Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
r8gcHFIf3x.exe

Overview

General Information

Sample name:r8gcHFIf3x.exe
renamed because original name is a hash value
Original sample name:0515dceafb2ac3a01d779111aabc07e0876b573b67df42af4e183243e7c506ff.exe
Analysis ID:1546359
MD5:71e459322fc143c6f54fa4075bbea27f
SHA1:91926031ae3212e02ac61236d89fc5e7cdb82655
SHA256:0515dceafb2ac3a01d779111aabc07e0876b573b67df42af4e183243e7c506ff
Tags:exeuser-Chainskilabs
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops PE files with benign system names
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • r8gcHFIf3x.exe (PID: 6200 cmdline: "C:\Users\user\Desktop\r8gcHFIf3x.exe" MD5: 71E459322FC143C6F54FA4075BBEA27F)
  • svchost.exe (PID: 5040 cmdline: "C:\Users\user\AppData\Roaming\svchost.exe" MD5: 71E459322FC143C6F54FA4075BBEA27F)
  • svchost.exe (PID: 5956 cmdline: "C:\Users\user\AppData\Roaming\svchost.exe" MD5: 71E459322FC143C6F54FA4075BBEA27F)
  • cleanup
{"C2 url": ["23.ip.gl.ply.gg", "127.0.0.1"], "Port": "40630", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
r8gcHFIf3x.exeJoeSecurity_XWormYara detected XWormJoe Security
    r8gcHFIf3x.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0xd444:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0xd4e1:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0xd5f6:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0xd09a:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\svchost.exeJoeSecurity_XWormYara detected XWormJoe Security
      C:\Users\user\AppData\Roaming\svchost.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xd444:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0xd4e1:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0xd5f6:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xd09a:$cnc4: POST / HTTP/1.1
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.4127638829.0000000013251000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        00000000.00000002.4127638829.0000000013251000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0x5f04:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0x5fa1:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0x60b6:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0x5b5a:$cnc4: POST / HTTP/1.1
        00000000.00000000.1662726920.0000000000F22000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
          00000000.00000000.1662726920.0000000000F22000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0xd244:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0xd2e1:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0xd3f6:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0xce9a:$cnc4: POST / HTTP/1.1
          Process Memory Space: r8gcHFIf3x.exe PID: 6200JoeSecurity_XWormYara detected XWormJoe Security
            SourceRuleDescriptionAuthorStrings
            0.0.r8gcHFIf3x.exe.f20000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
              0.0.r8gcHFIf3x.exe.f20000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
              • 0xd444:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
              • 0xd4e1:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
              • 0xd5f6:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
              • 0xd09a:$cnc4: POST / HTTP/1.1

              System Summary

              barindex
              Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\r8gcHFIf3x.exe, ProcessId: 6200, TargetFilename: C:\Users\user\AppData\Roaming\svchost.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\AppData\Roaming\svchost.exe" , CommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , ProcessId: 5040, ProcessName: svchost.exe
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\svchost.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\r8gcHFIf3x.exe, ProcessId: 6200, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost
              Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\r8gcHFIf3x.exe, ProcessId: 6200, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
              Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\AppData\Roaming\svchost.exe" , CommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , ProcessId: 5040, ProcessName: svchost.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-31T20:09:14.606055+010020229301A Network Trojan was detected20.12.23.50443192.168.2.449735TCP
              2024-10-31T20:09:53.611751+010020229301A Network Trojan was detected20.12.23.50443192.168.2.449746TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-31T20:11:41.609504+010028531931Malware Command and Control Activity Detected192.168.2.450029147.185.221.2340630TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: r8gcHFIf3x.exeMalware Configuration Extractor: Xworm {"C2 url": ["23.ip.gl.ply.gg", "127.0.0.1"], "Port": "40630", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
              Source: C:\Users\user\AppData\Roaming\svchost.exeReversingLabs: Detection: 81%
              Source: r8gcHFIf3x.exeReversingLabs: Detection: 81%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Roaming\svchost.exeJoe Sandbox ML: detected
              Source: r8gcHFIf3x.exeJoe Sandbox ML: detected
              Source: r8gcHFIf3x.exeString decryptor: 23.ip.gl.ply.gg,127.0.0.1
              Source: r8gcHFIf3x.exeString decryptor: 40630
              Source: r8gcHFIf3x.exeString decryptor: <123456789>
              Source: r8gcHFIf3x.exeString decryptor: <Xwormmm>
              Source: r8gcHFIf3x.exeString decryptor: XWorm V5.6
              Source: r8gcHFIf3x.exeString decryptor: USB.exe
              Source: r8gcHFIf3x.exeString decryptor: %AppData%
              Source: r8gcHFIf3x.exeString decryptor: svchost.exe
              Source: r8gcHFIf3x.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: r8gcHFIf3x.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:49845 -> 147.185.221.23:40630
              Source: Network trafficSuricata IDS: 2853193 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:50029 -> 147.185.221.23:40630
              Source: Malware configuration extractorURLs: 23.ip.gl.ply.gg
              Source: Malware configuration extractorURLs: 127.0.0.1
              Source: global trafficTCP traffic: 192.168.2.4:49742 -> 147.185.221.23:40630
              Source: Joe Sandbox ViewIP Address: 147.185.221.23 147.185.221.23
              Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.4:49735
              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.4:49746
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: 23.ip.gl.ply.gg
              Source: r8gcHFIf3x.exe, 00000000.00000002.4126190732.0000000003241000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

              System Summary

              barindex
              Source: r8gcHFIf3x.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.0.r8gcHFIf3x.exe.f20000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000000.00000002.4127638829.0000000013251000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000000.00000000.1662726920.0000000000F22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeCode function: 0_2_00007FFD9B8980620_2_00007FFD9B898062
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeCode function: 0_2_00007FFD9B8912890_2_00007FFD9B891289
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeCode function: 0_2_00007FFD9B8972B60_2_00007FFD9B8972B6
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 1_2_00007FFD9B8B12891_2_00007FFD9B8B1289
              Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 3_2_00007FFD9B8B12893_2_00007FFD9B8B1289
              Source: r8gcHFIf3x.exe, 00000000.00000002.4127638829.000000001329A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs r8gcHFIf3x.exe
              Source: r8gcHFIf3x.exe, 00000000.00000000.1662749871.0000000000F74000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs r8gcHFIf3x.exe
              Source: r8gcHFIf3x.exeBinary or memory string: OriginalFilenameXClient.exe4 vs r8gcHFIf3x.exe
              Source: r8gcHFIf3x.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: r8gcHFIf3x.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.0.r8gcHFIf3x.exe.f20000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000000.00000002.4127638829.0000000013251000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000000.00000000.1662726920.0000000000F22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: r8gcHFIf3x.exe, pxtEtrZjCmY2xgTvKt0E3Wv3ytzkEjOAFr.csCryptographic APIs: 'TransformFinalBlock'
              Source: r8gcHFIf3x.exe, pxtEtrZjCmY2xgTvKt0E3Wv3ytzkEjOAFr.csCryptographic APIs: 'TransformFinalBlock'
              Source: r8gcHFIf3x.exe, pho3rSOmHqcbUnlzXgy8Bagz4JE3YuNdti.csCryptographic APIs: 'TransformFinalBlock'
              Source: svchost.exe.0.dr, pxtEtrZjCmY2xgTvKt0E3Wv3ytzkEjOAFr.csCryptographic APIs: 'TransformFinalBlock'
              Source: svchost.exe.0.dr, pxtEtrZjCmY2xgTvKt0E3Wv3ytzkEjOAFr.csCryptographic APIs: 'TransformFinalBlock'
              Source: svchost.exe.0.dr, pho3rSOmHqcbUnlzXgy8Bagz4JE3YuNdti.csCryptographic APIs: 'TransformFinalBlock'
              Source: svchost.exe.0.dr, YzIGmiPgKJnYbfyfkZHjnmJHHAU8M65EWIsfycHGCX6KDORFPNUxl7rxmKvK6UsGxkdV0p4nFlvmUWh17alqYY33cFmX.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: svchost.exe.0.dr, YzIGmiPgKJnYbfyfkZHjnmJHHAU8M65EWIsfycHGCX6KDORFPNUxl7rxmKvK6UsGxkdV0p4nFlvmUWh17alqYY33cFmX.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: r8gcHFIf3x.exe, YzIGmiPgKJnYbfyfkZHjnmJHHAU8M65EWIsfycHGCX6KDORFPNUxl7rxmKvK6UsGxkdV0p4nFlvmUWh17alqYY33cFmX.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: r8gcHFIf3x.exe, YzIGmiPgKJnYbfyfkZHjnmJHHAU8M65EWIsfycHGCX6KDORFPNUxl7rxmKvK6UsGxkdV0p4nFlvmUWh17alqYY33cFmX.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: classification engineClassification label: mal100.troj.evad.winEXE@3/3@2/2
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile created: C:\Users\user\AppData\Roaming\svchost.exeJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeMutant created: \Sessions\1\BaseNamedObjects\VdX3velzFq0rtigH
              Source: C:\Users\user\AppData\Roaming\svchost.exeMutant created: NULL
              Source: r8gcHFIf3x.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: r8gcHFIf3x.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: r8gcHFIf3x.exeReversingLabs: Detection: 81%
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile read: C:\Users\user\Desktop\r8gcHFIf3x.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\r8gcHFIf3x.exe "C:\Users\user\Desktop\r8gcHFIf3x.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe"
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: linkinfo.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: ntshrui.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: cscapi.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: avicap32.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: msvfw32.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32Jump to behavior
              Source: svchost.lnk.0.drLNK file: ..\..\..\..\..\svchost.exe
              Source: r8gcHFIf3x.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: r8gcHFIf3x.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: r8gcHFIf3x.exe, tpeocHLsTaOhXVtWwkN8L95AXK083dgzOlfI8QUcW5aDC4b3Ktet96cExtHlbI2fQSJmlo5j9tppmccAQKdpDsq2Z2sz.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{YgFE4kXx0wxgkpRzAZb5RwGdnThqFjuhpfw2CfzqLn9Ae9tBMmdHXMOY28DrFrEWBXGCq4pGP5yI8OJkxWOtOXcaHyfn.xT3t9bMqv2L437TOhtNVSFeWry5fDgUOubCKt8zH2GtMmXgdp2cXdUDKmT8tjq05pP5DyyAs5iM7MUrRhkVeuFLOv7F6,YgFE4kXx0wxgkpRzAZb5RwGdnThqFjuhpfw2CfzqLn9Ae9tBMmdHXMOY28DrFrEWBXGCq4pGP5yI8OJkxWOtOXcaHyfn.Q4A2sZ2cdl2dk7hqDJXk7A1wFw2mzzBEbe3LHHloWngyd4vXP3fR3r3Kfnj94TQuKclWlEY6UwdKsfU3Oo4R6jwseRx0,YgFE4kXx0wxgkpRzAZb5RwGdnThqFjuhpfw2CfzqLn9Ae9tBMmdHXMOY28DrFrEWBXGCq4pGP5yI8OJkxWOtOXcaHyfn.m7zlEJVIt5RZw68dKns3lZXHzG8ngwyibMmX0NOyM9XZjpgKIHYAdP20azX9Fycxa4zBANbOYWNr99DldvFQokBq6EpH,YgFE4kXx0wxgkpRzAZb5RwGdnThqFjuhpfw2CfzqLn9Ae9tBMmdHXMOY28DrFrEWBXGCq4pGP5yI8OJkxWOtOXcaHyfn.PbC64ZrgSMPRqMvCxQZugn5eWlhspR8GeCArNBLr8VCL6HGrps7SKpzBiRW1JDX8QPSABwVkvulKnk8IEAWwVJPlNdbJ,pxtEtrZjCmY2xgTvKt0E3Wv3ytzkEjOAFr.Qn1MNxQL9Ko2Z4j5bCf19ikDidJY0de3hn()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: r8gcHFIf3x.exe, tpeocHLsTaOhXVtWwkN8L95AXK083dgzOlfI8QUcW5aDC4b3Ktet96cExtHlbI2fQSJmlo5j9tppmccAQKdpDsq2Z2sz.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{nR0twHRFAp04To9YwddNY09R6Ctu2FDz1A[2],pxtEtrZjCmY2xgTvKt0E3Wv3ytzkEjOAFr.Qo2Hp77EYBRZYWkTQAQTEd6hGUPSHDylkc(Convert.FromBase64String(nR0twHRFAp04To9YwddNY09R6Ctu2FDz1A[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: svchost.exe.0.dr, tpeocHLsTaOhXVtWwkN8L95AXK083dgzOlfI8QUcW5aDC4b3Ktet96cExtHlbI2fQSJmlo5j9tppmccAQKdpDsq2Z2sz.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{YgFE4kXx0wxgkpRzAZb5RwGdnThqFjuhpfw2CfzqLn9Ae9tBMmdHXMOY28DrFrEWBXGCq4pGP5yI8OJkxWOtOXcaHyfn.xT3t9bMqv2L437TOhtNVSFeWry5fDgUOubCKt8zH2GtMmXgdp2cXdUDKmT8tjq05pP5DyyAs5iM7MUrRhkVeuFLOv7F6,YgFE4kXx0wxgkpRzAZb5RwGdnThqFjuhpfw2CfzqLn9Ae9tBMmdHXMOY28DrFrEWBXGCq4pGP5yI8OJkxWOtOXcaHyfn.Q4A2sZ2cdl2dk7hqDJXk7A1wFw2mzzBEbe3LHHloWngyd4vXP3fR3r3Kfnj94TQuKclWlEY6UwdKsfU3Oo4R6jwseRx0,YgFE4kXx0wxgkpRzAZb5RwGdnThqFjuhpfw2CfzqLn9Ae9tBMmdHXMOY28DrFrEWBXGCq4pGP5yI8OJkxWOtOXcaHyfn.m7zlEJVIt5RZw68dKns3lZXHzG8ngwyibMmX0NOyM9XZjpgKIHYAdP20azX9Fycxa4zBANbOYWNr99DldvFQokBq6EpH,YgFE4kXx0wxgkpRzAZb5RwGdnThqFjuhpfw2CfzqLn9Ae9tBMmdHXMOY28DrFrEWBXGCq4pGP5yI8OJkxWOtOXcaHyfn.PbC64ZrgSMPRqMvCxQZugn5eWlhspR8GeCArNBLr8VCL6HGrps7SKpzBiRW1JDX8QPSABwVkvulKnk8IEAWwVJPlNdbJ,pxtEtrZjCmY2xgTvKt0E3Wv3ytzkEjOAFr.Qn1MNxQL9Ko2Z4j5bCf19ikDidJY0de3hn()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: svchost.exe.0.dr, tpeocHLsTaOhXVtWwkN8L95AXK083dgzOlfI8QUcW5aDC4b3Ktet96cExtHlbI2fQSJmlo5j9tppmccAQKdpDsq2Z2sz.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{nR0twHRFAp04To9YwddNY09R6Ctu2FDz1A[2],pxtEtrZjCmY2xgTvKt0E3Wv3ytzkEjOAFr.Qo2Hp77EYBRZYWkTQAQTEd6hGUPSHDylkc(Convert.FromBase64String(nR0twHRFAp04To9YwddNY09R6Ctu2FDz1A[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: r8gcHFIf3x.exe, tpeocHLsTaOhXVtWwkN8L95AXK083dgzOlfI8QUcW5aDC4b3Ktet96cExtHlbI2fQSJmlo5j9tppmccAQKdpDsq2Z2sz.cs.Net Code: AkXev93FSuWdPKLUrKCQFADuOpAxsZMNuaZPaMugnaPyCsEp0doSUtIc2fStj0EDUYpx1CD9sSBtVOSpSFOPLWyZSU3f System.AppDomain.Load(byte[])
              Source: r8gcHFIf3x.exe, tpeocHLsTaOhXVtWwkN8L95AXK083dgzOlfI8QUcW5aDC4b3Ktet96cExtHlbI2fQSJmlo5j9tppmccAQKdpDsq2Z2sz.cs.Net Code: IqvHyogxhMKuogzYB2b0Snzapy9KHTHBhN System.AppDomain.Load(byte[])
              Source: r8gcHFIf3x.exe, tpeocHLsTaOhXVtWwkN8L95AXK083dgzOlfI8QUcW5aDC4b3Ktet96cExtHlbI2fQSJmlo5j9tppmccAQKdpDsq2Z2sz.cs.Net Code: IqvHyogxhMKuogzYB2b0Snzapy9KHTHBhN
              Source: svchost.exe.0.dr, tpeocHLsTaOhXVtWwkN8L95AXK083dgzOlfI8QUcW5aDC4b3Ktet96cExtHlbI2fQSJmlo5j9tppmccAQKdpDsq2Z2sz.cs.Net Code: AkXev93FSuWdPKLUrKCQFADuOpAxsZMNuaZPaMugnaPyCsEp0doSUtIc2fStj0EDUYpx1CD9sSBtVOSpSFOPLWyZSU3f System.AppDomain.Load(byte[])
              Source: svchost.exe.0.dr, tpeocHLsTaOhXVtWwkN8L95AXK083dgzOlfI8QUcW5aDC4b3Ktet96cExtHlbI2fQSJmlo5j9tppmccAQKdpDsq2Z2sz.cs.Net Code: IqvHyogxhMKuogzYB2b0Snzapy9KHTHBhN System.AppDomain.Load(byte[])
              Source: svchost.exe.0.dr, tpeocHLsTaOhXVtWwkN8L95AXK083dgzOlfI8QUcW5aDC4b3Ktet96cExtHlbI2fQSJmlo5j9tppmccAQKdpDsq2Z2sz.cs.Net Code: IqvHyogxhMKuogzYB2b0Snzapy9KHTHBhN
              Source: r8gcHFIf3x.exe, Nzn4QmVYYfjF5KbF2n413Arg37qvJHChOb.csHigh entropy of concatenated method names: 'W1X0XcD8t5zr4KxTapiVtTepEbiWCbhwXv', 'Elst2oNJcpq7eOKiUgDVj9bNVhi12zpuU2', 'nt3B5DwU8SXyZroDbGayYtEqZwPCZfpGKF', 'pIhgMyWVHTN4nBw6khBjkwFaimY441RZ4OHDynQJONSSQ0T2wFJWbePXsAaBKFPfhk', 'nI4SYB79cKikwOv0iqntsUN5SJtbEpAnSFA1MU3XanSFXc0qs4zRxpJE4QKwB71o9l', 'MSXYrMoEq91Bs7bw0BlCOFLv99UYwLW1GTJoou0IW1lp9JnmBaIADFAn2Qx6IZSt2X', 'JR9MyLrxZmZE9wb8xcl3WPptRb67sRcWoxI5RFuMaVolSQ1llOOdtpRK7rUIb1z5BZ', '_37XDzhRSid7tETTfHcNCBgTsEW4nE8Vk63cjyQ5fCZl5UhDfWWgH7mVyrvOVobZcAh', 'rQqominxLA9seeM4CoEI3lbeXtcW8MiGsnDVrbREfmDMIgzim9X2kaSn52hBqWaNKt', '_1Xe95kpMnQFY1wa3kgwq2mAMh1l2LOVMalQuyiZ9FYfilHW2VeuzkwCzaehSAsLpZR'
              Source: r8gcHFIf3x.exe, YgFE4kXx0wxgkpRzAZb5RwGdnThqFjuhpfw2CfzqLn9Ae9tBMmdHXMOY28DrFrEWBXGCq4pGP5yI8OJkxWOtOXcaHyfn.csHigh entropy of concatenated method names: '_0mZlS0jhwuO3v54pxVdjfaqbNtkwiujJDi', 'Z0EeZ65YYWEsJdBCGPzGLGqp5XbChzgYlT', 'EPZ9TUP3C33nZmOvURcyvEtFkPPiGnqZnp', 'AGorOGLMiLaydWMRxHimC3YBZtSZJH8atS'
              Source: r8gcHFIf3x.exe, tfgVm6D8umxIfo1dHPpt2RJAjyYw7BPXwLl82ZqQ8ZyYJhcBtWqjDJwpM0492aPlynPaj5BCvTusiY0pAmNFtqVdJX8T.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', '_1aZx0kNkRYHwYJC66Ap4n8Mv16RQWMJrPj', 'O7WHTQj3hnbsi7IEMsHmI5NpiNC4Hc0fOW', 'DEuAhpYpiYCyoKQT8StAgI78MShNlC72bB', 'FRQfv79jbHQtbXBwPo8rdSxU5xq64qAzSF'
              Source: r8gcHFIf3x.exe, tpeocHLsTaOhXVtWwkN8L95AXK083dgzOlfI8QUcW5aDC4b3Ktet96cExtHlbI2fQSJmlo5j9tppmccAQKdpDsq2Z2sz.csHigh entropy of concatenated method names: 'xzLWdTT4Gb2FJRdaah6MV6qa4lKtbwpT9OTIYA5eAUhFS3feifzmxHhCRsYUSviZxrhCcjEZx7zWW4eNeY1V0Hkarz8V', 'AkXev93FSuWdPKLUrKCQFADuOpAxsZMNuaZPaMugnaPyCsEp0doSUtIc2fStj0EDUYpx1CD9sSBtVOSpSFOPLWyZSU3f', 'RxopihD9ffEjjZngLigJW4hxmRXVuScSCSjwGHmxvL7oqOlk8SV2sBNBQRiyo2sFEnxMDa9yh9n3MnOSfYAMdhzt1ogv', 'NmGjcCUZ49RlWuXs1CJVCyyXCKDdu1f9zpxU4snxfGQn24vbR2mWD2vGxwMymqzQJariEAqo9sNSvM030mnTvbG8eklM', 'hraADK1pVojBr0AW9NkSDq67ttn7r38nfLBXdPaAg8ftE6vI0Gm4lZV3KqRIEwTmBikeeUn6DzBohwrzxTI8C5lPwWSp', 'vTnpzA97zexXeV1l1jGC8NXjrM3e2yIR9dY2CjQFfRAjlSRhiO2lsVmj1qXqTVqV8bm7sbaKPoKiuahI7Vnjpg1w6z8A', 'P51HgDNJ7OH3arFKxzFvFYqjsMdTGH5c9ctGBTSNbqsJlzh8mwQZ2CaCplot6AKmqMnEjAHx3bPf1uXpFLF0LudXLCM2', 'H2ahoUWnWyyoSd5CXU8wIY9CUpeC0x2Z7Tp0gAPiIPxcmsx4i2DMVFzuAABDzvPaf2Cf5YMJN94eishQepiIKRuP5Usg', 'myx2lCFg8uw0h4Edvs3gRjgfgIjOMfag3w', 'Ww8ZRSO5YbWDgF3GhcNEWehckuCi7YSOfx'
              Source: r8gcHFIf3x.exe, YzIGmiPgKJnYbfyfkZHjnmJHHAU8M65EWIsfycHGCX6KDORFPNUxl7rxmKvK6UsGxkdV0p4nFlvmUWh17alqYY33cFmX.csHigh entropy of concatenated method names: 'jjO0O2jqL8vmR9Chd0qR5eQRKHO1GyJT0kUPmnmQtDs2VLV40xzb6Rs4TagHULzAVoZLKnngM60FjcGBzu89DmTQI8vJ', 'kjhXWJSokhOtFfqu8NDIUrAD19dRivDF3StU1mj38dyv0wmsq5wRzXB2bRfJJzmUk82EtbfShYpx1RFuFxZKfESAQBEh', '_1UZH3tTApbrChxltnHeq6xEZ60HzDN0wp0HZPB78EArM7wTdkpOl2mMmoXMNzufUYPqfcp10W8nVohoHcsyJTWhxURnz', 'TNR0TFYwaS00LfDWiN9vdgjBftaFd9ukJBSlPQaQqSFcFovTM6FnUL4JrN2armr0ZUDCxfnqdsgYznwQFSixVk6mkPzL', 'z7Htu8z2E3jX6MUgCR6BbVjw2bM4dyVI9ak8PQclYUCDzDu8djVw7P7iSXZJHfUE9lO0OeuwYaML9Gj0JV1e3DDC5DbD', 'dvALSphKd8LdHbaXin6qbEhqpORwTsrkpJ6fovuUXPp2AbNSBD7BRbm7bIyCtpORtSGnD9e2BJDquGHdTx2ODPOeizVu', 'L0K2CN12pdjPf924idUEA5xeup8i2HPgZ3hBgMAPZCrw1qjkMk9AsuUD0F3iTseAqEFAF5upgZDXO4i72oWcA805HmmE', 'rU2AG5th59Fb7E9OZMr0FHTp2ECAfhy3UJI1q7K8NBkBAmothVeaK1puiEO2Dj6amyvFDm7sSB7uMAba7m8SDOLYUQs3', 'AwHXNOrsSWKO9ENisqKTOyxRYhUZ8nYJWi9Rz6ozmhGjEx1HEoFJjQVKCrLZkc1pZHewWWesF8SuTAmWGaabKo8zmXYV', 'SJry6YPU5zZN7CDG9yDQ8VKcHJvKvjVVZxS3x4OhNa4aYnvwMjQqo4QMe2flsmKvXp6B8IflWehOFEebfMKyxiqohBYT'
              Source: r8gcHFIf3x.exe, pxtEtrZjCmY2xgTvKt0E3Wv3ytzkEjOAFr.csHigh entropy of concatenated method names: 'Uhznn11mf6B0rRRYiTsSudEI85opxeON3V', 'jrdcgsri4CHBg6yraaoEcuLv4pse9OQd8P', 'pONd1qDfZpQzwkM9DshCvaDQ2SyZetQzxw', 'LN67S4aP909G2NZWx9wYMEfixD1xr06HTc', 'akoV1HslHfgbmaQaVcEmEueCwZ4P1v0bBl', 'ThShI1Qk4nypZOLt7B2Sym28MgPcoNpCfn', '_4MnPrgMTp3szGoClp4QwJfuHZWEpOtVeF5', 'DKO0hhqMATBoqoEV9qRtkiTQ5CDXaY7iwJ', '_0g1uxrjbqAaAskK8NMHAalLca0juxaKKOK', 'GklncdwpNglacw2anC7h3wmGIbHwXqOq1I'
              Source: r8gcHFIf3x.exe, pho3rSOmHqcbUnlzXgy8Bagz4JE3YuNdti.csHigh entropy of concatenated method names: '_0icrunfexnMxtINK7LezMekONnryqXUocz', 'OB25gU0MW5oT87UEd6FXBmUsJlWZYVFMb4tIJ8lfXq8XoixMFIdWrUU3jdg8ADkBxQ', 'nn1FcqgizBCETFZInEquMNRhxp4mTiuHw0HxUNi3sqKR1oLtnbBHtuZKpzYwGcQeaZ', 'WDWyf7ocNJxOauFHmxSe8x1GT9dKVN0dOdA2KZg00YEX0s1NPMWsyg39pBRKNCHhkk', 'PGK2GzYVqSvO5APWHdhb4Za8EJ7ghvm5ywnKRRqbxhNcpMkRs7SFUYaBmnqxe0pMKh'
              Source: r8gcHFIf3x.exe, MtvKIjJV4EBaEvHD8rGhwbnf7R7wcR7zxg.csHigh entropy of concatenated method names: 'HDwog3vtkOIDxgZNUCFu8rQUJMTlrXbM1Q', 'KuPE3Iuyxr1nlP381V8cH6e5G621iDeSdgHrh5rFC8ashlCvEukUiPzbnjr1oUWAij', 'PJBPo57VNwCjjajYAARf0C0FjBRW2U3i5U4Z6DpZNocDecM2BcGwXI8KgaHnyB42nv', 'qFM3lHeZ0bApEMBegX6qWPCPcrkm0WBjNTAgQzugiZyUX1QtqCPqPjZJfORqHUHapz', 'XymJZkmtVxAiG2EyR18EN2dh4R8ytc6RIOAr9LR0sHgrjvC0qFH7Vq8iMejAcHClKC'
              Source: r8gcHFIf3x.exe, 8MyZ0VKDRsvCYuSMWMje1VOY4Yodx0mEmcCuwdf0d5IIenIlnwtKU8Cjtgi26pQNhG6X4f1X4GnovSJMgUGK3GrZYND4.csHigh entropy of concatenated method names: 'oszdFmqhQQRBmLmKMJfCh9xJdluKkajSsc9uvkwAWNM8EA6Ss8NXxbxdPvCtMt2R6FI3zD1vk49qANODuEFdbqhncvTS', 'Q6vwQVyaLPr17iFFUGDE9GOiw2pmMN7qlIgDUrs60LJ2dp9AQWdtoi9GRctOpRnfAB6ZuOWwisfnweJ7SeBPYrebDxXo', 'AAU8KvF5gTWN2XxQqvyYYXAIpPl1XrX7JaDYVQDW51H7IVdj7mMNekudtvIBlj87YDSW9ddl1uBMfWQzC69wom91MIYA', 'hPNIcK9XI9hmicPhRnl22atq5dzRC6ENsX', 'w6qbrGs4SEQV7tSZXlx6yKcZnQaTfZN4U3', 'sTXNrOXsuzmUyuStLc9vvITHwrETZiSQ12', 'V3zF0OxkUO2Z4ZoxVugpRZQTL7ECzCBCbL', '_6LpD3k1wr1z8AFRmgyOX6BwTPgtjnopZhK', 'fJPyYpkpsdwJ9DJZjbk6L4fqSRVMY3HRxy', 'rlph7BuQ8hQh4e4VTFVH7HVEtO8J91yqGy'
              Source: svchost.exe.0.dr, Nzn4QmVYYfjF5KbF2n413Arg37qvJHChOb.csHigh entropy of concatenated method names: 'W1X0XcD8t5zr4KxTapiVtTepEbiWCbhwXv', 'Elst2oNJcpq7eOKiUgDVj9bNVhi12zpuU2', 'nt3B5DwU8SXyZroDbGayYtEqZwPCZfpGKF', 'pIhgMyWVHTN4nBw6khBjkwFaimY441RZ4OHDynQJONSSQ0T2wFJWbePXsAaBKFPfhk', 'nI4SYB79cKikwOv0iqntsUN5SJtbEpAnSFA1MU3XanSFXc0qs4zRxpJE4QKwB71o9l', 'MSXYrMoEq91Bs7bw0BlCOFLv99UYwLW1GTJoou0IW1lp9JnmBaIADFAn2Qx6IZSt2X', 'JR9MyLrxZmZE9wb8xcl3WPptRb67sRcWoxI5RFuMaVolSQ1llOOdtpRK7rUIb1z5BZ', '_37XDzhRSid7tETTfHcNCBgTsEW4nE8Vk63cjyQ5fCZl5UhDfWWgH7mVyrvOVobZcAh', 'rQqominxLA9seeM4CoEI3lbeXtcW8MiGsnDVrbREfmDMIgzim9X2kaSn52hBqWaNKt', '_1Xe95kpMnQFY1wa3kgwq2mAMh1l2LOVMalQuyiZ9FYfilHW2VeuzkwCzaehSAsLpZR'
              Source: svchost.exe.0.dr, YgFE4kXx0wxgkpRzAZb5RwGdnThqFjuhpfw2CfzqLn9Ae9tBMmdHXMOY28DrFrEWBXGCq4pGP5yI8OJkxWOtOXcaHyfn.csHigh entropy of concatenated method names: '_0mZlS0jhwuO3v54pxVdjfaqbNtkwiujJDi', 'Z0EeZ65YYWEsJdBCGPzGLGqp5XbChzgYlT', 'EPZ9TUP3C33nZmOvURcyvEtFkPPiGnqZnp', 'AGorOGLMiLaydWMRxHimC3YBZtSZJH8atS'
              Source: svchost.exe.0.dr, tfgVm6D8umxIfo1dHPpt2RJAjyYw7BPXwLl82ZqQ8ZyYJhcBtWqjDJwpM0492aPlynPaj5BCvTusiY0pAmNFtqVdJX8T.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', '_1aZx0kNkRYHwYJC66Ap4n8Mv16RQWMJrPj', 'O7WHTQj3hnbsi7IEMsHmI5NpiNC4Hc0fOW', 'DEuAhpYpiYCyoKQT8StAgI78MShNlC72bB', 'FRQfv79jbHQtbXBwPo8rdSxU5xq64qAzSF'
              Source: svchost.exe.0.dr, tpeocHLsTaOhXVtWwkN8L95AXK083dgzOlfI8QUcW5aDC4b3Ktet96cExtHlbI2fQSJmlo5j9tppmccAQKdpDsq2Z2sz.csHigh entropy of concatenated method names: 'xzLWdTT4Gb2FJRdaah6MV6qa4lKtbwpT9OTIYA5eAUhFS3feifzmxHhCRsYUSviZxrhCcjEZx7zWW4eNeY1V0Hkarz8V', 'AkXev93FSuWdPKLUrKCQFADuOpAxsZMNuaZPaMugnaPyCsEp0doSUtIc2fStj0EDUYpx1CD9sSBtVOSpSFOPLWyZSU3f', 'RxopihD9ffEjjZngLigJW4hxmRXVuScSCSjwGHmxvL7oqOlk8SV2sBNBQRiyo2sFEnxMDa9yh9n3MnOSfYAMdhzt1ogv', 'NmGjcCUZ49RlWuXs1CJVCyyXCKDdu1f9zpxU4snxfGQn24vbR2mWD2vGxwMymqzQJariEAqo9sNSvM030mnTvbG8eklM', 'hraADK1pVojBr0AW9NkSDq67ttn7r38nfLBXdPaAg8ftE6vI0Gm4lZV3KqRIEwTmBikeeUn6DzBohwrzxTI8C5lPwWSp', 'vTnpzA97zexXeV1l1jGC8NXjrM3e2yIR9dY2CjQFfRAjlSRhiO2lsVmj1qXqTVqV8bm7sbaKPoKiuahI7Vnjpg1w6z8A', 'P51HgDNJ7OH3arFKxzFvFYqjsMdTGH5c9ctGBTSNbqsJlzh8mwQZ2CaCplot6AKmqMnEjAHx3bPf1uXpFLF0LudXLCM2', 'H2ahoUWnWyyoSd5CXU8wIY9CUpeC0x2Z7Tp0gAPiIPxcmsx4i2DMVFzuAABDzvPaf2Cf5YMJN94eishQepiIKRuP5Usg', 'myx2lCFg8uw0h4Edvs3gRjgfgIjOMfag3w', 'Ww8ZRSO5YbWDgF3GhcNEWehckuCi7YSOfx'
              Source: svchost.exe.0.dr, YzIGmiPgKJnYbfyfkZHjnmJHHAU8M65EWIsfycHGCX6KDORFPNUxl7rxmKvK6UsGxkdV0p4nFlvmUWh17alqYY33cFmX.csHigh entropy of concatenated method names: 'jjO0O2jqL8vmR9Chd0qR5eQRKHO1GyJT0kUPmnmQtDs2VLV40xzb6Rs4TagHULzAVoZLKnngM60FjcGBzu89DmTQI8vJ', 'kjhXWJSokhOtFfqu8NDIUrAD19dRivDF3StU1mj38dyv0wmsq5wRzXB2bRfJJzmUk82EtbfShYpx1RFuFxZKfESAQBEh', '_1UZH3tTApbrChxltnHeq6xEZ60HzDN0wp0HZPB78EArM7wTdkpOl2mMmoXMNzufUYPqfcp10W8nVohoHcsyJTWhxURnz', 'TNR0TFYwaS00LfDWiN9vdgjBftaFd9ukJBSlPQaQqSFcFovTM6FnUL4JrN2armr0ZUDCxfnqdsgYznwQFSixVk6mkPzL', 'z7Htu8z2E3jX6MUgCR6BbVjw2bM4dyVI9ak8PQclYUCDzDu8djVw7P7iSXZJHfUE9lO0OeuwYaML9Gj0JV1e3DDC5DbD', 'dvALSphKd8LdHbaXin6qbEhqpORwTsrkpJ6fovuUXPp2AbNSBD7BRbm7bIyCtpORtSGnD9e2BJDquGHdTx2ODPOeizVu', 'L0K2CN12pdjPf924idUEA5xeup8i2HPgZ3hBgMAPZCrw1qjkMk9AsuUD0F3iTseAqEFAF5upgZDXO4i72oWcA805HmmE', 'rU2AG5th59Fb7E9OZMr0FHTp2ECAfhy3UJI1q7K8NBkBAmothVeaK1puiEO2Dj6amyvFDm7sSB7uMAba7m8SDOLYUQs3', 'AwHXNOrsSWKO9ENisqKTOyxRYhUZ8nYJWi9Rz6ozmhGjEx1HEoFJjQVKCrLZkc1pZHewWWesF8SuTAmWGaabKo8zmXYV', 'SJry6YPU5zZN7CDG9yDQ8VKcHJvKvjVVZxS3x4OhNa4aYnvwMjQqo4QMe2flsmKvXp6B8IflWehOFEebfMKyxiqohBYT'
              Source: svchost.exe.0.dr, pxtEtrZjCmY2xgTvKt0E3Wv3ytzkEjOAFr.csHigh entropy of concatenated method names: 'Uhznn11mf6B0rRRYiTsSudEI85opxeON3V', 'jrdcgsri4CHBg6yraaoEcuLv4pse9OQd8P', 'pONd1qDfZpQzwkM9DshCvaDQ2SyZetQzxw', 'LN67S4aP909G2NZWx9wYMEfixD1xr06HTc', 'akoV1HslHfgbmaQaVcEmEueCwZ4P1v0bBl', 'ThShI1Qk4nypZOLt7B2Sym28MgPcoNpCfn', '_4MnPrgMTp3szGoClp4QwJfuHZWEpOtVeF5', 'DKO0hhqMATBoqoEV9qRtkiTQ5CDXaY7iwJ', '_0g1uxrjbqAaAskK8NMHAalLca0juxaKKOK', 'GklncdwpNglacw2anC7h3wmGIbHwXqOq1I'
              Source: svchost.exe.0.dr, pho3rSOmHqcbUnlzXgy8Bagz4JE3YuNdti.csHigh entropy of concatenated method names: '_0icrunfexnMxtINK7LezMekONnryqXUocz', 'OB25gU0MW5oT87UEd6FXBmUsJlWZYVFMb4tIJ8lfXq8XoixMFIdWrUU3jdg8ADkBxQ', 'nn1FcqgizBCETFZInEquMNRhxp4mTiuHw0HxUNi3sqKR1oLtnbBHtuZKpzYwGcQeaZ', 'WDWyf7ocNJxOauFHmxSe8x1GT9dKVN0dOdA2KZg00YEX0s1NPMWsyg39pBRKNCHhkk', 'PGK2GzYVqSvO5APWHdhb4Za8EJ7ghvm5ywnKRRqbxhNcpMkRs7SFUYaBmnqxe0pMKh'
              Source: svchost.exe.0.dr, MtvKIjJV4EBaEvHD8rGhwbnf7R7wcR7zxg.csHigh entropy of concatenated method names: 'HDwog3vtkOIDxgZNUCFu8rQUJMTlrXbM1Q', 'KuPE3Iuyxr1nlP381V8cH6e5G621iDeSdgHrh5rFC8ashlCvEukUiPzbnjr1oUWAij', 'PJBPo57VNwCjjajYAARf0C0FjBRW2U3i5U4Z6DpZNocDecM2BcGwXI8KgaHnyB42nv', 'qFM3lHeZ0bApEMBegX6qWPCPcrkm0WBjNTAgQzugiZyUX1QtqCPqPjZJfORqHUHapz', 'XymJZkmtVxAiG2EyR18EN2dh4R8ytc6RIOAr9LR0sHgrjvC0qFH7Vq8iMejAcHClKC'
              Source: svchost.exe.0.dr, 8MyZ0VKDRsvCYuSMWMje1VOY4Yodx0mEmcCuwdf0d5IIenIlnwtKU8Cjtgi26pQNhG6X4f1X4GnovSJMgUGK3GrZYND4.csHigh entropy of concatenated method names: 'oszdFmqhQQRBmLmKMJfCh9xJdluKkajSsc9uvkwAWNM8EA6Ss8NXxbxdPvCtMt2R6FI3zD1vk49qANODuEFdbqhncvTS', 'Q6vwQVyaLPr17iFFUGDE9GOiw2pmMN7qlIgDUrs60LJ2dp9AQWdtoi9GRctOpRnfAB6ZuOWwisfnweJ7SeBPYrebDxXo', 'AAU8KvF5gTWN2XxQqvyYYXAIpPl1XrX7JaDYVQDW51H7IVdj7mMNekudtvIBlj87YDSW9ddl1uBMfWQzC69wom91MIYA', 'hPNIcK9XI9hmicPhRnl22atq5dzRC6ENsX', 'w6qbrGs4SEQV7tSZXlx6yKcZnQaTfZN4U3', 'sTXNrOXsuzmUyuStLc9vvITHwrETZiSQ12', 'V3zF0OxkUO2Z4ZoxVugpRZQTL7ECzCBCbL', '_6LpD3k1wr1z8AFRmgyOX6BwTPgtjnopZhK', 'fJPyYpkpsdwJ9DJZjbk6L4fqSRVMY3HRxy', 'rlph7BuQ8hQh4e4VTFVH7HVEtO8J91yqGy'

              Persistence and Installation Behavior

              barindex
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile created: C:\Users\user\AppData\Roaming\svchost.exeJump to dropped file
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile created: C:\Users\user\AppData\Roaming\svchost.exeJump to dropped file
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnkJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnkJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run svchostJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run svchostJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeMemory allocated: 3060000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeMemory allocated: 1B240000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: FD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 1A9A0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: FA0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 1ABA0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWindow / User API: threadDelayed 9792Jump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exe TID: 2852Thread sleep time: -22136092888451448s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exe TID: 4960Thread sleep count: 9792 > 30Jump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exe TID: 4960Thread sleep count: 35 > 30Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exe TID: 2992Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exe TID: 5808Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: r8gcHFIf3x.exe, 00000000.00000002.4128074677.000000001C2B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWhttp%SystemRoot%\system32\mswsock.dllion=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />
              Source: r8gcHFIf3x.exe, svchost.exe.0.drBinary or memory string: PING!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
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeMemory allocated: page read and write | page guardJump to behavior
              Source: r8gcHFIf3x.exe, 00000000.00000002.4126190732.0000000003444000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'PING!<Xwormmm>Program Manager<Xwormmm>0
              Source: r8gcHFIf3x.exe, 00000000.00000002.4126190732.0000000003444000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: r8gcHFIf3x.exe, 00000000.00000002.4126190732.0000000003444000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PING!<Xwormmm>Program Manager<Xwormmm>0
              Source: r8gcHFIf3x.exe, 00000000.00000002.4126190732.0000000003444000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager2y
              Source: r8gcHFIf3x.exe, 00000000.00000002.4126190732.0000000003444000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'PING!<Xwormmm>Program Manager<Xwormmm>0@
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeQueries volume information: C:\Users\user\Desktop\r8gcHFIf3x.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: r8gcHFIf3x.exe, 00000000.00000002.4128074677.000000001C2B0000.00000004.00000020.00020000.00000000.sdmp, r8gcHFIf3x.exe, 00000000.00000002.4125313343.00000000013E3000.00000004.00000020.00020000.00000000.sdmp, r8gcHFIf3x.exe, 00000000.00000002.4125313343.000000000132C000.00000004.00000020.00020000.00000000.sdmp, r8gcHFIf3x.exe, 00000000.00000002.4128074677.000000001C2DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\r8gcHFIf3x.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: r8gcHFIf3x.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.r8gcHFIf3x.exe.f20000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.4127638829.0000000013251000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.1662726920.0000000000F22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: r8gcHFIf3x.exe PID: 6200, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPED

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: r8gcHFIf3x.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.r8gcHFIf3x.exe.f20000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.4127638829.0000000013251000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.1662726920.0000000000F22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: r8gcHFIf3x.exe PID: 6200, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
              Windows Management Instrumentation
              21
              Registry Run Keys / Startup Folder
              2
              Process Injection
              11
              Masquerading
              OS Credential Dumping221
              Security Software Discovery
              Remote Services11
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              21
              Registry Run Keys / Startup Folder
              1
              Disable or Modify Tools
              LSASS Memory1
              Process Discovery
              Remote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              131
              Virtualization/Sandbox Evasion
              Security Account Manager131
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture11
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets1
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
              Software Packing
              Cached Domain Credentials13
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              DLL Side-Loading
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              r8gcHFIf3x.exe82%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
              r8gcHFIf3x.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\svchost.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\svchost.exe82%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              23.ip.gl.ply.gg
              147.185.221.23
              truetrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                23.ip.gl.ply.ggtrue
                  unknown
                  127.0.0.1true
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namer8gcHFIf3x.exe, 00000000.00000002.4126190732.0000000003241000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    147.185.221.23
                    23.ip.gl.ply.ggUnited States
                    12087SALSGIVERUStrue
                    IP
                    127.0.0.1
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1546359
                    Start date and time:2024-10-31 20:08:03 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 58s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:7
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:r8gcHFIf3x.exe
                    renamed because original name is a hash value
                    Original Sample Name:0515dceafb2ac3a01d779111aabc07e0876b573b67df42af4e183243e7c506ff.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@3/3@2/2
                    EGA Information:Failed
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 61
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target r8gcHFIf3x.exe, PID 6200 because it is empty
                    • Execution Graph export aborted for target svchost.exe, PID 5040 because it is empty
                    • Execution Graph export aborted for target svchost.exe, PID 5956 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: r8gcHFIf3x.exe
                    TimeTypeDescription
                    15:08:58API Interceptor13949382x Sleep call for process: r8gcHFIf3x.exe modified
                    19:09:00AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run svchost C:\Users\user\AppData\Roaming\svchost.exe
                    19:09:08AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run svchost C:\Users\user\AppData\Roaming\svchost.exe
                    19:09:16AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    147.185.221.230eVxwphG1t.exeGet hashmaliciousXWormBrowse
                      9RgE5uOJwX.exeGet hashmaliciousXWormBrowse
                        rustdesk.exeGet hashmaliciousXWormBrowse
                          q0SpP6HxtE.exeGet hashmaliciousXWormBrowse
                            mkDhqaw9dx.exeGet hashmaliciousXWormBrowse
                              R7iHtCsOYz.exeGet hashmaliciousXWormBrowse
                                Zvas34nq1T.exeGet hashmaliciousXWormBrowse
                                  fMdcaIZWzT.exeGet hashmaliciousXWormBrowse
                                    vtuLkV5KEW.exeGet hashmaliciousXWormBrowse
                                      IGznKtHyTp.exeGet hashmaliciousXWormBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        23.ip.gl.ply.ggq0SpP6HxtE.exeGet hashmaliciousXWormBrowse
                                        • 147.185.221.23
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        SALSGIVERUS0eVxwphG1t.exeGet hashmaliciousXWormBrowse
                                        • 147.185.221.23
                                        9RgE5uOJwX.exeGet hashmaliciousXWormBrowse
                                        • 147.185.221.23
                                        la.bot.arm.elfGet hashmaliciousUnknownBrowse
                                        • 147.176.169.71
                                        rustdesk.exeGet hashmaliciousXWormBrowse
                                        • 147.185.221.23
                                        Nurcraft.exeGet hashmaliciousXWormBrowse
                                        • 147.185.221.21
                                        q0SpP6HxtE.exeGet hashmaliciousXWormBrowse
                                        • 147.185.221.23
                                        7bZWBYVNPU.exeGet hashmaliciousXWormBrowse
                                        • 147.185.221.22
                                        mkDhqaw9dx.exeGet hashmaliciousXWormBrowse
                                        • 147.185.221.23
                                        R7iHtCsOYz.exeGet hashmaliciousXWormBrowse
                                        • 147.185.221.23
                                        Zvas34nq1T.exeGet hashmaliciousXWormBrowse
                                        • 147.185.221.23
                                        No context
                                        No context
                                        Process:C:\Users\user\AppData\Roaming\svchost.exe
                                        File Type:CSV text
                                        Category:dropped
                                        Size (bytes):654
                                        Entropy (8bit):5.380476433908377
                                        Encrypted:false
                                        SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
                                        MD5:30E4BDFC34907D0E4D11152CAEBE27FA
                                        SHA1:825402D6B151041BA01C5117387228EC9B7168BF
                                        SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
                                        SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
                                        Process:C:\Users\user\Desktop\r8gcHFIf3x.exe
                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Oct 31 18:08:58 2024, mtime=Thu Oct 31 18:08:58 2024, atime=Thu Oct 31 18:08:58 2024, length=334336, window=hide
                                        Category:dropped
                                        Size (bytes):764
                                        Entropy (8bit):5.04266228406803
                                        Encrypted:false
                                        SSDEEP:12:8Btyt0124WIhWCJgdY//DIIJLyt5kBWjAsMrHknkvIBmV:8BtytmBgcg+UeI3AsMIn3Bm
                                        MD5:FAB1611280C86CABC2FCE8C967C98C0C
                                        SHA1:742A2AA13A65B5847D836058F03506AC2661DD42
                                        SHA-256:9895796AB9CBA905759D1C5B40A891E54C23512ABF25C85CFF6144D09B338E65
                                        SHA-512:22119BF3F3A5B5D95D53F479DDEFE79E7F079D4DE541891EA00D4B2DCC9D20323370514A0F99B170F17B10FA610E81EB41CEC40818F81B7A642232586D5548F0
                                        Malicious:false
                                        Reputation:low
                                        Preview:L..................F.... .....dV.+....dV.+....dV.+..........................v.:..DG..Yr?.D..U..k0.&...&......vk.v....o:,P.+..|.|V.+......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^_Y.............................%..A.p.p.D.a.t.a...B.V.1....._Y....Roaming.@......CW.^_Y.............................~4.R.o.a.m.i.n.g.....b.2....._Y . .svchost.exe.H......_Y ._Y .............................*.s.v.c.h.o.s.t...e.x.e.......Y...............-.......X............wS.....C:\Users\user\AppData\Roaming\svchost.exe........\.....\.....\.....\.....\.s.v.c.h.o.s.t...e.x.e.`.......X.......965543...........hT..CrF.f4... ..T..b...,.......hT..CrF.f4... ..T..b...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                        Process:C:\Users\user\Desktop\r8gcHFIf3x.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):334336
                                        Entropy (8bit):5.468570783071018
                                        Encrypted:false
                                        SSDEEP:3072:iL30wxqS8+kb5g8InQO6J2l4mJe7UmuLchHPHo4bqRH33qGCNxxO7:40Klmbc/l4miUdLchvo4OlnqR
                                        MD5:71E459322FC143C6F54FA4075BBEA27F
                                        SHA1:91926031AE3212E02AC61236D89FC5E7CDB82655
                                        SHA-256:0515DCEAFB2AC3A01D779111AABC07E0876B573B67DF42AF4E183243E7C506FF
                                        SHA-512:D9CC7475086BA0E9818A49A2CD45D93D6E310A1C22D0C274A409B4124DE982B5722AE5627AAB49C8B47FF81D5B352E456CA8E7CE18A3E07D225F491E74963B9D
                                        Malicious:true
                                        Yara Hits:
                                        • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: Joe Security
                                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: ditekSHen
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 82%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....."g.....................(......^.... ... ....@.. ....................................@.....................................S.... ...%...................`....................................................... ............... ..H............text...d.... ...................... ..`.rsrc....%... ...&..................@..@.reloc.......`......................@..B................@.......H........U..@.......&.....................................................(....*.r...p*. 3D..*..(....*.rG..p*. .*..*.s.........s.........s.........s.........*.r...p*. E/..*.r...p*. .x!.*.r...p*. @*g.*.r_..p*. ~.H.*.r...p*. 0fk.*..((...*.r...p*. .K..*.r...p*. ....*&(....&+.*.+5sK... .... .'..oL...(*...~....-.(A...(3...~....oM...&.-.*.r9..p*. .~Z.*.r...p*. .Y..*.r...p*. .=l.*.r...p*. >k..*..............j..................sN..............*"(C...+.*:.t....(>...+.*.rW..p*. ..e.*.r
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):5.468570783071018
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        • DOS Executable Generic (2002/1) 0.01%
                                        File name:r8gcHFIf3x.exe
                                        File size:334'336 bytes
                                        MD5:71e459322fc143c6f54fa4075bbea27f
                                        SHA1:91926031ae3212e02ac61236d89fc5e7cdb82655
                                        SHA256:0515dceafb2ac3a01d779111aabc07e0876b573b67df42af4e183243e7c506ff
                                        SHA512:d9cc7475086ba0e9818a49a2cd45d93d6e310a1c22d0c274a409b4124de982b5722ae5627aab49c8b47ff81d5b352e456ca8e7ce18a3e07d225f491e74963b9d
                                        SSDEEP:3072:iL30wxqS8+kb5g8InQO6J2l4mJe7UmuLchHPHo4bqRH33qGCNxxO7:40Klmbc/l4miUdLchvo4OlnqR
                                        TLSH:86640A259FC6CA9FF12ED47F55FACD65A29FC058070F11C2EE7EC0EAA3AC9685506042
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....."g.....................(......^.... ... ....@.. ....................................@................................
                                        Icon Hash:cd993679681c94b4
                                        Entrypoint:0x410e5e
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x6722ADAB [Wed Oct 30 22:05:31 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x10e080x53.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x4259a.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x560000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000xee640xf00084fc00b3a720d04b915d2bd2bee255d2False0.6155598958333334data6.086380143863344IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rsrc0x120000x4259a0x4260075b7728e8d1f4b6a302d31ef030e5689False0.2890514653954802data4.891853939530098IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x560000xc0x200873b96edd7bdd1f264f95bd5bca6abbdFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_ICON0x121300x42028Device independent bitmap graphic, 256 x 512 x 32, image size 262144, resolution 39 x 39 px/m0.28785838979791106
                                        RT_GROUP_ICON0x541580x14data0.9
                                        RT_VERSION0x5416c0x244data0.46551724137931033
                                        RT_MANIFEST0x543b00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2024-10-31T20:09:14.606055+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.449735TCP
                                        2024-10-31T20:09:53.611751+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.449746TCP
                                        2024-10-31T20:10:16.058842+01002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.449845147.185.221.2340630TCP
                                        2024-10-31T20:11:41.609504+01002853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.450029147.185.221.2340630TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 31, 2024 20:09:20.812035084 CET4974240630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:09:20.817267895 CET4063049742147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:09:20.817344904 CET4974240630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:09:20.974544048 CET4974240630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:09:20.979463100 CET4063049742147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:09:29.299638987 CET4063049742147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:09:29.299823046 CET4974240630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:09:31.373955011 CET4974240630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:09:31.376508951 CET4974340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:09:31.378916025 CET4063049742147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:09:31.381324053 CET4063049743147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:09:31.381422997 CET4974340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:09:31.397110939 CET4974340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:09:31.402127028 CET4063049743147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:09:39.865417957 CET4063049743147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:09:39.865500927 CET4974340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:09:39.999049902 CET4974340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:09:40.003938913 CET4063049743147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:09:46.656912088 CET4974540630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:09:46.661839962 CET4063049745147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:09:46.662941933 CET4974540630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:09:46.704507113 CET4974540630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:09:46.710458994 CET4063049745147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:09:55.152455091 CET4063049745147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:09:55.152529001 CET4974540630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:09:55.155241966 CET4974540630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:09:55.156505108 CET4975340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:09:55.160034895 CET4063049745147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:09:55.161392927 CET4063049753147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:09:55.161461115 CET4975340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:09:55.178412914 CET4975340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:09:55.183239937 CET4063049753147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:03.651067972 CET4063049753147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:03.651129961 CET4975340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:03.655235052 CET4975340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:03.656228065 CET4980440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:03.662288904 CET4063049753147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:03.663878918 CET4063049804147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:03.663947105 CET4980440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:03.678818941 CET4980440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:03.685720921 CET4063049804147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:12.140625000 CET4063049804147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:12.140698910 CET4980440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:12.202150106 CET4980440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:12.204421043 CET4984540630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:12.207037926 CET4063049804147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:12.209384918 CET4063049845147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:12.209496021 CET4984540630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:12.316029072 CET4984540630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:12.321363926 CET4063049845147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:16.058841944 CET4984540630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:16.063662052 CET4063049845147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:17.186764956 CET4984540630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:17.191740990 CET4063049845147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:20.692296028 CET4063049845147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:20.692353964 CET4984540630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:21.545836926 CET4984540630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:21.551963091 CET4063049845147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:23.584721088 CET4990840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:23.590106964 CET4063049908147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:23.590181112 CET4990840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:23.628124952 CET4990840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:23.632960081 CET4063049908147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:29.092986107 CET4990840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:29.097940922 CET4063049908147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:32.065408945 CET4063049908147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:32.069139957 CET4990840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:34.108474016 CET4990840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:34.113779068 CET4996840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:34.113811970 CET4063049908147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:34.119276047 CET4063049968147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:34.119436026 CET4996840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:34.223140955 CET4996840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:34.228159904 CET4063049968147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:35.001401901 CET4996840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:35.006323099 CET4063049968147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:38.421153069 CET4996840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:38.426414967 CET4063049968147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:38.703212023 CET4996840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:38.708120108 CET4063049968147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:42.602905989 CET4063049968147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:42.603048086 CET4996840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:44.608452082 CET4996840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:44.613554955 CET4063049968147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:48.847229004 CET5002040630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:48.852303028 CET4063050020147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:48.852364063 CET5002040630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:48.906423092 CET5002040630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:48.911463976 CET4063050020147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:48.936861992 CET5002040630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:48.941827059 CET4063050020147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:48.999392033 CET5002040630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:49.004215002 CET4063050020147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:49.014899015 CET5002040630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:49.019809008 CET4063050020147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:49.030563116 CET5002040630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:49.035480022 CET4063050020147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:49.046039104 CET5002040630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:49.050849915 CET4063050020147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:49.093240023 CET5002040630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:49.098217010 CET4063050020147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:57.342272043 CET4063050020147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:10:57.342345953 CET5002040630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:59.108513117 CET5002040630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:10:59.113604069 CET4063050020147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:03.250950098 CET5002340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:03.256208897 CET4063050023147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:03.256284952 CET5002340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:03.324877977 CET5002340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:03.329720020 CET4063050023147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:08.421389103 CET5002340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:08.426434994 CET4063050023147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:11.733711004 CET4063050023147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:11.733815908 CET5002340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:13.467952013 CET5002340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:13.469727039 CET5002440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:13.473187923 CET4063050023147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:13.474730015 CET4063050024147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:13.474813938 CET5002440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:13.511740923 CET5002440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:13.516737938 CET4063050024147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:13.546802998 CET5002440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:13.551907063 CET4063050024147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:13.608668089 CET5002440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:13.613584042 CET4063050024147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:13.624403000 CET5002440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:13.629245996 CET4063050024147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:18.749284983 CET5002440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:18.754285097 CET4063050024147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:18.796207905 CET5002440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:18.801054955 CET4063050024147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:18.921215057 CET5002440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:18.926080942 CET4063050024147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:18.952614069 CET5002440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:18.957479954 CET4063050024147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:18.983603001 CET5002440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:18.988497972 CET4063050024147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:18.999458075 CET5002440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:19.004353046 CET4063050024147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:19.014823914 CET5002440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:19.019660950 CET4063050024147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:20.733860016 CET5002440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:20.738795996 CET4063050024147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:21.546276093 CET5002440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:21.551712036 CET4063050024147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:21.949496031 CET4063050024147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:21.949677944 CET5002440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:24.062042952 CET5002440630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:24.067030907 CET4063050024147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:30.689152956 CET5002840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:30.694529057 CET4063050028147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:30.697568893 CET5002840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:30.806272984 CET5002840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:30.811815023 CET4063050028147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:30.827538013 CET5002840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:30.834248066 CET4063050028147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:30.874742985 CET5002840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:30.880449057 CET4063050028147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:30.952497959 CET5002840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:30.957390070 CET4063050028147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:39.206111908 CET4063050028147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:39.206171036 CET5002840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:41.514952898 CET5002840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:41.518935919 CET5002940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:41.519795895 CET4063050028147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:41.523755074 CET4063050029147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:41.523849010 CET5002940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:41.586394072 CET5002940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:41.591276884 CET4063050029147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:41.609503984 CET5002940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:41.614438057 CET4063050029147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:41.671348095 CET5002940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:41.676316977 CET4063050029147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:41.781066895 CET5002940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:41.786106110 CET4063050029147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:43.702733040 CET5002940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:43.708072901 CET4063050029147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:46.999607086 CET5002940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:47.004662991 CET4063050029147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:47.093086958 CET5002940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:47.098169088 CET4063050029147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:50.049725056 CET4063050029147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:50.049829960 CET5002940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:52.127079010 CET5002940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:52.132544041 CET4063050029147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:54.223133087 CET5003140630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:54.228771925 CET4063050031147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:54.228889942 CET5003140630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:54.297141075 CET5003140630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:54.302455902 CET4063050031147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:11:59.530647039 CET5003140630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:11:59.535973072 CET4063050031147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:02.719400883 CET4063050031147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:02.723174095 CET5003140630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:04.577461958 CET5003140630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:04.581967115 CET5003240630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:04.582273006 CET4063050031147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:04.586909056 CET4063050032147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:04.586987972 CET5003240630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:04.682516098 CET5003240630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:04.983494043 CET5003240630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:05.592871904 CET5003240630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:05.995927095 CET4063050032147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:05.995949030 CET4063050032147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:05.996006012 CET4063050032147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:10.499439001 CET5003240630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:10.504565954 CET4063050032147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:10.952708960 CET5003240630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:10.957616091 CET4063050032147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:13.062706947 CET4063050032147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:13.062783957 CET5003240630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:14.796205044 CET5003240630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:14.801120996 CET5003340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:14.801405907 CET4063050032147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:14.805974007 CET4063050033147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:14.806057930 CET5003340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:14.919014931 CET5003340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:14.923933983 CET4063050033147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:14.984932899 CET5003340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:14.989871025 CET4063050033147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:16.469250917 CET5003340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:16.845118999 CET5003340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:17.084062099 CET4063050033147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:17.084074020 CET4063050033147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:18.812007904 CET5003340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:18.817104101 CET4063050033147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:20.641144991 CET5003340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:20.646327972 CET4063050033147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:23.289144993 CET4063050033147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:23.289202929 CET5003340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:25.780546904 CET5003340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:25.785481930 CET4063050033147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:29.939136028 CET5003640630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:29.944129944 CET4063050036147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:29.947223902 CET5003640630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:29.999150038 CET5003640630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:30.004066944 CET4063050036147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:35.046519995 CET5003640630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:35.051655054 CET4063050036147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:35.108997107 CET5003640630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:35.114003897 CET4063050036147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:35.140369892 CET5003640630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:35.145277023 CET4063050036147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:35.159334898 CET5003640630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:35.164185047 CET4063050036147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:38.450251102 CET4063050036147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:38.451270103 CET5003640630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:40.159140110 CET5003640630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:40.164375067 CET4063050036147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:42.207169056 CET5003840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:42.212512016 CET4063050038147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:42.212654114 CET5003840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:42.367141962 CET5003840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:42.372060061 CET4063050038147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:47.062213898 CET5003840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:47.068912983 CET4063050038147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:47.905793905 CET5003840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:47.912379026 CET4063050038147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:50.708154917 CET4063050038147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:50.715157986 CET5003840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:52.936867952 CET5003840630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:52.940125942 CET5003940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:52.941787004 CET4063050038147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:52.945252895 CET4063050039147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:52.945321083 CET5003940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:52.987675905 CET5003940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:52.992913008 CET4063050039147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:54.531158924 CET5003940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:54.536081076 CET4063050039147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:56.143147945 CET5003940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:56.148241997 CET4063050039147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:57.374414921 CET5003940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:57.379839897 CET4063050039147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:12:58.343554974 CET5003940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:12:58.349087954 CET4063050039147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:13:00.640079975 CET5003940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:13:00.645370007 CET4063050039147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:13:01.296684027 CET5003940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:13:01.302638054 CET4063050039147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:13:01.454267979 CET4063050039147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:13:01.454333067 CET5003940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:13:06.298197985 CET5003940630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:13:06.303105116 CET4063050039147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:13:34.062963009 CET5004340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:13:34.067956924 CET4063050043147.185.221.23192.168.2.4
                                        Oct 31, 2024 20:13:34.068048000 CET5004340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:13:34.096518040 CET5004340630192.168.2.4147.185.221.23
                                        Oct 31, 2024 20:13:34.101350069 CET4063050043147.185.221.23192.168.2.4
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 31, 2024 20:09:20.801162004 CET4934853192.168.2.41.1.1.1
                                        Oct 31, 2024 20:09:20.808552980 CET53493481.1.1.1192.168.2.4
                                        Oct 31, 2024 20:11:54.189013004 CET5182453192.168.2.41.1.1.1
                                        Oct 31, 2024 20:11:54.222099066 CET53518241.1.1.1192.168.2.4
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Oct 31, 2024 20:09:20.801162004 CET192.168.2.41.1.1.10x9739Standard query (0)23.ip.gl.ply.ggA (IP address)IN (0x0001)false
                                        Oct 31, 2024 20:11:54.189013004 CET192.168.2.41.1.1.10x6be1Standard query (0)23.ip.gl.ply.ggA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Oct 31, 2024 20:09:20.808552980 CET1.1.1.1192.168.2.40x9739No error (0)23.ip.gl.ply.gg147.185.221.23A (IP address)IN (0x0001)false
                                        Oct 31, 2024 20:11:54.222099066 CET1.1.1.1192.168.2.40x6be1No error (0)23.ip.gl.ply.gg147.185.221.23A (IP address)IN (0x0001)false

                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:15:08:53
                                        Start date:31/10/2024
                                        Path:C:\Users\user\Desktop\r8gcHFIf3x.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\Desktop\r8gcHFIf3x.exe"
                                        Imagebase:0xf20000
                                        File size:334'336 bytes
                                        MD5 hash:71E459322FC143C6F54FA4075BBEA27F
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.4127638829.0000000013251000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.4127638829.0000000013251000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                        • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.1662726920.0000000000F22000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.1662726920.0000000000F22000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                        Reputation:low
                                        Has exited:false

                                        Target ID:1
                                        Start time:15:09:08
                                        Start date:31/10/2024
                                        Path:C:\Users\user\AppData\Roaming\svchost.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\AppData\Roaming\svchost.exe"
                                        Imagebase:0x560000
                                        File size:334'336 bytes
                                        MD5 hash:71E459322FC143C6F54FA4075BBEA27F
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: Joe Security
                                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: ditekSHen
                                        Antivirus matches:
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 82%, ReversingLabs
                                        Reputation:low
                                        Has exited:true

                                        Target ID:3
                                        Start time:15:09:16
                                        Start date:31/10/2024
                                        Path:C:\Users\user\AppData\Roaming\svchost.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\AppData\Roaming\svchost.exe"
                                        Imagebase:0x730000
                                        File size:334'336 bytes
                                        MD5 hash:71E459322FC143C6F54FA4075BBEA27F
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Reset < >
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: SAN_^
                                          • API String ID: 0-3629432999
                                          • Opcode ID: 2d67dbdea5ec8e1b89c251288e4db3da0bd1b4b945d1a278b04a8fc0cc29f506
                                          • Instruction ID: 4ed49debd3419cce0dc0c8d9f86092f22e7d387207af47754978bc0a668e7e93
                                          • Opcode Fuzzy Hash: 2d67dbdea5ec8e1b89c251288e4db3da0bd1b4b945d1a278b04a8fc0cc29f506
                                          • Instruction Fuzzy Hash: AB12E721B2DA494FEB98FB7C88696B977D2FF9C304F404579E05EC32D6DE28A8418741
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8647e503fe157b55f64b012e6ad3b03109ef1d08b515b42fa01f9ce99beb5955
                                          • Instruction ID: 152a27de860611d3fa93ede96559ee8521a1a2e57f040c7999e382540c41daf4
                                          • Opcode Fuzzy Hash: 8647e503fe157b55f64b012e6ad3b03109ef1d08b515b42fa01f9ce99beb5955
                                          • Instruction Fuzzy Hash: 42F1B430A0DA8D8FEFA8DF68D8557E93BD1FF58310F04426AE84DC7295DB3499418B82
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 07f7c29f0ea5c466abe0f8c896c3fd9529862f39c095baac09ceedb82798511d
                                          • Instruction ID: 32cc4f4ac5643dc2c8a5f0f30ede8026b8f0e703874db577c1eb7bd463532161
                                          • Opcode Fuzzy Hash: 07f7c29f0ea5c466abe0f8c896c3fd9529862f39c095baac09ceedb82798511d
                                          • Instruction Fuzzy Hash: DBF1C330A0DA4E4FEFA8DF68C8657E93BD1FF58350F04426ED84DC72A5DA74A9418B81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: d
                                          • API String ID: 0-2564639436
                                          • Opcode ID: 5ec23a1e2ea6f5ff1282ee18c3813ba520bf0695ff472a3ab22d9296500d586f
                                          • Instruction ID: ab7d6e2316c3872f7cde75a87af392c1418cd40a24833fbadaa28beefcdb83c4
                                          • Opcode Fuzzy Hash: 5ec23a1e2ea6f5ff1282ee18c3813ba520bf0695ff472a3ab22d9296500d586f
                                          • Instruction Fuzzy Hash: 3A213431D0D29A4FEF149BA488146F9BFF0EF49350F0602BAD489D31A2CA2C5A468792
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: SAN_^
                                          • API String ID: 0-3629432999
                                          • Opcode ID: 1fea9acfefb992e21d7af939e7a552cb5eba368ef9c1e6ca747f11e957551481
                                          • Instruction ID: e840eb0c020fce7150742661ed98371e81d6e5ecbca5ae2d20c7b00bffb11e66
                                          • Opcode Fuzzy Hash: 1fea9acfefb992e21d7af939e7a552cb5eba368ef9c1e6ca747f11e957551481
                                          • Instruction Fuzzy Hash: 3C113D21F0E69F4BEB3EABF848315686F61AF56650F4542B9C048CB1D7DE1CA5128352
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: SAN_^
                                          • API String ID: 0-3629432999
                                          • Opcode ID: 80d6d1515b9d61b27db0f6922f7502306ee2570e777093e30f7a43b5aff324af
                                          • Instruction ID: e775468ccfd5f53b42c1237ddbf41381efc31887b60bce17da3bf7d6691f6291
                                          • Opcode Fuzzy Hash: 80d6d1515b9d61b27db0f6922f7502306ee2570e777093e30f7a43b5aff324af
                                          • Instruction Fuzzy Hash: ACF0F430E0D50B8BE738DFE8C4626B9BBA1BF9D320F814678D409871E6DF2876528241
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 672ffad7c6c0f97f81331c518d509a2988c3fb6222fe56564473af2b25e01eec
                                          • Instruction ID: ef59211f27cd58d50c12922af172705a2f6203014466c3a0e4288bcad0c9b259
                                          • Opcode Fuzzy Hash: 672ffad7c6c0f97f81331c518d509a2988c3fb6222fe56564473af2b25e01eec
                                          • Instruction Fuzzy Hash: 72D10730F1E94E4FEB59EB6888696B87BE1FF49314F0145B5E01DC32E6DE2CA9428741
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4b34903e37e30cbcbf5967b0895dbc606f6644c47751e3f26faf999b9a3f8084
                                          • Instruction ID: 8af489365cf2d39307ee6a5786da8d1d37970d4e33017a2036289893f6cb4bdb
                                          • Opcode Fuzzy Hash: 4b34903e37e30cbcbf5967b0895dbc606f6644c47751e3f26faf999b9a3f8084
                                          • Instruction Fuzzy Hash: A7C18E22B0DA8D0FEB6DAB6C58746B87FD1EF89344F1501BAD09EC71D7DD2858068341
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4addfa617861875b4ff226f785b036ab41f5b9e41b6a9688ea524f0ea69cf294
                                          • Instruction ID: ea30af90f35c3b290653c86aa8689cc0e9ecf9da2f2a2d9ebda10871c5f428b3
                                          • Opcode Fuzzy Hash: 4addfa617861875b4ff226f785b036ab41f5b9e41b6a9688ea524f0ea69cf294
                                          • Instruction Fuzzy Hash: 74C1D43060DA4D4FEF68DF28D8557F93BE1EF59310F10426AE84DC72A6CB34A9458B82
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d3eddb183e97ace38fa0e07af7711e28e4335aa2865433e2ec88b3535a60230c
                                          • Instruction ID: cc38a62357b148a4d9add0984511cea3c6ee996964523f06ee242ff9faa6a9e2
                                          • Opcode Fuzzy Hash: d3eddb183e97ace38fa0e07af7711e28e4335aa2865433e2ec88b3535a60230c
                                          • Instruction Fuzzy Hash: 1AA12521B1990E4FEBACEB6C44756BD7AD2EF9C350F5401B9E05EC32DADE2868428341
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bc18f3dead1a15d022182e7ec86018dab891dac4b93fd54d9ea9dec4ca0034b7
                                          • Instruction ID: 1ebf294068aa47e26f555ba26784d5886cd1e003d90fc900a3a576d55c14fc63
                                          • Opcode Fuzzy Hash: bc18f3dead1a15d022182e7ec86018dab891dac4b93fd54d9ea9dec4ca0034b7
                                          • Instruction Fuzzy Hash: 1B815860718D09CBEB4CB7AC9869BB9B2D2FF98704F604176E01DC36DADD2CAD424752
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b1af5bca34162e2102700d57031d8806086316f58d3f5616b0a7ec40031ec039
                                          • Instruction ID: c2adb6dfb2d607ffd3b7e46ce6bd8959fb6fcf32b6574310d805ad41e7abe166
                                          • Opcode Fuzzy Hash: b1af5bca34162e2102700d57031d8806086316f58d3f5616b0a7ec40031ec039
                                          • Instruction Fuzzy Hash: 2E614A31A0D64D8FDB19EBA8C825AB97FF0EF56321F1441BED049C71E2DB286806C751
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dda9eb8a65b583f91ff876251011c81590f6f0305d01db9e0e1360134bce256d
                                          • Instruction ID: 04d42c90106dd9fd59e4038f23558c469b54ae72a4575a26b7781ce15f766b82
                                          • Opcode Fuzzy Hash: dda9eb8a65b583f91ff876251011c81590f6f0305d01db9e0e1360134bce256d
                                          • Instruction Fuzzy Hash: 3651B630A18A0D8FDB58DF68D855BEDBBF1FF58310F1042AAD44DD3296DA34A942CB81
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6232982df2dbf7081b463c90f93ccc0d0e309a17fc1453639d94d6ed2b8dbba8
                                          • Instruction ID: 7b07bdf52e7c110c7db9690b184f392751b39906d385a2abb454347d0b8727eb
                                          • Opcode Fuzzy Hash: 6232982df2dbf7081b463c90f93ccc0d0e309a17fc1453639d94d6ed2b8dbba8
                                          • Instruction Fuzzy Hash: 4D61B230B1A95E8FEFA4FBA8C4695AC7BE1FF89304F414479E01DC32E6DE2869418741
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d8c3f4ecfddbd54e1ed401c0327bb5dd030c3e22d604a3c4e536c147bdb9d6e9
                                          • Instruction ID: da3ece97993b8b18012c2ddcd563568f434d9c7e3bb2ef47c80d50fdd235a381
                                          • Opcode Fuzzy Hash: d8c3f4ecfddbd54e1ed401c0327bb5dd030c3e22d604a3c4e536c147bdb9d6e9
                                          • Instruction Fuzzy Hash: 76519330908A1C8FDF68DB58D855BE9BBF1FF59310F1482AAD00DD3292DE34A9858B81
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 64f38dc77b152008e61a21cb6b1342588b9141a178df9eaab3f466f25af408b5
                                          • Instruction ID: f9c3cc0eba00706d72f9618b0e5377e3cdae105004374fc1cf1bc8caf909b618
                                          • Opcode Fuzzy Hash: 64f38dc77b152008e61a21cb6b1342588b9141a178df9eaab3f466f25af408b5
                                          • Instruction Fuzzy Hash: A3513B30E0D68A4FEB5A9BB448316A57FE0EF5A314F1902F9D099D71E7CE2CA842C751
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b02b9219c4f8910f965233fdcfc407c7dd823025090e3344446684eec9f8d093
                                          • Instruction ID: e5264ff4957c012823f2240a94560c227dbee2cd8447ab5840a81ac1ad5cf640
                                          • Opcode Fuzzy Hash: b02b9219c4f8910f965233fdcfc407c7dd823025090e3344446684eec9f8d093
                                          • Instruction Fuzzy Hash: 39510F21B0E6C95FDB9AAB784874675AFD1DF8B219B0900FBE089C72E7DD185C06C342
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2cdc67bc0e851a98e85bbe77ccefca4817ff5e952bd96f9b920ca636fb7a8d26
                                          • Instruction ID: 4d3448b5374675d81a386288909c27cc33635ed30fece79cb22959575e63ef90
                                          • Opcode Fuzzy Hash: 2cdc67bc0e851a98e85bbe77ccefca4817ff5e952bd96f9b920ca636fb7a8d26
                                          • Instruction Fuzzy Hash: D051F731B1994C4FDB55FB789869AE97BE1EF49310F1640BAE00DC72E6CE28AD42C741
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3e9c5ce52960e8309ef49587355a96add9ad210dcec590224c87193301b72943
                                          • Instruction ID: 67068bb605b062ab6e4b07a9beee56f3d70a5ac5123fa980904250bb6d428858
                                          • Opcode Fuzzy Hash: 3e9c5ce52960e8309ef49587355a96add9ad210dcec590224c87193301b72943
                                          • Instruction Fuzzy Hash: 5351D530B1E94E4FEF55EB68C8655A87BF1FF99304F4540BAD04DC32E6CE2869428741
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6f14dc04b80a862f843d53750ece42e6321ebdaa3e5e115c5c0e03600539fdb5
                                          • Instruction ID: 9a5fabd7b7bfc03de0b123c8df2577a8dc367a3476077358156e1298e71df3b4
                                          • Opcode Fuzzy Hash: 6f14dc04b80a862f843d53750ece42e6321ebdaa3e5e115c5c0e03600539fdb5
                                          • Instruction Fuzzy Hash: 88519134A09A1DCFDFA8EF58C469AA97BE0FF18311F11416ED04AC36A1CB75E841CB41
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 813c49e5c87b281feb9dea5e0fa6700a44288689f39f66dfc074159207558444
                                          • Instruction ID: 7c4cfc56003bb2f4a642672ad39ef35976f6ef8b5407a4f58ff067555f712dd9
                                          • Opcode Fuzzy Hash: 813c49e5c87b281feb9dea5e0fa6700a44288689f39f66dfc074159207558444
                                          • Instruction Fuzzy Hash: D1415B21F1DA4A0FE7A9B73C48265797BD1DF8A618B0900BBD05DC32EBDD1C6C428352
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cef16d8e11b13717f6a94e4a3ab2690d531a2db0e4bcaa3575dcbbcf5c86dd9b
                                          • Instruction ID: 24a1a6adee98a75b17baab9ac088c95459fa11a31d241dd5ce1c03b827be9b83
                                          • Opcode Fuzzy Hash: cef16d8e11b13717f6a94e4a3ab2690d531a2db0e4bcaa3575dcbbcf5c86dd9b
                                          • Instruction Fuzzy Hash: 95412921B1DA8A0FE7A9B77858295793BD2DF8A618B0940BBD44DC71EBDD1C6C438342
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ecb7d1590389ca616a86970eeb8d87b1a28a9070dc9b6fdcb828ef5171df3024
                                          • Instruction ID: d20b2faef388a28624428684427df3374140777419434acf25c7f6d8433148ef
                                          • Opcode Fuzzy Hash: ecb7d1590389ca616a86970eeb8d87b1a28a9070dc9b6fdcb828ef5171df3024
                                          • Instruction Fuzzy Hash: 6741A134609A1DCFDFA8EF98C469AA977E0FB18315F10417ED04AC3AA1CB75E842CB41
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f6b3296445ff707754be6a6f00e53441b995bdae613611a4b29708f975da1936
                                          • Instruction ID: f397581300fe32eb798b12ca4ad7cc081800686cee6bb55544130649a41d2e8e
                                          • Opcode Fuzzy Hash: f6b3296445ff707754be6a6f00e53441b995bdae613611a4b29708f975da1936
                                          • Instruction Fuzzy Hash: D7418331B1890C4FDB98FB68D8A9ABD77E2EF9C314F554479E00ED32A6DE24AC418741
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 19a3e930f9880a903f8f940e237281b58127e61545c48375e1775fdaab22c889
                                          • Instruction ID: 4097b7716ae041aff393b8b2c00ecbfc82c1adb4b82d76daa0fbfccb263be177
                                          • Opcode Fuzzy Hash: 19a3e930f9880a903f8f940e237281b58127e61545c48375e1775fdaab22c889
                                          • Instruction Fuzzy Hash: 82419431B0990E4FDF95EBA88469AED7BF2EF5D340B04417AD40DD32A2DF3899428740
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ac5d4d75f62c6747e88610144e07a95ceda8f952e323bd1b39a79cee09016d98
                                          • Instruction ID: bb00c7fa90e7e9c79aeaaf7eab993efdd98eb74ec83be2174cfb10946152d018
                                          • Opcode Fuzzy Hash: ac5d4d75f62c6747e88610144e07a95ceda8f952e323bd1b39a79cee09016d98
                                          • Instruction Fuzzy Hash: 1831F521B1C9494FEB9CFB2C986A678A6C2EF9D705F0501BEE04EC32D7DD689C418341
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0c3ea52581910723a7b7930cb3358d0f27e7d9c387e9293d06465155cf6ea40a
                                          • Instruction ID: 8c0cb04f1a81d214c817f14f525b3bb6214c29fb1b22d763dea7e1330109f063
                                          • Opcode Fuzzy Hash: 0c3ea52581910723a7b7930cb3358d0f27e7d9c387e9293d06465155cf6ea40a
                                          • Instruction Fuzzy Hash: E7416331F0990E8BDF98EBA88465ABD77E1EF58314F15017DD02ED32D6CE28A942C741
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fd9f6f2672f99ce0c09487451a83658f9b5a4c7f84000a8cae449f04b6b8950f
                                          • Instruction ID: eaccb047e3de345cf0dc4571be4409db84d9f3fdc8717d9354e30baf33356d18
                                          • Opcode Fuzzy Hash: fd9f6f2672f99ce0c09487451a83658f9b5a4c7f84000a8cae449f04b6b8950f
                                          • Instruction Fuzzy Hash: 8D31B351B28D094BEB98B7BC5C697BD66D6EF9C601F40017BF01DC32DAED1869024381
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a67065ed3cbdf83a7b5b131a4763beeb44bb282ec071f3cd6ec2127d5dcce47d
                                          • Instruction ID: e7fcdbf0c4f690ab445190741ef7e2fa3498b17ebc605249892e2b959ed0c0d8
                                          • Opcode Fuzzy Hash: a67065ed3cbdf83a7b5b131a4763beeb44bb282ec071f3cd6ec2127d5dcce47d
                                          • Instruction Fuzzy Hash: 28318330B18A4E8FEB49FBA89865AED7BE1FF98300F504579D059D32D6DE386842C741
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f6ff14343efb840551083360e7dde48ba016e24c4bebd7d56301fd112bc3a4bd
                                          • Instruction ID: 49018c9d8f98c63b6f5634f83e9852b9001fc082826de3ad3014d1589116ae3d
                                          • Opcode Fuzzy Hash: f6ff14343efb840551083360e7dde48ba016e24c4bebd7d56301fd112bc3a4bd
                                          • Instruction Fuzzy Hash: 75312B25A0F58E8FEB26ABF888745717FA0EF46329B5941BAD088C71E7DA1C5806C351
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4cc92a0392c67ebb81150725fe057d92897044da617dbb0788b42b7fb48ab22c
                                          • Instruction ID: 3b12d866132d72142cc8677d21b6855338b0b31d3cd667e9a6b09d6340390d72
                                          • Opcode Fuzzy Hash: 4cc92a0392c67ebb81150725fe057d92897044da617dbb0788b42b7fb48ab22c
                                          • Instruction Fuzzy Hash: 1F31E13150CB488FDB19DFA8D845AE9BBF0EF56320F0482AFD099C31A2D734A806CB51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 999c3673ac2f62754b68afcd248ab143ed6c06e517e41221be52cd022e8aafc2
                                          • Instruction ID: abed16d7f2958c385a3ae965d7d609c52b92c43f703b60e68211255dc64aa61f
                                          • Opcode Fuzzy Hash: 999c3673ac2f62754b68afcd248ab143ed6c06e517e41221be52cd022e8aafc2
                                          • Instruction Fuzzy Hash: 7331D432B19A4E5FEB58EB98C8B11EDBFB2FF98250F410176D05AD71E6DD2428428741
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 99794ba97f7501ace8acf0621078443dbcb74502c82dad9ed9003719618e562c
                                          • Instruction ID: a12a43551236681d0c77fd2ab431be9baee069de7cd1b86751e0eb60ae05b700
                                          • Opcode Fuzzy Hash: 99794ba97f7501ace8acf0621078443dbcb74502c82dad9ed9003719618e562c
                                          • Instruction Fuzzy Hash: 95210631F1990D8BEF68EF6894A96BDBBE1EF48350F51057ED40EC32E6CE2469018741
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f4c2ed4b5d2ee1e4f507a627b1c1878daf14b865172ac947f14568e2f1068013
                                          • Instruction ID: ac2917c142eddcd595696345da8d5c62c03e671cb7b6abdecfa2e5f64f5776d4
                                          • Opcode Fuzzy Hash: f4c2ed4b5d2ee1e4f507a627b1c1878daf14b865172ac947f14568e2f1068013
                                          • Instruction Fuzzy Hash: ED215E35B4E6CE4FEB559BA448256EA3FE1EF89204F0540B6D48AC31D3DE1C9A468351
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4bd3854004372ec9da22571942e834f919a46f79369b20ad7eaffbab59a22a9c
                                          • Instruction ID: 7c4b664d695225897fe4f2c9c285086d40399f05da4c3e8fb066f1f6b45c4e95
                                          • Opcode Fuzzy Hash: 4bd3854004372ec9da22571942e834f919a46f79369b20ad7eaffbab59a22a9c
                                          • Instruction Fuzzy Hash: 6C21F610B1DA598BFB0AB7A858297F97AD1EF48700F5442BAE01CC32C7DD1869018392
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d689502217c4ad51dd7fd2850844e96c431ca4016f163453fd00dec659f93842
                                          • Instruction ID: a55f946abc5851b537dada30c83629ab0ca23822ce2321d8f27dec735e2ff133
                                          • Opcode Fuzzy Hash: d689502217c4ad51dd7fd2850844e96c431ca4016f163453fd00dec659f93842
                                          • Instruction Fuzzy Hash: 6E118610B1991D8BFB59B7ACA82ABF976C6EB48700F5145B5F01DC32CADD2869018392
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e613e54e3e4a1b9a3f77a6c583d5281681190c42411f7533782407d20ca2dc4f
                                          • Instruction ID: d280b2ddc67b03908752eb33a07bea9716aefe946eda6cb9ba6aba02bf0eecba
                                          • Opcode Fuzzy Hash: e613e54e3e4a1b9a3f77a6c583d5281681190c42411f7533782407d20ca2dc4f
                                          • Instruction Fuzzy Hash: 65116F21B0EA994FE755B32C68654717FE0DF9A661B0901FBE4C8C70E7E90459828342
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 86c16251c13cbd74d5dfb20f27e2c0575f6eecd7fc8cbd0ece07faec2463f95a
                                          • Instruction ID: 0ad757205224cf1af49d39d252311f0351b86c6321ca1c65c3fbc2844684612a
                                          • Opcode Fuzzy Hash: 86c16251c13cbd74d5dfb20f27e2c0575f6eecd7fc8cbd0ece07faec2463f95a
                                          • Instruction Fuzzy Hash: BC012631F1894E4FEB95F76C88166ADB7E1FB48354B0502B6D40DC32A6DE28294347D1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b0c1cc99fa4ef52ad73ce00f08bbabad3ab2488cafd294bfda6ca5ab6a93edb4
                                          • Instruction ID: 4557854d755562c6b4bc99472cae298acb6726c6f1b578c54e29f30f3974439b
                                          • Opcode Fuzzy Hash: b0c1cc99fa4ef52ad73ce00f08bbabad3ab2488cafd294bfda6ca5ab6a93edb4
                                          • Instruction Fuzzy Hash: 1311E571E0A65D0FDB41ABA888295ED7BB0FF55311F0102BBD418C71D7EE2899418382
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c3617504571924c0ac80a43c0f8cc772c72b96ba10c5cf0543bea372fd06e8b4
                                          • Instruction ID: 5b573b101e6dd63b8b67bfdccf79ec3ed0b42ef6ce09c2e565adb206b95ee2bd
                                          • Opcode Fuzzy Hash: c3617504571924c0ac80a43c0f8cc772c72b96ba10c5cf0543bea372fd06e8b4
                                          • Instruction Fuzzy Hash: 2C111B307299298FEB89FF2CC499AA973E1FB5830979041B6D50DC3295DF38A8918B45
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: deb488fdbedd4f368d615d855ecc6c107648ba7d0cefe77f1da898cb7084b6c5
                                          • Instruction ID: 5385db3fb7bdfe76381bdd7c36c38f54f5037eccf5ac550aaa03e8ef76f582fa
                                          • Opcode Fuzzy Hash: deb488fdbedd4f368d615d855ecc6c107648ba7d0cefe77f1da898cb7084b6c5
                                          • Instruction Fuzzy Hash: 0D112651E0E7C55FE766A7244C358687FB1AFA7654B4E00EBD0C8CB0E7D90CA9898352
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f1c2b73a027c81c383ddfb5fbb7deb30a56e1b6fab27bb62586c02a539b3c06a
                                          • Instruction ID: 9730e7dfcb70357dc59e935be26f2f0b7e06673e2781bf51991c1cb35fb809e4
                                          • Opcode Fuzzy Hash: f1c2b73a027c81c383ddfb5fbb7deb30a56e1b6fab27bb62586c02a539b3c06a
                                          • Instruction Fuzzy Hash: 18F0902294F7D90FEB175BB04C399A57FB0AF57100B0A46DBD488CB0A3CA19660AC392
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 271e5fd071f79cdee4fa5992c2a5af6b1340bd205fccdec16531cb226bb7f3f2
                                          • Instruction ID: ae5c7a273a28907ae2aa3f58bbc5b6eb029c3f498e05a28e67a2cd4bc40f1ce0
                                          • Opcode Fuzzy Hash: 271e5fd071f79cdee4fa5992c2a5af6b1340bd205fccdec16531cb226bb7f3f2
                                          • Instruction Fuzzy Hash: 3AF08131F1581E4EDB50ABA898595FE77F0FF58305F000277E519D2199DE34694147C2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 52a399342597595ab20871badd9e0bf9a60191200d2df0da411cc6e988d5b843
                                          • Instruction ID: 66f1393a2f4f56236afa1988fe5039918ecfc8c81fd0667005374a0519d24215
                                          • Opcode Fuzzy Hash: 52a399342597595ab20871badd9e0bf9a60191200d2df0da411cc6e988d5b843
                                          • Instruction Fuzzy Hash: 7501F711F1E64A4FFB686BB448755782A90EF58304F1200B9D049C76E7DE9C69428342
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4128930329.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd9b890000_r8gcHFIf3x.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dd6fd408ab43341644fdb692fb7e85d51b52eaf76ee4dfea6b99fd186d8820cd
                                          • Instruction ID: 5ede8b81b89a7dee4954a26ad54e9f2da1594fb2769f7bfba652daac6fc0a6c6
                                          • Opcode Fuzzy Hash: dd6fd408ab43341644fdb692fb7e85d51b52eaf76ee4dfea6b99fd186d8820cd
                                          • Instruction Fuzzy Hash: 1DB01201DA780E00DC2433F50856164B8405F4C100FC60470D809801D9984D13944182
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.1845818320.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_svchost.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 84819cff74b3cc9cbeb75a7559a39537b9ab8e0a6ba921880f1b641ce40311b9
                                          • Instruction ID: 7b5840c823ab42837cb7fa3ee6ce05b2de89c398a6e85757c42daec1bfb2c1ed
                                          • Opcode Fuzzy Hash: 84819cff74b3cc9cbeb75a7559a39537b9ab8e0a6ba921880f1b641ce40311b9
                                          • Instruction Fuzzy Hash: 3612B661B29A594FE798FB7C9869AB977D2FF9C300F40057DE01DC32D6DE28A8418781
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.1845818320.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_svchost.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 641823fa27e2c1d23072cce5d7ae032ece3e35fe412e53a7e1afdf863219a898
                                          • Instruction ID: 77478758118dbc596bf9c29ff8d69393d19ee4e72a5493545b95b0b80d9f445e
                                          • Opcode Fuzzy Hash: 641823fa27e2c1d23072cce5d7ae032ece3e35fe412e53a7e1afdf863219a898
                                          • Instruction Fuzzy Hash: F2412632F19A5A4FE748EBBCE8B54E97BB1EF45254F4401B7D049CB1E3ED2828468781
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.1845818320.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_svchost.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ee2d3702cb29b70fd0506005975376ab4c75d5fbfc5b6ac6d2bcfabf3dd0f765
                                          • Instruction ID: fc1f4c1b9427dc5834f0f35e4b83145e95962d14c7ef29a5cd2e9ec4d66ff613
                                          • Opcode Fuzzy Hash: ee2d3702cb29b70fd0506005975376ab4c75d5fbfc5b6ac6d2bcfabf3dd0f765
                                          • Instruction Fuzzy Hash: D5511F10B1E6C94FD79AAB785874675AFE1DF8B219B0900FAE089C71E7DD186806C382
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.1845818320.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_svchost.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7e8d5d1bfbf591bd73b869dc8205c4c06a323ef9d15c2cccfead668f08e0acfa
                                          • Instruction ID: ad14117527fd5888df6af28018f8206b6cb11bfe328db1c76faf4e3b72dda41d
                                          • Opcode Fuzzy Hash: 7e8d5d1bfbf591bd73b869dc8205c4c06a323ef9d15c2cccfead668f08e0acfa
                                          • Instruction Fuzzy Hash: D3510621B1E78A0FE3A6A77C48265797BE1DF8A614B0900FBD48DC71EBDD1C5C468392
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.1845818320.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_svchost.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 68d8a012e41792518ec6665d608befff433cb04fa5d569c609971e7e414210d1
                                          • Instruction ID: 83663f99ceaac57e7c4084eb4e9912e0b7799d7b293808f11f2049741a2ec85a
                                          • Opcode Fuzzy Hash: 68d8a012e41792518ec6665d608befff433cb04fa5d569c609971e7e414210d1
                                          • Instruction Fuzzy Hash: 29310821B189490FEB98FB2C986A678B7C2EF9C705F0505BEE04EC32E7DD24AC418341
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.1845818320.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_svchost.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 752796bc91c11e277f0a9c325ff602264de6be81ef997d8a240502575920387c
                                          • Instruction ID: 048fb1180f690cc1d7a70362efd1dc93b8e7d3332747aac5fbc389e5185b1533
                                          • Opcode Fuzzy Hash: 752796bc91c11e277f0a9c325ff602264de6be81ef997d8a240502575920387c
                                          • Instruction Fuzzy Hash: 3F31E551B28A594BE758BBBC5C297BD77D2EF99601F0501BBE00DC32E7DD1869018781
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.1845818320.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_svchost.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1cc099e87b48f2b654bb6b1e7487be70e6945282981cc30213a574c9b15640f4
                                          • Instruction ID: 2345194c819787f5a6b2c0d591a32e395db3a52410fc7bf97bf21cfa79a16413
                                          • Opcode Fuzzy Hash: 1cc099e87b48f2b654bb6b1e7487be70e6945282981cc30213a574c9b15640f4
                                          • Instruction Fuzzy Hash: 8A31A030B19A1E8FEB48EBB89865AFDB7A1FF98300F500479D019C32C6DE386941C781
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.1845818320.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_svchost.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8dcf9eb0282868d7060e1419fde6043d6f92e6e870433a532bb50f427ed67b9d
                                          • Instruction ID: b98b935a462c99425243962a381317fe07fe0397e1236f0b8bd12db951a14a83
                                          • Opcode Fuzzy Hash: 8dcf9eb0282868d7060e1419fde6043d6f92e6e870433a532bb50f427ed67b9d
                                          • Instruction Fuzzy Hash: 46116311B1E7A90FE755B77C68654717FE0DF4966170905FBD488CB0E3E904594187C1
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1922500854.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_7ffd9b8b0000_svchost.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cbd974f887150169526810a5f85abddd15a6b6ab218040135319e138c45d50e5
                                          • Instruction ID: 5714fc40e8387ca748e34ed30a3a2ce1882b02259170dd800c6c4e76d3e5fc91
                                          • Opcode Fuzzy Hash: cbd974f887150169526810a5f85abddd15a6b6ab218040135319e138c45d50e5
                                          • Instruction Fuzzy Hash: FE12E671B29A5D4FE798FB788865AB977D2FF9C340F400579E01EC32D6DE28A9018781
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1922500854.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_7ffd9b8b0000_svchost.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cfdb5b7e3f2f4be55bdbd367b84eca4a07673dfeae7bb7385b35609acb225b94
                                          • Instruction ID: e42c50f302b112fb911903ca34c059e948a71b6550d545171a7dbda3db002023
                                          • Opcode Fuzzy Hash: cfdb5b7e3f2f4be55bdbd367b84eca4a07673dfeae7bb7385b35609acb225b94
                                          • Instruction Fuzzy Hash: 60412532F1DA5A4FE748EBA8ECB54E97BB1EF45250F4401B3D059CB1E3ED2829468781
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1922500854.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_7ffd9b8b0000_svchost.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 11185232db29fa9dba31e46238fa29dbd503abe98392500091cc78dda6b38112
                                          • Instruction ID: e34c6855943c13ec01a8124a9a32bbe3d7cdda1826fb2a7af0c663130e589c19
                                          • Opcode Fuzzy Hash: 11185232db29fa9dba31e46238fa29dbd503abe98392500091cc78dda6b38112
                                          • Instruction Fuzzy Hash: B4511110B1E6C94FD79AAB785874675BFD1DF8B219B0900FAE089C71E7DD186806C382
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1922500854.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_7ffd9b8b0000_svchost.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f0af06c220f44b919aa55d100f741a20014cee28502b3231cead7f9eca2b7128
                                          • Instruction ID: 5409044c94297263f772c7d11207b3aca90963dab6c483ebc66dcbe245316454
                                          • Opcode Fuzzy Hash: f0af06c220f44b919aa55d100f741a20014cee28502b3231cead7f9eca2b7128
                                          • Instruction Fuzzy Hash: A6511921B1E68A0FE366A77C48365797BE1DF8A614B0900FBD48DC71EBDD1C5C468392
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1922500854.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_7ffd9b8b0000_svchost.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 58a7be38614026d054bcc805d46e3ba2fb91345954bfa62f071e3af58074dc11
                                          • Instruction ID: d880cad5eb08cbd26e6f56007a6c8905deb1c1799f24df179449822b7542ca4e
                                          • Opcode Fuzzy Hash: 58a7be38614026d054bcc805d46e3ba2fb91345954bfa62f071e3af58074dc11
                                          • Instruction Fuzzy Hash: D0310821B189490FEB98FB2C986A678B7C2EF9C705F0505BEE04EC32E7DD24AC418341
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1922500854.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_7ffd9b8b0000_svchost.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 752796bc91c11e277f0a9c325ff602264de6be81ef997d8a240502575920387c
                                          • Instruction ID: 048fb1180f690cc1d7a70362efd1dc93b8e7d3332747aac5fbc389e5185b1533
                                          • Opcode Fuzzy Hash: 752796bc91c11e277f0a9c325ff602264de6be81ef997d8a240502575920387c
                                          • Instruction Fuzzy Hash: 3F31E551B28A594BE758BBBC5C297BD77D2EF99601F0501BBE00DC32E7DD1869018781
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1922500854.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_7ffd9b8b0000_svchost.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 30e69fdedbb07736cdfd2ce5e51ecdecbb3e3d2cc0a2defb366f5f75ccab4af3
                                          • Instruction ID: 94ecedbc565baa3fa5e77446ba8ab88ed2d6136c4f789a74caafabed9400f980
                                          • Opcode Fuzzy Hash: 30e69fdedbb07736cdfd2ce5e51ecdecbb3e3d2cc0a2defb366f5f75ccab4af3
                                          • Instruction Fuzzy Hash: 2531A070B19A1E8FDB48EBB8D865AEDB7A1FF98300F900479D019C32C6DE386941C781
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1922500854.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_7ffd9b8b0000_svchost.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0f8edc13303798b4dc5ef37dfb0cce59a15c8eb2c1ef0480514a40007c013fca
                                          • Instruction ID: ff7c63885152d1f170075febbc1cff51d421a823af630c15931269e962a3d5ff
                                          • Opcode Fuzzy Hash: 0f8edc13303798b4dc5ef37dfb0cce59a15c8eb2c1ef0480514a40007c013fca
                                          • Instruction Fuzzy Hash: 2C116321B1E6A90FE755B77C68654717FE0DF4966170905FBD488C70E3E9045A8187C1