Hash: D591D431A0C64C8FDB59DBA898596EDBBF1EB56311F0442AED04AD3292CE746846CB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2171148266.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffd347a0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 52110bab93de5242cdc9f45bc0b5665392750b10a433327f9cfbb1152e77baac
                                            • Instruction ID: b4d5211174772da6de77dcb7f99c0585163ad9478794df076a55b8927af0d736
                                            • Opcode Fuzzy Hash: 52110bab93de5242cdc9f45bc0b5665392750b10a433327f9cfbb1152e77baac
                                            • Instruction Fuzzy Hash: FE617096A0E7C25FE6039B3C68F50EA3F619F53168B0A11F7C2D5CF1E3E908550A93A1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ce93143a9794422282b77e63ac94a3254efb528895656efec990bb7193891377
                                            • Instruction ID: 95705b85731e086e1981eb6ebed483538e72f34f496571cdccfc052dc20f9cf9
                                            • Opcode Fuzzy Hash: ce93143a9794422282b77e63ac94a3254efb528895656efec990bb7193891377
                                            • Instruction Fuzzy Hash: 4F8292F0F1D68A4EE7E6A63488B21793BA59F53206F4404BAC68DC71D3ED1C780997D2
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 044b2be66c90a0faf1df3864c541cc816faf57e3f85f963356833e92c537b472
                                            • Instruction ID: 241605e0396582f446b3df921511fdf4e9ab88355b995e7969aea1342df31da5
                                            • Opcode Fuzzy Hash: 044b2be66c90a0faf1df3864c541cc816faf57e3f85f963356833e92c537b472
                                            • Instruction Fuzzy Hash: 43326DF0F1C50F8AFBE8E66884B727D71859F96306F901538D64DC25D2ED2CB816AAC1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8b6d57c1f2692a77d93c98c08d27bf9a73cb7d89000c8d7d50ac76cfc4817b72
                                            • Instruction ID: f2ca5e8c9252a4101949ef9e0e2e3dcc47fbf15ee775d48f7b2ae92961c7e6c4
                                            • Opcode Fuzzy Hash: 8b6d57c1f2692a77d93c98c08d27bf9a73cb7d89000c8d7d50ac76cfc4817b72
                                            • Instruction Fuzzy Hash: DDF1B571A08A4D8FEBA8DF28C8567F937D1FF55311F04426EE84DC7291DB38A9458B82
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b1824a1fdbb2affd72dda3461b7a1b185ee449d10c23fee639fa2bf46d590a56
                                            • Instruction ID: 72443abee8d57367b3f901cab0ed7414da33aaf79b5953bbde924b62e7f2b847
                                            • Opcode Fuzzy Hash: b1824a1fdbb2affd72dda3461b7a1b185ee449d10c23fee639fa2bf46d590a56
                                            • Instruction Fuzzy Hash: 32E1B270A18A4E8FEBA8DF28C8667E977D1EF55311F04426ED84DC7291CF78A84087C2
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f9121a95858155c7ba51b01522a98c8c798a269706c77d1dea118381f1e610f3
                                            • Instruction ID: c3daa1426818f01c2827cd0e7931894c462e88e1c616a4021d31e08d13c82c48
                                            • Opcode Fuzzy Hash: f9121a95858155c7ba51b01522a98c8c798a269706c77d1dea118381f1e610f3
                                            • Instruction Fuzzy Hash: FDD127A2B0D6868FE7A9A22898A61757BD0DF57310F1809BBD58DC71E3DC1C7C0693D2
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 218f83a9f687f92f54216b796051ed16fcdd01e52b5a04969a0609f700e8a850
                                            • Instruction ID: 1ad8ec5b87af7ad56aa020c3b923b360dd61e706355609a85784e0284a245a87
                                            • Opcode Fuzzy Hash: 218f83a9f687f92f54216b796051ed16fcdd01e52b5a04969a0609f700e8a850
                                            • Instruction Fuzzy Hash: C1A14761F1CA5A4BF72DB6B898660FA77D5EF82320B0841BED08AC3193DD6C784742C0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 815bc9ba3cd04e66b3626866a3a0fbadcdcc9e0ef946b99db660c23366d8ef0e
                                            • Instruction ID: 096a5cb31eb9ed2c45351b09349625404c23e8fd015a1bc15a59d1c562f81fbb
                                            • Opcode Fuzzy Hash: 815bc9ba3cd04e66b3626866a3a0fbadcdcc9e0ef946b99db660c23366d8ef0e
                                            • Instruction Fuzzy Hash: F0510870F1E1964EF3690624A8920F47BA0EB07321F1951FAD9EAC64D3B50C7C9693D3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: #CN_^
                                            • API String ID: 0-2341464291
                                            • Opcode ID: ca701f075452149f71aa1fdd373963741505e7fd387e3234f32a10f1d3c5003d
                                            • Instruction ID: 4b3a63f24da2ea53a02e1e5bf1a622906079d3ac537725f857a1030ed8885bf1
                                            • Opcode Fuzzy Hash: ca701f075452149f71aa1fdd373963741505e7fd387e3234f32a10f1d3c5003d
                                            • Instruction Fuzzy Hash: A4C1D570B1CD1A8BEB94E76884B27B9B3C6EFA5301F540579E54EC36D2CE2CB8418781
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 931ef4b84930b3228b11d7e398c56cb62e1725fb3d4f36740b7a0c3a0a7e364c
                                            • Instruction ID: a52d43fce4a13095be572c6b0d7c9f58c4f29f6db9b5a090ee172c8ec8dce1de
                                            • Opcode Fuzzy Hash: 931ef4b84930b3228b11d7e398c56cb62e1725fb3d4f36740b7a0c3a0a7e364c
                                            • Instruction Fuzzy Hash: 27D1B671A08A4D8FEBA8DF28C8667F977D1FF55311F04426EE84DC7291CB78A9418782
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a65d5c4ac79270902df276ecf4736272cbd9b6767e702170d7d98c4a344123e8
                                            • Instruction ID: 065e643f44d29381d4a22e97dee851149343ed0a3db8c3d3dda97d8d7110dd48
                                            • Opcode Fuzzy Hash: a65d5c4ac79270902df276ecf4736272cbd9b6767e702170d7d98c4a344123e8
                                            • Instruction Fuzzy Hash: ABB1A471F2C9498FE798AB68D4A52BC77E2EF9A311F150079D54EC3292DD2C7C429780
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 858734ecae1345e09ed9adda26198cc7a584f12d7c91079b101618e56b4c0bba
                                            • Instruction ID: 056e5417d2f8e3b9277cfb390895fdc4c67c6f117a49a05c42f1f898df74736a
                                            • Opcode Fuzzy Hash: 858734ecae1345e09ed9adda26198cc7a584f12d7c91079b101618e56b4c0bba
                                            • Instruction Fuzzy Hash: 7DB1B57061CA4D8FDBA8DF28C8567E93BD1FF55311F04426EE84DC7292CB38A9458B82
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3f6aad355e2369a4e64193f488c1203af797e4fb94bfc4b9f165d13c17d96d6e
                                            • Instruction ID: a95c28ed4b90a0843870da34b9b93b241cfee02b92553d4eee8f085e1cacb53e
                                            • Opcode Fuzzy Hash: 3f6aad355e2369a4e64193f488c1203af797e4fb94bfc4b9f165d13c17d96d6e
                                            • Instruction Fuzzy Hash: 6691A571F6895E4FE3A5A73C84A52A972E6EB8D320F5505B9D10DC32D6DC2DAC8287C0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a7bb97210b1aa88f255bb2d380746414becc4fbc446d8976672a44113584fc9c
                                            • Instruction ID: fc150ded0d87f425692c64922c9c9318026430e31abab6043714d6e037c5ec92
                                            • Opcode Fuzzy Hash: a7bb97210b1aa88f255bb2d380746414becc4fbc446d8976672a44113584fc9c
                                            • Instruction Fuzzy Hash: BD811171F6881E8FE3E5A76C84A53A861D6EB8D310F9545B9D50EC32D6DC3DAC828780
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d5cc1725f3b21ee46d6e60849e8ae89b9e32a8d737e75a84366d6c3d7bf7a19e
                                            • Instruction ID: d104be72723e6fe16234860339d724be9a17ca6d3934aa5d920067f53d5b4ce7
                                            • Opcode Fuzzy Hash: d5cc1725f3b21ee46d6e60849e8ae89b9e32a8d737e75a84366d6c3d7bf7a19e
                                            • Instruction Fuzzy Hash: C361A47071CA0D9FE794EBA888A67B977D5EF9A311F1441BED04EC3293DD2C68428741
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e5904c2675ce5b9e05d4e9555b0972a6cbc9590fa2ef54c86f302ad8bac77230
                                            • Instruction ID: 308f26ef42ea4d9991b991b88aa674a533355d90b033a6c20dbc9b669c2e0747
                                            • Opcode Fuzzy Hash: e5904c2675ce5b9e05d4e9555b0972a6cbc9590fa2ef54c86f302ad8bac77230
                                            • Instruction Fuzzy Hash: 5B6185B1F5891E9FEB94EB2884AA6BD72E1EF5A301F440079D50DD32D2DE2D784197C0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cbf512f51ed8e783d5c3efd50f9d6396611d961a6cc6066ac4aab3625fce02ef
                                            • Instruction ID: 8fcaa6e53d1f1642bce4fd4f20964d07053926ab04602321940f5801bc6b2aec
                                            • Opcode Fuzzy Hash: cbf512f51ed8e783d5c3efd50f9d6396611d961a6cc6066ac4aab3625fce02ef
                                            • Instruction Fuzzy Hash: 1361E6A1B1DACA8FE796933848652B97AD1DF57310F4800BAC64CE7193DD0C784697D1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e0e852d97113ba7dba07c382e1b2972c70c5296c900f1d3d6579ecf44ae15703
                                            • Instruction ID: 960846f51cafdf505a15f5d9d769f757aff6d25bf28c12f20d1735dc150611a8
                                            • Opcode Fuzzy Hash: e0e852d97113ba7dba07c382e1b2972c70c5296c900f1d3d6579ecf44ae15703
                                            • Instruction Fuzzy Hash: D5516070908A1C8FDB68DF58D855BE9BBF1FB59310F0082AAD44DE3252DE74A9858F81
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fcd3cb215876af0330078dca6d7a8e6170fa2e69bd727a89dbfe03941ae5849a
                                            • Instruction ID: 628769f14ca10a8f7336b1ab20a2146fdbd1e26d095e5b85a0ca74b926e14048
                                            • Opcode Fuzzy Hash: fcd3cb215876af0330078dca6d7a8e6170fa2e69bd727a89dbfe03941ae5849a
                                            • Instruction Fuzzy Hash: 83510671F2891A8FEBD8A76C94A66BC73D1EF99311F000179E54DD3292DE2DBC4186C1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ff21e25cc77baf6b333f730a972b714f118665bd8262406e19f6b4eca7ef1d9b
                                            • Instruction ID: 048762934bed7d93dd77000dbc8cc4eefd0224f3c519a629adfc84a626f4881b
                                            • Opcode Fuzzy Hash: ff21e25cc77baf6b333f730a972b714f118665bd8262406e19f6b4eca7ef1d9b
                                            • Instruction Fuzzy Hash: C251C672F0891A8BEBA0EB6CA4B62FD37D1EF96326F440176D50CD7192DD2C684287C1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6b81c665dee823d7008fd1c47c70569d808d72873085ac8f3eab69b1a1a06de1
                                            • Instruction ID: d8afecd2dac0c8ee9419aa3d2f13d2c09d7f9727fba8492aaf20ab306c815174
                                            • Opcode Fuzzy Hash: 6b81c665dee823d7008fd1c47c70569d808d72873085ac8f3eab69b1a1a06de1
                                            • Instruction Fuzzy Hash: 6C51F671F28A1A8FEB98A76C94A66B873D1EF5A311F040079E54DD32D3DE2DBC418781
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 22bc18b21c8bf644cefa2b303e511d691380df36f770ae59310df2b0d2951e3f
                                            • Instruction ID: f301f40febb6c26c894381dd600493434d9aeb19939b18df47b0b70f5d43de39
                                            • Opcode Fuzzy Hash: 22bc18b21c8bf644cefa2b303e511d691380df36f770ae59310df2b0d2951e3f
                                            • Instruction Fuzzy Hash: C441E771F2891A8FEBD8E76C94A66BC72D1EF99311F040079E54ED3292DE2DBC418781
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4d4a2407e3d4687aa4244a64bc71ef5cd7ee141ab2ba88717fc7aba048773642
                                            • Instruction ID: 3c43c4ffbc05560a538da3c63d808edd68a4e9e40ab9e9e2b120722543561e19
                                            • Opcode Fuzzy Hash: 4d4a2407e3d4687aa4244a64bc71ef5cd7ee141ab2ba88717fc7aba048773642
                                            • Instruction Fuzzy Hash: 2841A571F2891A8FEBD8E76C94A66BC72D1EF99311F040079E54ED3292DE2DBC418781
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 768cb20977d475bf178fefc2bff892bd3830d7c07bf459597c2b942c63b7c879
                                            • Instruction ID: a9d51f9ba4e00effe552533c253d00d7b4360ac773a76162781109c1bbe218cb
                                            • Opcode Fuzzy Hash: 768cb20977d475bf178fefc2bff892bd3830d7c07bf459597c2b942c63b7c879
                                            • Instruction Fuzzy Hash: 6841C071F18909CFEBD4FB6C98A56B936D1EF99314F15047AE20DE32A1DE2CB8409781
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e55fc5165d8cf9273f926c9cfe09a069b4ff4c6fea0c2412f4abdc46b2a20cf8
                                            • Instruction ID: 84cf2714db3f0ae130ab08a6055bcc3cf605695f43f799ff4dd7f11b63f77f8a
                                            • Opcode Fuzzy Hash: e55fc5165d8cf9273f926c9cfe09a069b4ff4c6fea0c2412f4abdc46b2a20cf8
                                            • Instruction Fuzzy Hash: FA419261F1CA0F46E6607BB818762BE3E999FC2206F8404B4E08CD75D7FDACA9114392
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2e7ae129b7c3487aab83767b61bfee110f86a2dd02b240ae8326e66af48478cf
                                            • Instruction ID: ad7c52b41f2e4d5c7a9a6e9bdfb261ce18ed9c60dc15cc80a9dd6b523d9e892d
                                            • Opcode Fuzzy Hash: 2e7ae129b7c3487aab83767b61bfee110f86a2dd02b240ae8326e66af48478cf
                                            • Instruction Fuzzy Hash: 39419460F1CA8F4AD7617BB818762BD3E995FC3206F8404F5E089D75D7ED9CA8114392
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c53b6e01b19278012c6d558ca370172d673f775d614d53f1a6c52ecda57c3a5e
                                            • Instruction ID: fefae03ad2940fcf62ff1ab22effd08a60d3a6cd9ef0fccd85d3c04ab795eb94
                                            • Opcode Fuzzy Hash: c53b6e01b19278012c6d558ca370172d673f775d614d53f1a6c52ecda57c3a5e
                                            • Instruction Fuzzy Hash: F7419271F0890A8FEB94EB6C94A66BC77D2EF99312F440576D50CD7292DE3CAC428781
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 28107197828718a26a08fe159fa48ad4f6f20e6dfc9861fcf8984897a8f7a436
                                            • Instruction ID: 9de9ddd204ea4a10eccb50b566f53f63487130d5245f160391cc06e331c478ac
                                            • Opcode Fuzzy Hash: 28107197828718a26a08fe159fa48ad4f6f20e6dfc9861fcf8984897a8f7a436
                                            • Instruction Fuzzy Hash: 6041967171861A8FDBD8EA68C4646B973A2FF99350F10447DD40EC7392DD39E842C781
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: efcef2c7d2b6c018be69fd49d77a146337add70397cbd18e8bbd71b8ab72fd1b
                                            • Instruction ID: 2b03a30dd2f2ebb95c16de89b1746959c8098ddf879e2af55851d3b124a9ed9f
                                            • Opcode Fuzzy Hash: efcef2c7d2b6c018be69fd49d77a146337add70397cbd18e8bbd71b8ab72fd1b
                                            • Instruction Fuzzy Hash: C2416D71F0890E8EEBE4EB6894A66BC76E2EF99302F500575D50DD7291DA3CA8428781
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6b9b6789041bfa9d20dbfd6a8b09ab184e9ca9b36f736f7725714dbee65b1f4b
                                            • Instruction ID: 6b2215f5b900f7a5dc5f8f130423217e73d0d7b163dc288c21eda90e4a62873f
                                            • Opcode Fuzzy Hash: 6b9b6789041bfa9d20dbfd6a8b09ab184e9ca9b36f736f7725714dbee65b1f4b
                                            • Instruction Fuzzy Hash: 2731C8B2F0C45B86FB29A568ECB62FA36918F5A316F040276D74CC62C2ED1D744952D1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2609fd7baf75c029a785aefc8fa689dfd1ac195d48589b90273fc63df9ff2a78
                                            • Instruction ID: 8db9e1b68c699afab506e43b57b20e9561a2554951631ae297fb909d792a7488
                                            • Opcode Fuzzy Hash: 2609fd7baf75c029a785aefc8fa689dfd1ac195d48589b90273fc63df9ff2a78
                                            • Instruction Fuzzy Hash: 69218051B1D85A8BF7E5726C54BA2B832C1EF96361F4408B6D60DD21D6ED0CBC8162C5
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e8892b6b4be8d8cdef2743f277f8f6a7cce569bac03757b2eb7898c30e486a93
                                            • Instruction ID: 82dce8bd37a856c05d823803c8fdf0b7fb33ea5808936ccee1e735177ee78a65
                                            • Opcode Fuzzy Hash: e8892b6b4be8d8cdef2743f277f8f6a7cce569bac03757b2eb7898c30e486a93
                                            • Instruction Fuzzy Hash: 8821BFB2F1881A9AFBD4BA2C80A72F872C1DB4A352F5501B6D64DC71D2DC2CBC429280
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1e811304a6d365c19964fc5e277cd9718683b1a81560210cce740c54797a1a35
                                            • Instruction ID: 7e046e394956f3ef1e536b2fa417c9e6377714a164773b90d9323cc5cef124d0
                                            • Opcode Fuzzy Hash: 1e811304a6d365c19964fc5e277cd9718683b1a81560210cce740c54797a1a35
                                            • Instruction Fuzzy Hash: 5821A170F1854D8EEB98AB6884A66F977E0EF4A311F40407AD24DC6181CE3CA4818BC1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3c4c96b1bc384bae9f142452779ba41947030095cb8165067dae7e5d642cbded
                                            • Instruction ID: b1b4b8593c9f53dcdafa1402bf06552e8fe93e0a6f23574aa4cceeeb7b043b34
                                            • Opcode Fuzzy Hash: 3c4c96b1bc384bae9f142452779ba41947030095cb8165067dae7e5d642cbded
                                            • Instruction Fuzzy Hash: 02110A2770DA8D5BD751A6BCA8761FD7B60DF83231F0502F7D68CCA093DD18240A8392
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b4634166697c1de28cf5d84cb51ae9ae564e19ec71b4855341449d1a30b3b967
                                            • Instruction ID: 888203c46ae3f81c37175a70703c9701c2b916fa4cc9143f9cfbd536e8ef87bc
                                            • Opcode Fuzzy Hash: b4634166697c1de28cf5d84cb51ae9ae564e19ec71b4855341449d1a30b3b967
                                            • Instruction Fuzzy Hash: 8611272770DA8E5BD741A6BCA8661FE7BA0DF43231F0502F7D68CCA093DD18240A8392
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bcbe794574a4ce5cf78008b526866fbabbfdbb5d4a23e6423a113277afb6fce4
                                            • Instruction ID: e17c24f4a8a935ea8e69df4cb7981d592e739a968d995f67e1ac67a97128969c
                                            • Opcode Fuzzy Hash: bcbe794574a4ce5cf78008b526866fbabbfdbb5d4a23e6423a113277afb6fce4
                                            • Instruction Fuzzy Hash: 7DF02872E8EA5DCBDF449E546CA12E477D0FF5A348F06007AD60CD3191DB6D6880C781
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 85bbb01da4c84224002bfdc791180cbca40edd04b41862ab2e6bbab00b212a29
                                            • Instruction ID: 03e496843716ef230e2b0d570a4b3811c051dd46fff88ea8b4f7cf61fde60815
                                            • Opcode Fuzzy Hash: 85bbb01da4c84224002bfdc791180cbca40edd04b41862ab2e6bbab00b212a29
                                            • Instruction Fuzzy Hash: 12F06591F1980BA6FAE9711C54F93B930C2DF96360F540479D60EE15C5ED0D7C4262C1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 04823af1392a12a4019891261dc5e310ff7d6fc803d7f768d1e6adf83b8f3cb0
                                            • Instruction ID: 2ece73295d3b5a90f76116f2f795caf4d02937c8a4fd10b2a3d9a574591d480f
                                            • Opcode Fuzzy Hash: 04823af1392a12a4019891261dc5e310ff7d6fc803d7f768d1e6adf83b8f3cb0
                                            • Instruction Fuzzy Hash: E9E01A70F2881A8FE6A0B668D094AB872D0FF1A310F5508B4E10EC72D5D92CFC815285
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 51eb91bf55f2c1d0ed4b00d61228e4c13f33f23839aa7cdf35d3e185e24301d8
                                            • Instruction ID: ba22b5b7090a7035c01ce2e1eb5859952911891e120c9fd2301df84946d980a2
                                            • Opcode Fuzzy Hash: 51eb91bf55f2c1d0ed4b00d61228e4c13f33f23839aa7cdf35d3e185e24301d8
                                            • Instruction Fuzzy Hash: D5E0207294ED0C8BDB45EE5C5C526E537E0FF4D308F01005AD24CC3181D6696991C7C2
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3d914f9348c9cc0ff8a79716700b9fcd4d2f3e711608004eb8f138bcba7f14d9
                                            • Instruction ID: d7ba51b10ea6d7514b7db49c7c9935f4ade03162aec7eea07cdbd9a9548774b9
                                            • Opcode Fuzzy Hash: 3d914f9348c9cc0ff8a79716700b9fcd4d2f3e711608004eb8f138bcba7f14d9
                                            • Instruction Fuzzy Hash:
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: M_^!$M_^+$M_^-$M_^;$M_^=$M_^?$M_^A$M_^S$M_^U
                                            • API String ID: 0-3353476022
                                            • Opcode ID: e0693031ea2f20c2206985cc48d1526e334ba282ffd697d719769d28a3644793
                                            • Instruction ID: 91fc18080569e56503e8c3b4a40f352776b86b95f065e4337a690276d676d1ef
                                            • Opcode Fuzzy Hash: e0693031ea2f20c2206985cc48d1526e334ba282ffd697d719769d28a3644793
                                            • Instruction Fuzzy Hash: B12168B77145069BD3027A6CB8515EDB3C5EB9026878843F6C128CF183FD34A08B45C0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3384122079.00007FFD34780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffd34780000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: M_^)$M_^G$M_^I$M_^M
                                            • API String ID: 0-1533982009
                                            • Opcode ID: 2f2cca2897c7fff8f9da59dfeff9d349d357368e2178946d6563d4b8e829dfb1
                                            • Instruction ID: 1ab96c83dc5861b349af4c41c0f2b735ec1b0b3a243f7bf3c051aae65f79ebb7
                                            • Opcode Fuzzy Hash: 2f2cca2897c7fff8f9da59dfeff9d349d357368e2178946d6563d4b8e829dfb1
                                            • Instruction Fuzzy Hash: 112125B37089569BD3127BBCB4A61FE77D4EF5222974543B2D148CE193FD18604A86C0

                                            Execution Graph

                                            Execution Coverage:13.2%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:3
                                            Total number of Limit Nodes:0
                                            execution_graph 9183 7ffd3478289d 9184 7ffd347828af NtProtectVirtualMemory 9183->9184 9186 7ffd34782985 9184->9186

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 440 7ffd3478289d-7ffd34782983 NtProtectVirtualMemory 445 7ffd3478298b-7ffd347829b6 440->445 446 7ffd34782985 440->446 446->445
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2177840603.00007FFD34770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34770000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_7ffd34770000_svchost.jbxd
                                            Similarity
                                            • API ID: MemoryProtectVirtual
                                            • String ID:
                                            • API String ID: 2706961497-0
                                            • Opcode ID: 0d565407f49df4830fecfd9699f57d87e8fb94f20fe96d0fc999bcdd8dfccb70
                                            • Instruction ID: 83521665a12d525491640f510d4e384e0648aa874734cd9c5bf34df6956664d6
                                            • Opcode Fuzzy Hash: 0d565407f49df4830fecfd9699f57d87e8fb94f20fe96d0fc999bcdd8dfccb70
                                            • Instruction Fuzzy Hash: B531C671A0CB4C4FDB58DB5CA8166ED7BE1EB99321F00426FE049D3292DE75A8058BC2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2191523592.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ffd34790000_xdwdChrome.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: #CM_^
                                            • API String ID: 0-2311673530
                                            • Opcode ID: 0119f3266b4abb1e9fb66b0d08081801f5a3579473736c1abc0ec2142f067c08
                                            • Instruction ID: 60aea8e68864fd99487c61122bab4f4064b8f747ec860bdb5f74ed6d3b832e38
                                            • Opcode Fuzzy Hash: 0119f3266b4abb1e9fb66b0d08081801f5a3579473736c1abc0ec2142f067c08
                                            • Instruction Fuzzy Hash: 22C19671B1CA168BEB98F76884A17B9B3D6EF59314F540579E10DC32D2DE3CB8428781
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2191523592.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ffd34790000_xdwdChrome.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f798b76f1430da882d7285497dc0aaa1ee739b6fa17d2c0e7d6223bfffac2e31
                                            • Instruction ID: 1877fd3423871fa81bc71d29c1689ad55d8fa01b131cc93c3d3a425bc3175066
                                            • Opcode Fuzzy Hash: f798b76f1430da882d7285497dc0aaa1ee739b6fa17d2c0e7d6223bfffac2e31
                                            • Instruction Fuzzy Hash: 0D51E172F18A1A4FE758A76CA4A66F873D1EF8A321F04007AD54DD3292DD2DAC428680
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2191523592.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ffd34790000_xdwdChrome.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3d1beb0e4750cd3c19f63106fd5bc2a9f9daa9135db6e9ffa463bdc49aee3b43
                                            • Instruction ID: b14bd7a4e776cf5f72927a7bac6120006e0f6cd6c8d91064816e65e3e842fdd2
                                            • Opcode Fuzzy Hash: 3d1beb0e4750cd3c19f63106fd5bc2a9f9daa9135db6e9ffa463bdc49aee3b43
                                            • Instruction Fuzzy Hash: A251A571F28A1A8FEB98A76C94A5ABD73D1EF9A311F040079E54DD32D2DD2DBC418680
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2191523592.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ffd34790000_xdwdChrome.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 854ce2d8800c0f6b5435bbb94b1a61e97c1049269c4aa12572a2174cbfacb5dc
                                            • Instruction ID: 5d5f890bf59fde496a783cf832dee5ffe377d20b887233055d35a20e77feaf26
                                            • Opcode Fuzzy Hash: 854ce2d8800c0f6b5435bbb94b1a61e97c1049269c4aa12572a2174cbfacb5dc
                                            • Instruction Fuzzy Hash: 7C41A571F28A1A8FFB98E76C94A5AB972D1EF5A310F040079E54ED32D2DD2DBC418680
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2191523592.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ffd34790000_xdwdChrome.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d0653cfae975ecc579fda191c464d59fb9357acf7d12c74d75c122055205e7f2
                                            • Instruction ID: 921b5df88bf96a01ffbed0654ffd7c9c06095fed5c95ec7ec9710b8d8cbb17e9
                                            • Opcode Fuzzy Hash: d0653cfae975ecc579fda191c464d59fb9357acf7d12c74d75c122055205e7f2
                                            • Instruction Fuzzy Hash: 7A4183B1F1CA4F46EB2077B828762BF2A999F82215F8104B4E10DD76D7DE6CB9114392
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2191523592.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ffd34790000_xdwdChrome.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ba6b8dd7ecd43c66385080b9d14b3a26eb8995aeb6e5410a108a682fe4a15b96
                                            • Instruction ID: 04955ab78b9bb80d0a4f04e8a234fab462f094c972a999c2b02a45ec1b81b833
                                            • Opcode Fuzzy Hash: ba6b8dd7ecd43c66385080b9d14b3a26eb8995aeb6e5410a108a682fe4a15b96
                                            • Instruction Fuzzy Hash: 7B41C4B0F1CA8B4ADB2177B82C752BE2EA95F83215F8104F5E049D76D7DE5C68114392
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2191523592.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ffd34790000_xdwdChrome.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cdf4a3002bf839610142a07b98cc8884a5fb3ee359948c6785428f91bf4f33d4
                                            • Instruction ID: 064fd5e2a98fe7ae21ecc4a26272fdf512f950082570fd5c39be02913f526fed
                                            • Opcode Fuzzy Hash: cdf4a3002bf839610142a07b98cc8884a5fb3ee359948c6785428f91bf4f33d4
                                            • Instruction Fuzzy Hash: C4110D2770CB895BD311A6BCE8761FD7B60DF83221F4501B7C68CD90A3D915244A4392
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2191523592.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ffd34790000_xdwdChrome.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 275a4db91b6f91da7b32ba0742d1df6f4c0bbd86b4aa425488e95ebd034200f6
                                            • Instruction ID: 970e82e5785fd796ed52338610ab5761e4907f1dc3321546e5f224433ed39815
                                            • Opcode Fuzzy Hash: 275a4db91b6f91da7b32ba0742d1df6f4c0bbd86b4aa425488e95ebd034200f6
                                            • Instruction Fuzzy Hash: 78110A23B0CB9A5BD311A6BCA8671FE3B60DF93220F4501B7D68DDA0A3D915244A8392
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2191523592.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ffd34790000_xdwdChrome.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3d914f9348c9cc0ff8a79716700b9fcd4d2f3e711608004eb8f138bcba7f14d9
                                            • Instruction ID: d7ba51b10ea6d7514b7db49c7c9935f4ade03162aec7eea07cdbd9a9548774b9
                                            • Opcode Fuzzy Hash: 3d914f9348c9cc0ff8a79716700b9fcd4d2f3e711608004eb8f138bcba7f14d9
                                            • Instruction Fuzzy Hash:
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2191523592.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ffd34790000_xdwdChrome.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ";$#;$?M_^$M_^d
                                            • API String ID: 0-1482291326
                                            • Opcode ID: b9b03d6dd93528556f2dd416e6a63996547b69e239c9398251e6e8d1b12eded8
                                            • Instruction ID: a5480c305aedc4338d3893fbee7845d21d37485ddd007c94f97637b8f643abc9
                                            • Opcode Fuzzy Hash: b9b03d6dd93528556f2dd416e6a63996547b69e239c9398251e6e8d1b12eded8
                                            • Instruction Fuzzy Hash: 2BD19387B0D9AB66E22172FD78670FE7B58DF8337DB084777D18C990838C09249682E5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2191523592.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ffd34790000_xdwdChrome.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: L_^!$L_^+$L_^-$L_^;$L_^=$L_^?$L_^A$L_^S$L_^U
                                            • API String ID: 0-2160736064
                                            • Opcode ID: 96be285ac942f7ca64e2b948c38a745dbb3db5785518eabdb42845de94b575e8
                                            • Instruction ID: d41bcd71eb096fd5138d5acd8d69e1102d6b22aad1ed1ae48dde36e204b30a3f
                                            • Opcode Fuzzy Hash: 96be285ac942f7ca64e2b948c38a745dbb3db5785518eabdb42845de94b575e8
                                            • Instruction Fuzzy Hash: D12128B771850A1BD3167EA8B8521EEB385EBD426970892F6C3688F103DF35E48F49D1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2191523592.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ffd34790000_xdwdChrome.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: L_^)$L_^G$L_^I$L_^M
                                            • API String ID: 0-3192170289
                                            • Opcode ID: 70be14c4ebabeac1348841f47fb447499f14bbc252e868557b8a72181d73c216
                                            • Instruction ID: 7c523dbf4fb274737f2d21d57a6c6be9757183f38ea6c42d59d7a5a3e398ed07
                                            • Opcode Fuzzy Hash: 70be14c4ebabeac1348841f47fb447499f14bbc252e868557b8a72181d73c216
                                            • Instruction Fuzzy Hash: C42128B3B0C5525BD3027BBCB8571FE7794DF0222970941B7C2888E153EA18608A86D5