Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
svchost.exe

Overview

General Information

Sample name:svchost.exe
Analysis ID:1556741
MD5:fb9c21a9cc24889784f8f943dd558f70
SHA1:836f910db289475f0e1404bad3461c6bc1e3c3b7
SHA256:151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639
Tags:exeuser-aachum
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
.NET source code contains potential unpacker
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Drops large PE files
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: System File Execution Location Anomaly
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Creates or modifies windows services
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Modifies existing windows services
One or more processes crash
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Queries time zone information
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • svchost.exe (PID: 7088 cmdline: "C:\Users\user\Desktop\svchost.exe" MD5: FB9C21A9CC24889784F8F943DD558F70)
    • WmiPrvSE.exe (PID: 6168 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • cmd.exe (PID: 6412 cmdline: "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft SharePoint.exe" & exit MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 3992 cmdline: SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft SharePoint.exe" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • WerFault.exe (PID: 2308 cmdline: C:\Windows\system32\WerFault.exe -u -p 7088 -s 2128 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft SharePoint.exe" & exit, CommandLine: "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft SharePoint.exe" & exit, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\svchost.exe", ParentImage: C:\Users\user\Desktop\svchost.exe, ParentProcessId: 7088, ParentProcessName: svchost.exe, ProcessCommandLine: "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft SharePoint.exe" & exit, ProcessId: 6412, ProcessName: cmd.exe
Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft SharePoint.exe" & exit, CommandLine: "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft SharePoint.exe" & exit, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\svchost.exe", ParentImage: C:\Users\user\Desktop\svchost.exe, ParentProcessId: 7088, ParentProcessName: svchost.exe, ProcessCommandLine: "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft SharePoint.exe" & exit, ProcessId: 6412, ProcessName: cmd.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\Desktop\svchost.exe", CommandLine: "C:\Users\user\Desktop\svchost.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\svchost.exe, NewProcessName: C:\Users\user\Desktop\svchost.exe, OriginalFileName: C:\Users\user\Desktop\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 6508, ProcessCommandLine: "C:\Users\user\Desktop\svchost.exe", ProcessId: 7088, ProcessName: svchost.exe
Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\svchost.exe", CommandLine: "C:\Users\user\Desktop\svchost.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\svchost.exe, NewProcessName: C:\Users\user\Desktop\svchost.exe, OriginalFileName: C:\Users\user\Desktop\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 6508, ProcessCommandLine: "C:\Users\user\Desktop\svchost.exe", ProcessId: 7088, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\Videos\xdwdMicrosoft SharePoint.exeAvira: detection malicious, Label: TR/Crypt.OPACK.Gen
Source: svchost.exeReversingLabs: Detection: 63%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: svchost.exeJoe Sandbox ML: detected
Source: svchost.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Xml.ni.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.ni.pdbRSDS source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Windows.Forms.ni.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: mscorlib.pdbXwN source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Drawing.ni.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Configuration.ni.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERD1D.tmp.dmp.8.dr
Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Configuration.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Drawing.ni.pdbRSDS source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Xml.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Core.ni.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: Microsoft.VisualBasic.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Windows.Forms.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: mscorlib.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Management.ni.pdbRSDSJ< source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Management.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Drawing.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: Microsoft.VisualBasic.pdbP source: WERD1D.tmp.dmp.8.dr
Source: Binary string: mscorlib.ni.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Management.ni.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Core.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.ni.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WERD1D.tmp.dmp.8.dr

Networking

barindex
Source: C:\Users\user\Desktop\svchost.exeNetwork Connect: 147.185.221.23 49681Jump to behavior
Source: global trafficTCP traffic: 147.185.221.23 ports 1,4,6,8,9,49681
Source: global trafficTCP traffic: 192.168.2.4:49730 -> 147.185.221.23:49681
Source: Joe Sandbox ViewIP Address: 147.185.221.23 147.185.221.23
Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: women-forms.gl.at.ply.gg
Source: global trafficDNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
Source: svchost.exe, 00000000.00000002.1927066101.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net

System Summary

barindex
Source: C:\Users\user\Desktop\svchost.exeFile dump: xdwdMicrosoft SharePoint.exe.0.dr 766863872Jump to dropped file
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B810F3D NtProtectVirtualMemory,0_2_00007FFD9B810F3D
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B80EBF90_2_00007FFD9B80EBF9
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B8083620_2_00007FFD9B808362
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B80977D0_2_00007FFD9B80977D
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B8027A60_2_00007FFD9B8027A6
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B8112DE0_2_00007FFD9B8112DE
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B808AE00_2_00007FFD9B808AE0
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B8032170_2_00007FFD9B803217
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B80EE270_2_00007FFD9B80EE27
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B8029680_2_00007FFD9B802968
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B8015780_2_00007FFD9B801578
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B8075B60_2_00007FFD9B8075B6
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B80F02F0_2_00007FFD9B80F02F
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B80036D0_2_00007FFD9B80036D
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B808AC00_2_00007FFD9B808AC0
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B80F0E00_2_00007FFD9B80F0E0
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B80F10D0_2_00007FFD9B80F10D
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B80F1150_2_00007FFD9B80F115
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B80F14D0_2_00007FFD9B80F14D
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B8014600_2_00007FFD9B801460
Source: C:\Users\user\Desktop\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7088 -s 2128
Source: svchost.exe, 00000000.00000002.1934464644.0000000012EF8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUnreal Engine.exe8 vs svchost.exe
Source: svchost.exe, 00000000.00000000.1694888101.00000000009E2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUnreal Engine.exe8 vs svchost.exe
Source: svchost.exe, 00000000.00000002.1938423533.000000001E400000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs svchost.exe
Source: svchost.exeBinary or memory string: OriginalFilenameUnreal Engine.exe8 vs svchost.exe
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, fbFHEYCEDRNgHA.csSecurity API names: File.GetAccessControl
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, fbFHEYCEDRNgHA.csSecurity API names: File.SetAccessControl
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, fbFHEYCEDRNgHA.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
Source: svchost.exe, fbFHEYCEDRNgHA.csSecurity API names: File.GetAccessControl
Source: svchost.exe, fbFHEYCEDRNgHA.csSecurity API names: File.SetAccessControl
Source: svchost.exe, fbFHEYCEDRNgHA.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, xWIYubYFaftLdVv.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, NWNTgUnAeUAOz.csSecurity API names: Directory.GetAccessControl
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, NWNTgUnAeUAOz.csSecurity API names: Directory.SetAccessControl
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, NWNTgUnAeUAOz.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
Source: svchost.exe, xWIYubYFaftLdVv.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: svchost.exe, BtEmTHoUPITCcg.csSecurity API names: File.GetAccessControl
Source: svchost.exe, BtEmTHoUPITCcg.csSecurity API names: File.SetAccessControl
Source: svchost.exe, NeqMcrOVI.csSecurity API names: Directory.GetAccessControl
Source: svchost.exe, NeqMcrOVI.csSecurity API names: Directory.SetAccessControl
Source: svchost.exe, NWNTgUnAeUAOz.csSecurity API names: Directory.GetAccessControl
Source: svchost.exe, NWNTgUnAeUAOz.csSecurity API names: Directory.SetAccessControl
Source: svchost.exe, NWNTgUnAeUAOz.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, BtEmTHoUPITCcg.csSecurity API names: File.GetAccessControl
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, BtEmTHoUPITCcg.csSecurity API names: File.SetAccessControl
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, NeqMcrOVI.csSecurity API names: Directory.GetAccessControl
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, NeqMcrOVI.csSecurity API names: Directory.SetAccessControl
Source: classification engineClassification label: mal100.troj.evad.winEXE@8/6@2/1
Source: C:\Users\user\Desktop\svchost.exeFile created: C:\Users\user\Videos\xdwdMicrosoft SharePoint.exeJump to behavior
Source: C:\Users\user\Desktop\svchost.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7088
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6456:120:WilError_03
Source: C:\Users\user\Desktop\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\Sheet_jxexktatjcxiuck
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\f6f5af73-bf1d-4adc-8024-400b2da66492Jump to behavior
Source: svchost.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: svchost.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
Source: C:\Users\user\Desktop\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\svchost.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: svchost.exeReversingLabs: Detection: 63%
Source: C:\Users\user\Desktop\svchost.exeFile read: C:\Users\user\Desktop\svchost.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\svchost.exe "C:\Users\user\Desktop\svchost.exe"
Source: C:\Users\user\Desktop\svchost.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
Source: C:\Users\user\Desktop\svchost.exeProcess created: C:\Windows\System32\cmd.exe "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft SharePoint.exe" & exit
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft SharePoint.exe"
Source: C:\Users\user\Desktop\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7088 -s 2128
Source: C:\Users\user\Desktop\svchost.exeProcess created: C:\Windows\System32\cmd.exe "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft SharePoint.exe" & exitJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft SharePoint.exe" Jump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: devenum.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: devobj.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: msdmo.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: netfxperf.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: esentprf.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: perfts.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: utildll.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: tdh.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: msdtcuiu.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: atl.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: msdtcprx.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: mtxclu.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: clusapi.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: resutils.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: ktmw32.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: svchost.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: svchost.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Xml.ni.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.ni.pdbRSDS source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Windows.Forms.ni.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: mscorlib.pdbXwN source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Drawing.ni.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Configuration.ni.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERD1D.tmp.dmp.8.dr
Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Configuration.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Drawing.ni.pdbRSDS source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Xml.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Core.ni.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: Microsoft.VisualBasic.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Windows.Forms.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: mscorlib.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Management.ni.pdbRSDSJ< source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Management.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Drawing.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: Microsoft.VisualBasic.pdbP source: WERD1D.tmp.dmp.8.dr
Source: Binary string: mscorlib.ni.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Management.ni.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Core.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.ni.pdb source: WERD1D.tmp.dmp.8.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WERD1D.tmp.dmp.8.dr

Data Obfuscation

barindex
Source: svchost.exe, UHtEybKDZ.cs.Net Code: uJQFfbgPB
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, UHtEybKDZ.cs.Net Code: uJQFfbgPB
Source: svchost.exeStatic PE information: 0xF5FE416F [Wed Oct 13 03:20:15 2100 UTC]
Source: C:\Users\user\Desktop\svchost.exeCode function: 0_2_00007FFD9B8000AD pushad ; iretd 0_2_00007FFD9B8000C1
Source: svchost.exe, gQmHzzrCY.csHigh entropy of concatenated method names: 'DPlEiknPasMgLiC', 'UlKUxGYsPfZLF', 'aXLOEXbpMngOE', 'zzFDEPfFsEy', 'qsoCKcJsSoVxefI', 'ZWniCBsPaVGq', 'UfHPIgjB', 'cEFMFKeIZ', 'HAgVQPupzYc', 'VTpxJNhVzYdQtj'
Source: svchost.exe, AHWNPswt.csHigh entropy of concatenated method names: 'yGqdETmOWRuuM', 'AOfLvAGPS', 'KUGoxrpgzgCD', 'baXOaOsKJozV', 'khAtainKTkNxQec', 'vfGxjDlYlg', 'aVBgGSyH', 'fGFTQUHqJ', 'JkQwOItYPg', 'cHuiMpSDHeSXTio'
Source: svchost.exe, qBKeyeYJq.csHigh entropy of concatenated method names: 'jEFtdokfENpBu', 'rIzRnLiD', 'hbHQgxVaUUBeTw', 'XepbnoXoHEnpfGV', 'AfLXSVYDiimU', 'saYMzuIWGPEKm', 'LtHqTypA', 'IYhBGltFBDGOeOc', 'MNHtPGNfVNKa', 'SVrrcPoRsCkNKD'
Source: svchost.exe, UHtEybKDZ.csHigh entropy of concatenated method names: 'IsKsYXxPCTQEZuD', 'fGtlEVgtBCCO', 'hELArHJq', 'TeMsmarQiyBV', 'EKoomLRrWUjMVOE', 'imtmAmPY', 'iGBlUEMhl', 'AMCVxYow', 'dfRLmLzMH', 'vRvPcDFQFBQWf'
Source: svchost.exe, NeqMcrOVI.csHigh entropy of concatenated method names: 'CAekpWYv', 'XDVDIIiccq', 'mIeQRhRcE', 'EWQvnWtUlEQkvFH', 'biDuPleCQtWOTI', 'vqTTgEHV', 'pHrlqCNZIYFjZ', 'jSsOetzeA', 'AUtblbnTNQEH', 'sLOgwGuDUWgkAoq'
Source: svchost.exe, csktEuDZ.csHigh entropy of concatenated method names: 'rskADhbnmV', 'wrTClakkjVPIa', 'nBZERkgoRCVVOY', 'gOcWvDlZhIeKS', 'xckKMPgBjUkEHa', 'hQLLBCHmmf', 'CcrwnaOzUZlLC', 'DfeIlqwKI', 'sSyRmpqy', 'bMEKnhKqIFqv'
Source: svchost.exe, iNpJrQadM.csHigh entropy of concatenated method names: 'JLUlAIMHE', 'XUTlAvuNuBNjN', 'RSoenJVL', 'EvVlNquXQa', 'nOuDIwWNjK', 'aySUhThUuQLHPpf', 'hWzdxJAPC', 'lVrnIcCHVXT', 'JbqvfwbHeNdmoq', 'gARxDRIhLdGIj'
Source: svchost.exe, dGvnHSGeq.csHigh entropy of concatenated method names: 'JOMUvENQFtGHcpO', 'teLkMHRkjfxl', 'ChdxtsmrCzXl', 'uwFWdGZcYb', 'FkBxclPHcm', 'LcKjxbnq', 'nzzMUeNCrLBd', 'KrIqpPRjQ', 'arlcLuIxo', 'wfFlpcxXNPRkZ'
Source: svchost.exe, kJfIcKLimPN.csHigh entropy of concatenated method names: '_003CScreenShot_003Eb__16_0', 'NbDQVVfdoQdsMoM', 'VAnCWBHPyuCey', 'BrSmPTenf', 'IUkTfmvnyZN', 'cKYLTnRaTAedO', 'aaZsIhVRuCRnj', 'yPgZxPOIO', 'zqVECHqG', 'uMVNFQfR'
Source: svchost.exe, IlzIzIMeuEVy.csHigh entropy of concatenated method names: 'fisxClBKBpQHrQ', 'qVRDgFrHuF', 'DdjeoaXCWrGN', 'ZOPGviBIs', 'oZnSSlnbxsYiYbW', 'qjoubkHK', 'SpkMLDVLjuFB', 'FRiQIUirp', 'kusRUxRDRdozvC', 'loCXogRzie'
Source: svchost.exe, JcYvQYnSVlQsc.csHigh entropy of concatenated method names: 'CZesbWDCbM', 'VjtbyMnqk', 'DAXpdBKr', 'wHuVjakBkj', 'HALnuotrXZcBr', 'yZGDyVtKJ', 'AbNKBOKDHC', 'CojuoHTUsTGCJkB', 'xlOowrvnTajp', 'OZupRvkXI'
Source: svchost.exe, rWPiXWRl.csHigh entropy of concatenated method names: 'cqIUuCsUwoSrSbZ', 'btStXIbpUnVt', 'iQCgqlATgxuUBJI', 'JZuqEvcyr', 'UPSzGhyXOXQ', 'bqYKvvYZW', 'TfLOaDtmoDoRQlA', 'rMWevkuyxERtA', 'aSCVwnnrHudbj', 'WKZnKOELD'
Source: svchost.exe, FdzMqySHmS.csHigh entropy of concatenated method names: 'EvxGnyRlFFVPJ', 'fmbZxyBKbMuPS', 'uVsvPmTtA', 'gIXrRNjNpd', 'MqipTguUk', 'XgIqjNZzX', 'lmJtoaJsNc', 'apxieJGvFZZPG', 'cPAiAKORO', 'ahpBtXBGHex'
Source: svchost.exe, BtEmTHoUPITCcg.csHigh entropy of concatenated method names: 'GgHxJCVEaUQrgzG', 'oUeczvTGsOGuvKm', 'jeBmmWalfpeRCP', 'VIMfiyDwK', 'AEuvaJQidI', 'yTJRtswK', 'CDdGllieEp', 'irZmRfqEgOjZ', 'FXpDNoFHl', 'KwboJpalencUGt'
Source: svchost.exe, HpRVhADmuhZYJvv.csHigh entropy of concatenated method names: 'CreateClassEnumerator', 'Read', 'Write', '_003CGetFiltes_003Eb__0', 'RbtGsbiVXpVBxFM', 'yqnzoQkO', 'sIwkrESWlYysvH', 'HwysfBopUVaS', 'vIBrfQASm', 'flCeMgOLDjHsr'
Source: svchost.exe, oxhJCEhMAubqY.csHigh entropy of concatenated method names: '_003CStart_003Eb__1_0', '_003CUninstall_003Eb__2_0', '_003CLoopInstall_003Eb__7_0', '_003CStartAsBypass_003Eb__10_0', 'AhKppaBJbLPbdg', 'iVYGOMGBfYbum', 'AjtsHZaTLJW', 'fWVtbbAeRYCkJ', 'ugfRNgPlacVi', 'GIPKPjhhjfl'
Source: svchost.exe, pQeeSmtZjfgM.csHigh entropy of concatenated method names: 'uGUEbRFKJBoS', 'hVBOkzuKzwDfJos', 'HbUAgoyD', 'yQySgOpMYFYXVu', 'SPvJQYRdNGBaU', 'NsWyVljvsS', 'OTliTfmgoiQso', 'UhmlLeoUuKNBZ', 'JxWWdcCEgvtaPug', 'wziMAEwKgottZ'
Source: svchost.exe, hbBVDpTqLs.csHigh entropy of concatenated method names: 'rGoWJsiVRHKoA', 'iMjwANJKBaibr', 'BKdiRFySVE', 'JFemKWnAkV', 'juLeagFNniBS', 'GdcWvlQrfiq', 'eYqEvaGvZ', 'jXneSMHQeImK', 'huQEyElELUWv', 'PJsHuXufu'
Source: svchost.exe, fbFHEYCEDRNgHA.csHigh entropy of concatenated method names: 'NvKxsoSaef', 'CUSPlrZhwLtmsQ', 'oJHqaXyaCeUx', 'BNBbbQVhlo', 'VGZDETIRhQzJ', 'nFQEtQkRuI', 'jKSKcuuCUcVT', 'vViVDQBBDioWzRo', 'DNaytTuBypm', 'woqRlTJXiOO'
Source: svchost.exe, NWNTgUnAeUAOz.csHigh entropy of concatenated method names: 'ERuWGdybA', 'kIRpzJkJE', 'whEXPVyPXdASSjZ', 'lAOSjlVFjYCxAV', 'qJEMXNWGkeiDX', 'RqiPGXkvm', 'KLzoqTAPC', 'JJNWCgOtdnBiyx', 'iTitxzvWtC', 'NiQReSAex'
Source: svchost.exe, RtHdNrBnwvHMUx.csHigh entropy of concatenated method names: '_003CPatchMem_003Eb__0', 'lawnyVekQX', 'iNXxXsafCAiLmG', 'QBUegTOTv', 'uXEUmIrFWI', 'PzXOmouPDOKglF', 'PlqYUubicUVK', 'sqGQyYABwQ', 'fUDsAkrTPIsFOxo', 'oRvuQddXMHtiNE'
Source: svchost.exe, jlbeQXxcqjEQ.csHigh entropy of concatenated method names: 'VyLwfAQGqTgj', 'yoSDzsoXTv', 'WJuSHWjilxrU', 'SnXMWsRuuDZ', 'KnjLbGCDj', 'VFyyUkxxPGUt', 'MVcAbdhbFUIxj', 'WKqpQpsRROYXhww', 'SpQCXqzGbZBzQl', 'AkkanYRDEsuDOb'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, gQmHzzrCY.csHigh entropy of concatenated method names: 'DPlEiknPasMgLiC', 'UlKUxGYsPfZLF', 'aXLOEXbpMngOE', 'zzFDEPfFsEy', 'qsoCKcJsSoVxefI', 'ZWniCBsPaVGq', 'UfHPIgjB', 'cEFMFKeIZ', 'HAgVQPupzYc', 'VTpxJNhVzYdQtj'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, AHWNPswt.csHigh entropy of concatenated method names: 'yGqdETmOWRuuM', 'AOfLvAGPS', 'KUGoxrpgzgCD', 'baXOaOsKJozV', 'khAtainKTkNxQec', 'vfGxjDlYlg', 'aVBgGSyH', 'fGFTQUHqJ', 'JkQwOItYPg', 'cHuiMpSDHeSXTio'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, qBKeyeYJq.csHigh entropy of concatenated method names: 'jEFtdokfENpBu', 'rIzRnLiD', 'hbHQgxVaUUBeTw', 'XepbnoXoHEnpfGV', 'AfLXSVYDiimU', 'saYMzuIWGPEKm', 'LtHqTypA', 'IYhBGltFBDGOeOc', 'MNHtPGNfVNKa', 'SVrrcPoRsCkNKD'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, UHtEybKDZ.csHigh entropy of concatenated method names: 'IsKsYXxPCTQEZuD', 'fGtlEVgtBCCO', 'hELArHJq', 'TeMsmarQiyBV', 'EKoomLRrWUjMVOE', 'imtmAmPY', 'iGBlUEMhl', 'AMCVxYow', 'dfRLmLzMH', 'vRvPcDFQFBQWf'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, NeqMcrOVI.csHigh entropy of concatenated method names: 'CAekpWYv', 'XDVDIIiccq', 'mIeQRhRcE', 'EWQvnWtUlEQkvFH', 'biDuPleCQtWOTI', 'vqTTgEHV', 'pHrlqCNZIYFjZ', 'jSsOetzeA', 'AUtblbnTNQEH', 'sLOgwGuDUWgkAoq'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, csktEuDZ.csHigh entropy of concatenated method names: 'rskADhbnmV', 'wrTClakkjVPIa', 'nBZERkgoRCVVOY', 'gOcWvDlZhIeKS', 'xckKMPgBjUkEHa', 'hQLLBCHmmf', 'CcrwnaOzUZlLC', 'DfeIlqwKI', 'sSyRmpqy', 'bMEKnhKqIFqv'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, iNpJrQadM.csHigh entropy of concatenated method names: 'JLUlAIMHE', 'XUTlAvuNuBNjN', 'RSoenJVL', 'EvVlNquXQa', 'nOuDIwWNjK', 'aySUhThUuQLHPpf', 'hWzdxJAPC', 'lVrnIcCHVXT', 'JbqvfwbHeNdmoq', 'gARxDRIhLdGIj'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, dGvnHSGeq.csHigh entropy of concatenated method names: 'JOMUvENQFtGHcpO', 'teLkMHRkjfxl', 'ChdxtsmrCzXl', 'uwFWdGZcYb', 'FkBxclPHcm', 'LcKjxbnq', 'nzzMUeNCrLBd', 'KrIqpPRjQ', 'arlcLuIxo', 'wfFlpcxXNPRkZ'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, kJfIcKLimPN.csHigh entropy of concatenated method names: '_003CScreenShot_003Eb__16_0', 'NbDQVVfdoQdsMoM', 'VAnCWBHPyuCey', 'BrSmPTenf', 'IUkTfmvnyZN', 'cKYLTnRaTAedO', 'aaZsIhVRuCRnj', 'yPgZxPOIO', 'zqVECHqG', 'uMVNFQfR'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, IlzIzIMeuEVy.csHigh entropy of concatenated method names: 'fisxClBKBpQHrQ', 'qVRDgFrHuF', 'DdjeoaXCWrGN', 'ZOPGviBIs', 'oZnSSlnbxsYiYbW', 'qjoubkHK', 'SpkMLDVLjuFB', 'FRiQIUirp', 'kusRUxRDRdozvC', 'loCXogRzie'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, JcYvQYnSVlQsc.csHigh entropy of concatenated method names: 'CZesbWDCbM', 'VjtbyMnqk', 'DAXpdBKr', 'wHuVjakBkj', 'HALnuotrXZcBr', 'yZGDyVtKJ', 'AbNKBOKDHC', 'CojuoHTUsTGCJkB', 'xlOowrvnTajp', 'OZupRvkXI'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, rWPiXWRl.csHigh entropy of concatenated method names: 'cqIUuCsUwoSrSbZ', 'btStXIbpUnVt', 'iQCgqlATgxuUBJI', 'JZuqEvcyr', 'UPSzGhyXOXQ', 'bqYKvvYZW', 'TfLOaDtmoDoRQlA', 'rMWevkuyxERtA', 'aSCVwnnrHudbj', 'WKZnKOELD'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, FdzMqySHmS.csHigh entropy of concatenated method names: 'EvxGnyRlFFVPJ', 'fmbZxyBKbMuPS', 'uVsvPmTtA', 'gIXrRNjNpd', 'MqipTguUk', 'XgIqjNZzX', 'lmJtoaJsNc', 'apxieJGvFZZPG', 'cPAiAKORO', 'ahpBtXBGHex'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, BtEmTHoUPITCcg.csHigh entropy of concatenated method names: 'GgHxJCVEaUQrgzG', 'oUeczvTGsOGuvKm', 'jeBmmWalfpeRCP', 'VIMfiyDwK', 'AEuvaJQidI', 'yTJRtswK', 'CDdGllieEp', 'irZmRfqEgOjZ', 'FXpDNoFHl', 'KwboJpalencUGt'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, HpRVhADmuhZYJvv.csHigh entropy of concatenated method names: 'CreateClassEnumerator', 'Read', 'Write', '_003CGetFiltes_003Eb__0', 'RbtGsbiVXpVBxFM', 'yqnzoQkO', 'sIwkrESWlYysvH', 'HwysfBopUVaS', 'vIBrfQASm', 'flCeMgOLDjHsr'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, oxhJCEhMAubqY.csHigh entropy of concatenated method names: '_003CStart_003Eb__1_0', '_003CUninstall_003Eb__2_0', '_003CLoopInstall_003Eb__7_0', '_003CStartAsBypass_003Eb__10_0', 'AhKppaBJbLPbdg', 'iVYGOMGBfYbum', 'AjtsHZaTLJW', 'fWVtbbAeRYCkJ', 'ugfRNgPlacVi', 'GIPKPjhhjfl'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, pQeeSmtZjfgM.csHigh entropy of concatenated method names: 'uGUEbRFKJBoS', 'hVBOkzuKzwDfJos', 'HbUAgoyD', 'yQySgOpMYFYXVu', 'SPvJQYRdNGBaU', 'NsWyVljvsS', 'OTliTfmgoiQso', 'UhmlLeoUuKNBZ', 'JxWWdcCEgvtaPug', 'wziMAEwKgottZ'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, hbBVDpTqLs.csHigh entropy of concatenated method names: 'rGoWJsiVRHKoA', 'iMjwANJKBaibr', 'BKdiRFySVE', 'JFemKWnAkV', 'juLeagFNniBS', 'GdcWvlQrfiq', 'eYqEvaGvZ', 'jXneSMHQeImK', 'huQEyElELUWv', 'PJsHuXufu'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, fbFHEYCEDRNgHA.csHigh entropy of concatenated method names: 'NvKxsoSaef', 'CUSPlrZhwLtmsQ', 'oJHqaXyaCeUx', 'BNBbbQVhlo', 'VGZDETIRhQzJ', 'nFQEtQkRuI', 'jKSKcuuCUcVT', 'vViVDQBBDioWzRo', 'DNaytTuBypm', 'woqRlTJXiOO'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, NWNTgUnAeUAOz.csHigh entropy of concatenated method names: 'ERuWGdybA', 'kIRpzJkJE', 'whEXPVyPXdASSjZ', 'lAOSjlVFjYCxAV', 'qJEMXNWGkeiDX', 'RqiPGXkvm', 'KLzoqTAPC', 'JJNWCgOtdnBiyx', 'iTitxzvWtC', 'NiQReSAex'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, RtHdNrBnwvHMUx.csHigh entropy of concatenated method names: '_003CPatchMem_003Eb__0', 'lawnyVekQX', 'iNXxXsafCAiLmG', 'QBUegTOTv', 'uXEUmIrFWI', 'PzXOmouPDOKglF', 'PlqYUubicUVK', 'sqGQyYABwQ', 'fUDsAkrTPIsFOxo', 'oRvuQddXMHtiNE'
Source: 0.2.svchost.exe.12ef9ac0.1.raw.unpack, jlbeQXxcqjEQ.csHigh entropy of concatenated method names: 'VyLwfAQGqTgj', 'yoSDzsoXTv', 'WJuSHWjilxrU', 'SnXMWsRuuDZ', 'KnjLbGCDj', 'VFyyUkxxPGUt', 'MVcAbdhbFUIxj', 'WKqpQpsRROYXhww', 'SpQCXqzGbZBzQl', 'AkkanYRDEsuDOb'
Source: C:\Users\user\Desktop\svchost.exeFile created: C:\Users\user\Videos\xdwdMicrosoft SharePoint.exeJump to dropped file

Boot Survival

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft SharePoint.exe"
Source: C:\Users\user\Desktop\svchost.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MSDTC Bridge 3.0.0.0\LinkageJump to behavior
Source: C:\Users\user\Desktop\svchost.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\.NET Memory Cache 4.0\LinkageJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
Source: C:\Users\user\Desktop\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
Source: C:\Users\user\Desktop\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
Source: C:\Users\user\Desktop\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
Source: C:\Users\user\Desktop\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
Source: C:\Users\user\Desktop\svchost.exeMemory allocated: 2EF0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\svchost.exeMemory allocated: 1AEF0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\svchost.exeDropped PE file which has not been started: C:\Users\user\Videos\xdwdMicrosoft SharePoint.exeJump to dropped file
Source: C:\Users\user\Desktop\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Users\user\Desktop\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT UserName FROM Win32_ComputerSystem
Source: C:\Users\user\Desktop\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: Amcache.hve.8.drBinary or memory string: VMware
Source: svchost.exe, 00000000.00000002.1935240757.000000001BA27000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
Source: svchost.exe, 00000000.00000002.1935482077.000000001BA85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V omkwbtbwipchcil Bus
Source: svchost.exe, 00000000.00000002.1935482077.000000001BA85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V omkwbtbwipchcil Bus Pipes
Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: svchost.exe, 00000000.00000002.1927066101.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 6C:\Users\user\AppData\Local\xdwdMicrosoft Hyper-V.exe
Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: svchost.exe, 00000000.00000002.1927066101.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 0%LocalApplicationData%\xdwdMicrosoft Hyper-V.exe
Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: svchost.exe, 00000000.00000002.1927066101.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: .%LocalApplicationData%\xdwdMicrosoft Hyper-V.e
Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: svchost.exe, 00000000.00000002.1935883812.000000001BAAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Amcache.hve.8.drBinary or memory string: vmci.sys
Source: Amcache.hve.8.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
Source: svchost.exe, 00000000.00000002.1927066101.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ,%LocalApplicationData%\xdwdMicrosoft Hyper-V
Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: VMware20,1
Source: svchost.exe, 00000000.00000002.1927066101.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: xdwdMicrosoft Hyper-V.exe
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: svchost.exe, 00000000.00000002.1927066101.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: /%LocalApplicationData%\xdwdMicrosoft Hyper-V.ex
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
Source: svchost.exe, 00000000.00000002.1927066101.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -%LocalApplicationData%\xdwdMicrosoft Hyper-V.
Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\svchost.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\svchost.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\svchost.exeNetwork Connect: 147.185.221.23 49681Jump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess created: C:\Windows\System32\cmd.exe "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft SharePoint.exe" & exitJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft SharePoint.exe" Jump to behavior
Source: C:\Users\user\Desktop\svchost.exeQueries volume information: C:\Users\user\Desktop\svchost.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\TimeZoneInformation BiasJump to behavior
Source: C:\Users\user\Desktop\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: svchost.exe, 00000000.00000002.1935197695.000000001BA00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000002.1935240757.000000001BA27000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000000.00000002.1926406389.0000000000EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe
Source: C:\Users\user\Desktop\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
Source: C:\Users\user\Desktop\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
Windows Management Instrumentation
2
Windows Service
2
Windows Service
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Scheduled Task/Job
1
Scheduled Task/Job
111
Process Injection
23
Virtualization/Sandbox Evasion
LSASS Memory241
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
1
Scheduled Task/Job
1
Disable or Modify Tools
Security Account Manager23
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
111
Process Injection
NTDS1
Process Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets123
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Timestomp
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
svchost.exe63%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
svchost.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\Videos\xdwdMicrosoft SharePoint.exe100%AviraTR/Crypt.OPACK.Gen
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
women-forms.gl.at.ply.gg
147.185.221.23
truetrue
    unknown
    18.31.95.13.in-addr.arpa
    unknown
    unknownfalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://upx.sf.netAmcache.hve.8.drfalse
        high
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namesvchost.exe, 00000000.00000002.1927066101.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          147.185.221.23
          women-forms.gl.at.ply.ggUnited States
          12087SALSGIVERUStrue
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1556741
          Start date and time:2024-11-15 22:12:06 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 6m 41s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:13
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:svchost.exe
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@8/6@2/1
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 98%
          • Number of executed functions: 19
          • Number of non-executed functions: 1
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Excluded IPs from analysis (whitelisted): 52.168.117.173
          • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtEnumerateKey calls found.
          • Report size getting too big, too many NtOpenKey calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtSetInformationFile calls found.
          • VT rate limit hit for: svchost.exe
          TimeTypeDescription
          16:13:00API Interceptor1x Sleep call for process: svchost.exe modified
          16:13:22API Interceptor1x Sleep call for process: WerFault.exe modified
          21:13:02Task SchedulerRun new task: Microsoft Azure DevOps path: C:\Users\user\Videos\xdwdMicrosoft s>SharePoint.exe
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          147.185.221.23msedge_visual_render.exeGet hashmaliciousXWormBrowse
            exe030.exeGet hashmaliciousXWormBrowse
              pQm8Ci3Dov.exeGet hashmaliciousXWormBrowse
                jkL96SLfWS.exeGet hashmaliciousXWormBrowse
                  xtrSvgqQEW.exeGet hashmaliciousXWormBrowse
                    7PRbdkCn03.exeGet hashmaliciousXWormBrowse
                      8Hd0ZExgJz.exeGet hashmaliciousBlank Grabber, Umbral Stealer, XWormBrowse
                        6qwSgLbPO9.exeGet hashmaliciousXWormBrowse
                          RLesaPFXew.exeGet hashmaliciousSilverRatBrowse
                            rboancbWce.exeGet hashmaliciousXWormBrowse
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              SALSGIVERUSmsedge_visual_render.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.23
                              exe030.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.23
                              pQm8Ci3Dov.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.23
                              jkL96SLfWS.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.23
                              xtrSvgqQEW.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.23
                              7PRbdkCn03.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.23
                              8Hd0ZExgJz.exeGet hashmaliciousBlank Grabber, Umbral Stealer, XWormBrowse
                              • 147.185.221.23
                              6qwSgLbPO9.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.23
                              RLesaPFXew.exeGet hashmaliciousSilverRatBrowse
                              • 147.185.221.23
                              mips.elfGet hashmaliciousMirai, MoobotBrowse
                              • 147.176.207.108
                              No context
                              No context
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):1.4364575356172418
                              Encrypted:false
                              SSDEEP:192:/exOqJUNoWJF0TNT+aWB2GZHOclJXZFjhzuiFrZ24lO8oS:UmTJmTNT+am2GAiJhzuiFrY4lO8l
                              MD5:BB4116765382FB57995E2BE81A1E1CE2
                              SHA1:1BB53FFC0BEA2A6EC1B4604596A493147C534A2F
                              SHA-256:80C70E78D2ADF3F0377B36A848F121BB9F36BC0B2CD8AA77C96176D70AFBC6BF
                              SHA-512:22E10A349ED31A48BE824D1CCEC466449A0AC01C1B970180785AB38F62AD33E7799A4B3163532F884FE56050EBADADE5325398F6D24F735604081FA5C48F3BF8
                              Malicious:true
                              Reputation:low
                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.6.1.7.8.7.8.7.5.4.0.5.7.0.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.6.1.7.8.7.8.8.3.0.6.2.1.6.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.e.f.6.6.5.a.a.-.2.b.b.3.-.4.0.4.2.-.8.2.2.1.-.e.3.4.7.b.b.c.5.3.f.f.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.5.f.a.a.a.f.2.-.e.6.f.1.-.4.f.9.4.-.9.6.4.3.-.6.5.1.c.8.0.4.3.3.5.4.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.s.v.c.h.o.s.t...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.U.n.r.e.a.l. .E.n.g.i.n.e...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.b.0.-.0.0.0.1.-.0.0.1.4.-.1.9.e.6.-.0.6.2.6.a.3.3.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.3.a.d.f.9.c.4.2.f.9.6.f.3.2.0.1.6.c.3.b.3.9.c.8.7.1.a.a.b.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.3.6.f.9.1.0.d.b.2.8.9.4.7.5.f.0.e.1.4.0.4.b.a.d.3.4.6.1.c.6.b.c.1.e.3.c.3.b.7.!.s.v.c.h.o.s.t...e.x.e.
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:Mini DuMP crash report, 16 streams, Fri Nov 15 21:13:07 2024, 0x1205a4 type
                              Category:dropped
                              Size (bytes):538774
                              Entropy (8bit):3.402081091986007
                              Encrypted:false
                              SSDEEP:3072:aMSaPL2/4+S8s3+vBPVoQpMnISxdrF74prDBFPIROTcSwknlha1CCqvbtdQ:5SII4+S8s3QBd7SIWdZ4vBFqOnRsqnQ
                              MD5:6C03973F099D847085E36598906D1698
                              SHA1:FABA692DDA6F469D75C0EC118A9D9C4D0B030EC1
                              SHA-256:AA1B9CE5C44C9F5FF4025C5F4B1C7B89F5F584C45FF1E69D9512CEC39D9D66FF
                              SHA-512:AAD277CF79757052CB161742258A527EFE2C21F9E6B902B20F514000E1653C7A81AB72F5922E6C9FF81F5BB0A5206626639924510AE9D57910276E7C4CB0D22C
                              Malicious:false
                              Reputation:low
                              Preview:MDMP..a..... .......c.7g........................x+..........$...l5...........5......tS..\...........l.......8...........T...........XS..>...........\L..........HN..............................................................................eJ.......N......Lw......................T...........[.7g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):9080
                              Entropy (8bit):3.698730197408707
                              Encrypted:false
                              SSDEEP:192:R6l7wVeJIXY6Y9/EKTgmfuCSc2pDj89bL7IfnSZm:R6lXJQY6Y1EKTgmfuCSc/LEfl
                              MD5:E0A3181B6C9C17BFE23FBC336C7BD0B1
                              SHA1:070426B8CCC7EB6CA434878CF17024923105483A
                              SHA-256:B7ED10E4E27D202DC5F5F5BBEFEB039B53F995C234980ECE395CE167E4B70240
                              SHA-512:F91311A0A15C7B77A88A922E1925090CA710AA69A78E68B27A3D975D58E83C53B68E985B631AF92EBA853E26D397DF2D56AEE63BFD06148A4C2D120E9670DD79
                              Malicious:false
                              Reputation:low
                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.0.8.8.<./.P.i.
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4824
                              Entropy (8bit):4.437949238868471
                              Encrypted:false
                              SSDEEP:48:cvIwWl8zs4NJg771I9HjwWpW8VY9Ym8M4JCH+F3YCyq8vvBRkGn42d:uIjf4nI7UjJ7VVJCEWzXnDd
                              MD5:43601A7B229C649227C359D05C210AA5
                              SHA1:6585BB16D1A065E1E4390721A5C09664F71A5E0D
                              SHA-256:243534EEDC0367A4669F7B01234248761988E5726F66C4DB64B5596ACDB4C900
                              SHA-512:04306CF3E61D0B0C7B849941C2FF36B8792C2B9C76206FFBB9A668930218A624EF48F22397C058BAD8A1CC7E2FDD424F07AC7D9A6E3608D34ECCC8302CAEBF9F
                              Malicious:false
                              Reputation:low
                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="589695" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                              Process:C:\Users\user\Desktop\svchost.exe
                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:modified
                              Size (bytes):766863872
                              Entropy (8bit):0.006470151901896372
                              Encrypted:false
                              SSDEEP:
                              MD5:126C1C239056805069E95913562996BA
                              SHA1:EDD9484F1DEB4DDED6889A815DF2A0260EF89F44
                              SHA-256:E9A2F57C7B9516F31089ED62C9B36D150D5032C48DFB2B198EA4A584D0EB2AAD
                              SHA-512:54C5A47E5D68456FEE8D708E2AD262F4B9A93F33BF3089BDD3BBDC5314281A7DF9BFC258C2CA375D72144C02787846A4AE349FA7C2E37844417CF608B7CB9CDB
                              Malicious:true
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...oA............"...0..^...........|... ........@.. ....................................@.................................8|..S.................................................................................... ............... ..H............text....\... ...^.................. ..`.rsrc................`..............@..@.reloc...............h..............@..B................p|......H...........\...........p...i............................................W......H3.......W......3.........(....*b.{.....oM...(N....oO...*.(....(....sQ........(....(....sQ........( ...(....sQ........*J.s....}.....(....*...$...*.s.....%...*.(....*..o....*.(....*.s.... .:.. 0u..o....(....~=...(....&*.s.....*...*..*j(1...(....~/...(h....-...*V(i....Y...(j....Z...*".(.....*...7....#...".,..#..@.:..Y(.....8...!..IC.....9.....:.....;...*..0..........r...p*...0..........r...p*...0..
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:MS Windows registry file, NT/2000 or above
                              Category:dropped
                              Size (bytes):1835008
                              Entropy (8bit):4.465971743306785
                              Encrypted:false
                              SSDEEP:6144:gIXfpi67eLPU9skLmb0b4LWSPKaJG8nAgejZMMhA2gX4WABl0uNYdwBCswSbt:lXD94LWlLZMM6YFHy+t
                              MD5:B48EE8CE1BFB14B23944EEFB651B12F0
                              SHA1:2815E45386DE06C6C0B3F4136650A566E29D13F2
                              SHA-256:95F3B63649F2E78DF7B16FAE2A345972C0A34FAB6DEFA37314D99D3F503D330F
                              SHA-512:25DD02067F1ED76C2F0E4BF377BAFA7A6A2148B66A46CAC952C74ECA112BF750DA0999DD75525834973D04D3187E526AB6AA81C02B944FD51031F06AD24FD748
                              Malicious:false
                              Reputation:low
                              Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmZ..*.7.............................................................................................................................................................................................................................................................................................................................................._R..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):5.946073688162085
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                              • Win32 Executable (generic) a (10002005/4) 49.75%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Windows Screen Saver (13104/52) 0.07%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              File name:svchost.exe
                              File size:354'816 bytes
                              MD5:fb9c21a9cc24889784f8f943dd558f70
                              SHA1:836f910db289475f0e1404bad3461c6bc1e3c3b7
                              SHA256:151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639
                              SHA512:ac2dbb3ef927d8ba6e13102c9c193156cd3e19b53d797ef009eb0ccdad74313cd76e0f4ece13096cc4d075962e1bdc6db4a1b90c10d4d09c520c1e018a2ef8e1
                              SSDEEP:6144:+CjwZuxYoa6PTe6VlWT8b9MM2MNuTDbNSRuW:EZuXPTPVle8KM2TlSR
                              TLSH:A274B20CFE91F805DE1E3D77CBE614108B7125C26E229242364A6FFD8B9637658E61BC
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...oA............"...0..^...........|... ........@.. ....................................@................................
                              Icon Hash:90cececece8e8eb0
                              Entrypoint:0x457c8e
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0xF5FE416F [Wed Oct 13 03:20:15 2100 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x57c380x53.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x580000x610.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x5a0000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000x55c940x55e006b632e935f25b7909acaa13c0756abd2False0.5049041348253275data5.955047134539161IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rsrc0x580000x6100x80001e5f8106bf195e7f33f8e4135b8bea7False0.36083984375data4.699312058362884IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x5a0000xc0x200f4268297d75c0fc31ca98fbe92a87f0cFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_VERSION0x580a00x384data0.4622222222222222
                              RT_MANIFEST0x584240x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                              DLLImport
                              mscoree.dll_CorExeMain
                              TimestampSource PortDest PortSource IPDest IP
                              Nov 15, 2024 22:13:02.868872881 CET4973049681192.168.2.4147.185.221.23
                              Nov 15, 2024 22:13:02.874043941 CET4968149730147.185.221.23192.168.2.4
                              Nov 15, 2024 22:13:02.874119997 CET4973049681192.168.2.4147.185.221.23
                              Nov 15, 2024 22:13:11.348587990 CET4968149730147.185.221.23192.168.2.4
                              Nov 15, 2024 22:13:11.349255085 CET4973049681192.168.2.4147.185.221.23
                              Nov 15, 2024 22:13:25.053004980 CET4973049681192.168.2.4147.185.221.23
                              TimestampSource PortDest PortSource IPDest IP
                              Nov 15, 2024 22:13:02.829982042 CET6346053192.168.2.41.1.1.1
                              Nov 15, 2024 22:13:02.862556934 CET53634601.1.1.1192.168.2.4
                              Nov 15, 2024 22:13:32.592494011 CET5359706162.159.36.2192.168.2.4
                              Nov 15, 2024 22:13:33.209841967 CET5127353192.168.2.41.1.1.1
                              Nov 15, 2024 22:13:33.217173100 CET53512731.1.1.1192.168.2.4
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Nov 15, 2024 22:13:02.829982042 CET192.168.2.41.1.1.10x7970Standard query (0)women-forms.gl.at.ply.ggA (IP address)IN (0x0001)false
                              Nov 15, 2024 22:13:33.209841967 CET192.168.2.41.1.1.10x848bStandard query (0)18.31.95.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Nov 15, 2024 22:13:02.862556934 CET1.1.1.1192.168.2.40x7970No error (0)women-forms.gl.at.ply.gg147.185.221.23A (IP address)IN (0x0001)false
                              Nov 15, 2024 22:13:33.217173100 CET1.1.1.1192.168.2.40x848bName error (3)18.31.95.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:16:12:59
                              Start date:15/11/2024
                              Path:C:\Users\user\Desktop\svchost.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\Desktop\svchost.exe"
                              Imagebase:0x9e0000
                              File size:354'816 bytes
                              MD5 hash:FB9C21A9CC24889784F8F943DD558F70
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              Target ID:1
                              Start time:16:13:00
                              Start date:15/11/2024
                              Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                              Imagebase:0x7ff693ab0000
                              File size:496'640 bytes
                              MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                              Has elevated privileges:true
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:2
                              Start time:16:13:00
                              Start date:15/11/2024
                              Path:C:\Windows\System32\cmd.exe
                              Wow64 process (32bit):false
                              Commandline:"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft SharePoint.exe" & exit
                              Imagebase:0x7ff696370000
                              File size:289'792 bytes
                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:3
                              Start time:16:13:00
                              Start date:15/11/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7699e0000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:4
                              Start time:16:13:00
                              Start date:15/11/2024
                              Path:C:\Windows\System32\schtasks.exe
                              Wow64 process (32bit):false
                              Commandline:SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft SharePoint.exe"
                              Imagebase:0x7ff76f990000
                              File size:235'008 bytes
                              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:8
                              Start time:16:13:07
                              Start date:15/11/2024
                              Path:C:\Windows\System32\WerFault.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\WerFault.exe -u -p 7088 -s 2128
                              Imagebase:0x7ff764560000
                              File size:570'736 bytes
                              MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:16.1%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:100%
                                Total number of Nodes:3
                                Total number of Limit Nodes:0
                                execution_graph 21685 7ffd9b810f3d 21686 7ffd9b810fa1 NtProtectVirtualMemory 21685->21686 21688 7ffd9b811025 21686->21688
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID: 57$5W$5[$5w
                                • API String ID: 0-3058179978
                                • Opcode ID: a62b77a7317a8ab128d11a5d354590d6668a8142fac8a02b3d40162ef7679884
                                • Instruction ID: 04eb0c8a4b481db5390c196a6cfcefe8e6d701e7ea08d3c65f9ef954bc70a00c
                                • Opcode Fuzzy Hash: a62b77a7317a8ab128d11a5d354590d6668a8142fac8a02b3d40162ef7679884
                                • Instruction Fuzzy Hash: 6F327620F1E40F4AFBB8FBE484766F96181AF9C381F924574D58DC32E6ED5CBA464281
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID: @$@$@
                                • API String ID: 0-1177533131
                                • Opcode ID: 4da1a63de412aac11428dab97b428fc171e9dfd2733c80dde787dc2fee44595a
                                • Instruction ID: 378e7e0c93f8803c31038e466174bad1808c3055380122d04df844911a1fbb23
                                • Opcode Fuzzy Hash: 4da1a63de412aac11428dab97b428fc171e9dfd2733c80dde787dc2fee44595a
                                • Instruction Fuzzy Hash: D292F921F0F68E0FEB7593A888791F87B90DF5A390F5605BAC4C9C71F2D91D6A068352
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID: 5[$5{
                                • API String ID: 0-3028928581
                                • Opcode ID: 54b2dc22f457134c5b5c190b13f20c035f0327420236a1fee799e4581ab15e6a
                                • Instruction ID: 799b1b7d7200c6b0a809c2a9067e6c77dce0cd743fa196f2c866925c8cf039a7
                                • Opcode Fuzzy Hash: 54b2dc22f457134c5b5c190b13f20c035f0327420236a1fee799e4581ab15e6a
                                • Instruction Fuzzy Hash: 62228720F1E40F4AFBB8FBE484766F96181AF9C381F920574D58DC32E6ED5CBA464281
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID: %K_H
                                • API String ID: 0-2403559944
                                • Opcode ID: 233027e6e336b5cdca1cc0ab68dd3d000038462a95c4004a43fe862f102dbab3
                                • Instruction ID: 32116c3c16301b9a63e70a8001790ef5d4383c825015b940b8de13ec936694e9
                                • Opcode Fuzzy Hash: 233027e6e336b5cdca1cc0ab68dd3d000038462a95c4004a43fe862f102dbab3
                                • Instruction Fuzzy Hash: 8C62E812E0F6CA0EF726A7A48C751F43BA0DF16354F5A81FAD4C9CB1E7E91C650A8352

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1310 7ffd9b810f3d-7ffd9b811023 NtProtectVirtualMemory 1314 7ffd9b811025 1310->1314 1315 7ffd9b81102b-7ffd9b811056 1310->1315 1314->1315
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID: MemoryProtectVirtual
                                • String ID:
                                • API String ID: 2706961497-0
                                • Opcode ID: 222334ee775691cf11f1259d5ea283ab370a8f7b71aeb4d55d3aa77a1e9e42eb
                                • Instruction ID: e2f541f8b2eb8a5aa2b782ef6f27606c6e7a7a492a8944f0f80b6b85836b0fd1
                                • Opcode Fuzzy Hash: 222334ee775691cf11f1259d5ea283ab370a8f7b71aeb4d55d3aa77a1e9e42eb
                                • Instruction Fuzzy Hash: 8731B571A1CB4C4FDB189B5CD8166FD7BE1EB99320F0042AFE04DD3296DA75A8458BC1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1531 7ffd9b808ac0-7ffd9b808ac7 1532 7ffd9b808ad2-7ffd9b808ae7 1531->1532 1533 7ffd9b808ac9-7ffd9b808ad1 1531->1533 1535 7ffd9b808aad-7ffd9b808aba 1532->1535 1536 7ffd9b808ae9 1532->1536 1533->1532 1537 7ffd9b808b63-7ffd9b808b65 1536->1537 1538 7ffd9b808aeb-7ffd9b808af4 1536->1538 1539 7ffd9b808b77 1537->1539 1540 7ffd9b808b67 1537->1540 1541 7ffd9b808b4d-7ffd9b808b51 1538->1541 1542 7ffd9b808af6-7ffd9b808af9 1538->1542 1545 7ffd9b808b02-7ffd9b808b04 1539->1545 1546 7ffd9b808b79-7ffd9b808b7b 1539->1546 1544 7ffd9b808b6c-7ffd9b808b6e 1540->1544 1541->1537 1543 7ffd9b808b53 1541->1543 1547 7ffd9b808b0b 1542->1547 1548 7ffd9b808afb-7ffd9b808b00 1542->1548 1551 7ffd9b808b54 1543->1551 1552 7ffd9b808b9e-7ffd9b808bab call 7ffd9b8039e0 1544->1552 1553 7ffd9b808b70-7ffd9b808b75 1544->1553 1556 7ffd9b808b34-7ffd9b808b41 1545->1556 1557 7ffd9b808b06 1545->1557 1554 7ffd9b808b7d-7ffd9b808b7e 1546->1554 1555 7ffd9b808b8e-7ffd9b808b90 1546->1555 1549 7ffd9b808b0d 1547->1549 1550 7ffd9b808b56-7ffd9b808b58 1547->1550 1548->1550 1549->1550 1558 7ffd9b808b0f-7ffd9b808b11 1549->1558 1559 7ffd9b808b88-7ffd9b808b8a 1550->1559 1560 7ffd9b808b5a-7ffd9b808b5f 1550->1560 1551->1550 1579 7ffd9b808bb1-7ffd9b808bb4 1552->1579 1553->1539 1553->1545 1570 7ffd9b808b81-7ffd9b808b82 1554->1570 1566 7ffd9b808b92-7ffd9b808b9a 1555->1566 1556->1551 1575 7ffd9b808b43-7ffd9b808b48 1556->1575 1557->1547 1564 7ffd9b808b23-7ffd9b808b28 1558->1564 1565 7ffd9b808b13-7ffd9b808b1a 1558->1565 1562 7ffd9b808b9c-7ffd9b808baa call 7ffd9b8039e0 1559->1562 1563 7ffd9b808b8c-7ffd9b808b8d 1559->1563 1560->1544 1567 7ffd9b808b61 1560->1567 1562->1579 1563->1555 1564->1570 1573 7ffd9b808b2a-7ffd9b808b2b 1564->1573 1571 7ffd9b808b2c 1565->1571 1572 7ffd9b808b1c 1565->1572 1566->1552 1567->1537 1567->1544 1576 7ffd9b808b84-7ffd9b808b86 1570->1576 1577 7ffd9b808bbc-7ffd9b808bbe 1570->1577 1578 7ffd9b808b21 1571->1578 1580 7ffd9b808b2d-7ffd9b808b32 1571->1580 1572->1578 1573->1571 1575->1560 1582 7ffd9b808b4a 1575->1582 1576->1559 1578->1564 1583 7ffd9b808bde-7ffd9b808c45 1579->1583 1584 7ffd9b808bb6 1579->1584 1580->1556 1580->1566 1582->1541 1588 7ffd9b808c77-7ffd9b808c7d 1583->1588 1585 7ffd9b808bb8-7ffd9b808bbb 1584->1585 1586 7ffd9b808bdc 1584->1586 1585->1577 1586->1583 1589 7ffd9b808c7f-7ffd9b808c9d 1588->1589 1590 7ffd9b808ca2-7ffd9b808ca8 1588->1590 1589->1590 1591 7ffd9b808caf-7ffd9b808cb5 1590->1591 1592 7ffd9b808caa 1590->1592 1593 7ffd9b808c47-7ffd9b808c4d 1591->1593 1594 7ffd9b808cb7-7ffd9b808cd1 1591->1594 1592->1591 1593->1588 1595 7ffd9b808c4f-7ffd9b808c72 1593->1595 1598 7ffd9b808cd3-7ffd9b808cdb 1594->1598 1599 7ffd9b808cf7-7ffd9b808d05 1594->1599 1595->1588 1600 7ffd9b808d07-7ffd9b808d3b call 7ffd9b808ae0 1598->1600 1599->1600
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID: H
                                • API String ID: 0-2852464175
                                • Opcode ID: 13b61f8be148a041a2a68153d1f3bfb2a4de5153d4f3566d156b4f29a6a68e14
                                • Instruction ID: 22d78af258934364f04a228e4a697d228895a830f5d23b3ac1f4ece89d02f9c0
                                • Opcode Fuzzy Hash: 13b61f8be148a041a2a68153d1f3bfb2a4de5153d4f3566d156b4f29a6a68e14
                                • Instruction Fuzzy Hash: 8C713A61F0F24A0AFBB9936448761F53BA0DF59394F5506BAC4C9C31E2ED1C698B8382

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1607 7ffd9b808ae0-7ffd9b808ae7 1608 7ffd9b808aad-7ffd9b808aba 1607->1608 1609 7ffd9b808ae9 1607->1609 1610 7ffd9b808b63-7ffd9b808b65 1609->1610 1611 7ffd9b808aeb-7ffd9b808af4 1609->1611 1612 7ffd9b808b77 1610->1612 1613 7ffd9b808b67 1610->1613 1614 7ffd9b808b4d-7ffd9b808b51 1611->1614 1615 7ffd9b808af6-7ffd9b808af9 1611->1615 1618 7ffd9b808b02-7ffd9b808b04 1612->1618 1619 7ffd9b808b79-7ffd9b808b7b 1612->1619 1617 7ffd9b808b6c-7ffd9b808b6e 1613->1617 1614->1610 1616 7ffd9b808b53 1614->1616 1620 7ffd9b808b0b 1615->1620 1621 7ffd9b808afb-7ffd9b808b00 1615->1621 1624 7ffd9b808b54 1616->1624 1625 7ffd9b808b9e-7ffd9b808bab call 7ffd9b8039e0 1617->1625 1626 7ffd9b808b70-7ffd9b808b75 1617->1626 1629 7ffd9b808b34-7ffd9b808b41 1618->1629 1630 7ffd9b808b06 1618->1630 1627 7ffd9b808b7d-7ffd9b808b7e 1619->1627 1628 7ffd9b808b8e-7ffd9b808b90 1619->1628 1622 7ffd9b808b0d 1620->1622 1623 7ffd9b808b56-7ffd9b808b58 1620->1623 1621->1623 1622->1623 1631 7ffd9b808b0f-7ffd9b808b11 1622->1631 1632 7ffd9b808b88-7ffd9b808b8a 1623->1632 1633 7ffd9b808b5a-7ffd9b808b5f 1623->1633 1624->1623 1652 7ffd9b808bb1-7ffd9b808bb4 1625->1652 1626->1612 1626->1618 1643 7ffd9b808b81-7ffd9b808b82 1627->1643 1639 7ffd9b808b92-7ffd9b808b9a 1628->1639 1629->1624 1648 7ffd9b808b43-7ffd9b808b48 1629->1648 1630->1620 1637 7ffd9b808b23-7ffd9b808b28 1631->1637 1638 7ffd9b808b13-7ffd9b808b1a 1631->1638 1635 7ffd9b808b9c-7ffd9b808baa call 7ffd9b8039e0 1632->1635 1636 7ffd9b808b8c-7ffd9b808b8d 1632->1636 1633->1617 1640 7ffd9b808b61 1633->1640 1635->1652 1636->1628 1637->1643 1646 7ffd9b808b2a-7ffd9b808b2b 1637->1646 1644 7ffd9b808b2c 1638->1644 1645 7ffd9b808b1c 1638->1645 1639->1625 1640->1610 1640->1617 1649 7ffd9b808b84-7ffd9b808b86 1643->1649 1650 7ffd9b808bbc-7ffd9b808bbe 1643->1650 1651 7ffd9b808b21 1644->1651 1653 7ffd9b808b2d-7ffd9b808b32 1644->1653 1645->1651 1646->1644 1648->1633 1655 7ffd9b808b4a 1648->1655 1649->1632 1651->1637 1656 7ffd9b808bde-7ffd9b808c45 1652->1656 1657 7ffd9b808bb6 1652->1657 1653->1629 1653->1639 1655->1614 1661 7ffd9b808c77-7ffd9b808c7d 1656->1661 1658 7ffd9b808bb8-7ffd9b808bbb 1657->1658 1659 7ffd9b808bdc 1657->1659 1658->1650 1659->1656 1662 7ffd9b808c7f-7ffd9b808c9d 1661->1662 1663 7ffd9b808ca2-7ffd9b808ca8 1661->1663 1662->1663 1664 7ffd9b808caf-7ffd9b808cb5 1663->1664 1665 7ffd9b808caa 1663->1665 1666 7ffd9b808c47-7ffd9b808c4d 1664->1666 1667 7ffd9b808cb7-7ffd9b808cd1 1664->1667 1665->1664 1666->1661 1668 7ffd9b808c4f-7ffd9b808c72 1666->1668 1671 7ffd9b808cd3-7ffd9b808cdb 1667->1671 1672 7ffd9b808cf7-7ffd9b808d05 1667->1672 1668->1661 1673 7ffd9b808d07 call 7ffd9b808ae0 1671->1673 1672->1673 1677 7ffd9b808d0c-7ffd9b808d3b 1673->1677
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID: H
                                • API String ID: 0-2852464175
                                • Opcode ID: 1d2328455d502a6420b91b8c1a9e160e168d58d67a7b6f6352bf2e677fded943
                                • Instruction ID: e48fc9266c8903348a2b8fface01b966e7d0e3782e973460ccf67707f98feb5d
                                • Opcode Fuzzy Hash: 1d2328455d502a6420b91b8c1a9e160e168d58d67a7b6f6352bf2e677fded943
                                • Instruction Fuzzy Hash: 3C610761F0F24A0AFBB9937448751F53B90DF59394F5606BAC4C8C71E2ED1C698B8382
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2821053be0cb86f7eea3fa662fc964da5c0efadbbf138b6653e7c07d55cd5e7b
                                • Instruction ID: 5c57d5c2db9a5037c6e657bc4c7195d14313ed8a6536e1677b47ae92c9ac58bd
                                • Opcode Fuzzy Hash: 2821053be0cb86f7eea3fa662fc964da5c0efadbbf138b6653e7c07d55cd5e7b
                                • Instruction Fuzzy Hash: 0AA25D21F0E68B0BE725B76888766B83791DF5A314F4501B5D05DC72EBEE1C790A8383
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2a2a820461dd73ab5598ca959063858decfef48e44dea2e9c876ede702052337
                                • Instruction ID: 3bb4fa32817ba4c77a404b4aee284c3687afffa8445a1ed62b57c8f25ae12aa7
                                • Opcode Fuzzy Hash: 2a2a820461dd73ab5598ca959063858decfef48e44dea2e9c876ede702052337
                                • Instruction Fuzzy Hash: 7E320C12F0F68B0AF73567A89C761F83B90DF55365F5A80BAD4C9CA0E7ED0C65068392
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8c7e302fd27803cbe7f8d653527910030e11b1ae191918aa16e6be7ba359d2fe
                                • Instruction ID: 993b397109ea21fe57cf1b721ba9e5003c383d438d4afe97b3d78d59a5440159
                                • Opcode Fuzzy Hash: 8c7e302fd27803cbe7f8d653527910030e11b1ae191918aa16e6be7ba359d2fe
                                • Instruction Fuzzy Hash: 62328051E0F7CB0EF72653A44C751F87BA09F2A354F5A80FAD4C9CA1E7E90C690A8352

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2725 7ffd9b803217-7ffd9b80321c 2726 7ffd9b803297-7ffd9b8032a7 call 7ffd9b8017b8 call 7ffd9b801260 2725->2726 2727 7ffd9b80321e-7ffd9b803224 2725->2727 2741 7ffd9b8032ac-7ffd9b8032cc call 7ffd9b8017b8 2726->2741 2728 7ffd9b803226 2727->2728 2729 7ffd9b803252-7ffd9b80325b 2727->2729 2728->2729 2731 7ffd9b803228-7ffd9b803233 2728->2731 2737 7ffd9b803398-7ffd9b8033a1 2729->2737 2738 7ffd9b803261 2729->2738 2734 7ffd9b803239-7ffd9b803243 2731->2734 2735 7ffd9b802f84-7ffd9b802fad call 7ffd9b802400 2731->2735 2734->2735 2750 7ffd9b803249-7ffd9b80324d 2734->2750 2772 7ffd9b802fbf 2735->2772 2773 7ffd9b802faf-7ffd9b802fbd 2735->2773 2743 7ffd9b8033a3 2737->2743 2744 7ffd9b8033d0-7ffd9b8033d2 2737->2744 2738->2737 2742 7ffd9b803267-7ffd9b803269 2738->2742 2763 7ffd9b8032d1-7ffd9b8032e6 2741->2763 2747 7ffd9b80327b-7ffd9b803295 2742->2747 2748 7ffd9b80326b-7ffd9b803277 2742->2748 2743->2744 2749 7ffd9b8033a5-7ffd9b8033c9 call 7ffd9b8017b8 call 7ffd9b802410 2743->2749 2753 7ffd9b8033d4-7ffd9b8033d9 2744->2753 2754 7ffd9b803402-7ffd9b803416 2744->2754 2747->2726 2762 7ffd9b803279 2748->2762 2748->2763 2759 7ffd9b8033db 2749->2759 2789 7ffd9b8033cb 2749->2789 2750->2729 2753->2759 2760 7ffd9b80341d-7ffd9b803426 2753->2760 2774 7ffd9b803428 2754->2774 2790 7ffd9b803418 2754->2790 2759->2760 2770 7ffd9b8033dd-7ffd9b803400 2759->2770 2760->2774 2775 7ffd9b80343f-7ffd9b803441 2760->2775 2762->2747 2826 7ffd9b8032f8-7ffd9b80331a call 7ffd9b8017b8 2763->2826 2827 7ffd9b8032e8-7ffd9b8032f5 2763->2827 2770->2754 2776 7ffd9b80300c-7ffd9b80300e 2772->2776 2777 7ffd9b802fc1-7ffd9b802ff9 call 7ffd9b801b08 call 7ffd9b801b18 2772->2777 2773->2772 2773->2776 2774->2775 2785 7ffd9b80342a call 7ffd9b8019e0 2774->2785 2780 7ffd9b803443-7ffd9b803448 2775->2780 2781 7ffd9b803471 2775->2781 2791 7ffd9b803010-7ffd9b803015 2776->2791 2792 7ffd9b80303e-7ffd9b803045 2776->2792 2893 7ffd9b803000-7ffd9b803005 2777->2893 2787 7ffd9b80344a 2780->2787 2788 7ffd9b80346f 2780->2788 2793 7ffd9b803473-7ffd9b803478 2781->2793 2794 7ffd9b8034a1-7ffd9b8034a8 2781->2794 2802 7ffd9b80342f-7ffd9b803438 2785->2802 2787->2788 2803 7ffd9b80344c-7ffd9b803468 call 7ffd9b8017b8 2787->2803 2788->2781 2789->2744 2790->2760 2800 7ffd9b80303c 2791->2800 2801 7ffd9b803017 2791->2801 2813 7ffd9b803047 2792->2813 2814 7ffd9b803074-7ffd9b803076 2792->2814 2805 7ffd9b80347a 2793->2805 2806 7ffd9b80349f 2793->2806 2811 7ffd9b8034aa 2794->2811 2812 7ffd9b8034c7-7ffd9b8034c9 2794->2812 2800->2792 2801->2800 2815 7ffd9b803019-7ffd9b803035 call 7ffd9b8017b8 2801->2815 2802->2787 2807 7ffd9b80343a 2802->2807 2803->2805 2866 7ffd9b80346a 2803->2866 2805->2806 2816 7ffd9b80347c-7ffd9b803498 call 7ffd9b8017b8 2805->2816 2806->2794 2807->2775 2811->2812 2822 7ffd9b8034ac call 7ffd9b801258 2811->2822 2823 7ffd9b8034cb-7ffd9b8034d0 2812->2823 2824 7ffd9b8034f9 2812->2824 2813->2814 2829 7ffd9b803049-7ffd9b80306d call 7ffd9b8017b8 call 7ffd9b801260 2813->2829 2818 7ffd9b803078-7ffd9b80307d 2814->2818 2819 7ffd9b8030a6 2814->2819 2815->2813 2878 7ffd9b803037 2815->2878 2816->2811 2869 7ffd9b80349a 2816->2869 2831 7ffd9b8030a4 2818->2831 2832 7ffd9b80307f 2818->2832 2835 7ffd9b8030a8-7ffd9b8030ad 2819->2835 2836 7ffd9b8030d6-7ffd9b8030dd 2819->2836 2848 7ffd9b8034b1-7ffd9b8034c0 2822->2848 2837 7ffd9b8034f7 2823->2837 2838 7ffd9b8034d2 2823->2838 2842 7ffd9b8034fb-7ffd9b803500 2824->2842 2843 7ffd9b803529-7ffd9b803530 2824->2843 2887 7ffd9b80332c-7ffd9b803331 2826->2887 2888 7ffd9b80331c-7ffd9b803328 2826->2888 2827->2826 2829->2832 2899 7ffd9b80306f 2829->2899 2831->2819 2832->2831 2845 7ffd9b803081-7ffd9b80309d call 7ffd9b8017b8 2832->2845 2849 7ffd9b8030d4 2835->2849 2850 7ffd9b8030af 2835->2850 2865 7ffd9b8030dd 2836->2865 2837->2824 2838->2837 2851 7ffd9b8034d4-7ffd9b8034f0 call 7ffd9b8017b8 2838->2851 2855 7ffd9b803527 2842->2855 2856 7ffd9b803502 2842->2856 2860 7ffd9b803532 2843->2860 2861 7ffd9b80353d-7ffd9b80353f 2843->2861 2845->2850 2900 7ffd9b80309f 2845->2900 2848->2838 2885 7ffd9b8034c2 2848->2885 2849->2836 2850->2849 2862 7ffd9b8030b1-7ffd9b8030cf call 7ffd9b8017b8 2850->2862 2851->2856 2906 7ffd9b8034f2 2851->2906 2855->2843 2856->2855 2867 7ffd9b803504-7ffd9b803520 call 7ffd9b8017b8 2856->2867 2860->2861 2871 7ffd9b803534-7ffd9b803538 2860->2871 2873 7ffd9b803541-7ffd9b803554 2861->2873 2874 7ffd9b80356f-7ffd9b80357a 2861->2874 2862->2849 2865->2865 2866->2788 2867->2860 2908 7ffd9b803522 2867->2908 2869->2806 2871->2861 2895 7ffd9b80357e-7ffd9b803984 call 7ffd9b800928 call 7ffd9b800930 2873->2895 2902 7ffd9b803556 2873->2902 2884 7ffd9b80357c 2874->2884 2878->2800 2884->2895 2885->2812 2890 7ffd9b803333-7ffd9b803337 2887->2890 2891 7ffd9b80338f-7ffd9b803391 2887->2891 2909 7ffd9b80333a-7ffd9b803388 call 7ffd9b8017b8 2888->2909 2913 7ffd9b80332a 2888->2913 2890->2909 2891->2743 2904 7ffd9b803393 2891->2904 2893->2801 2901 7ffd9b803007 2893->2901 2899->2814 2900->2831 2901->2776 2902->2884 2910 7ffd9b803558-7ffd9b803560 2902->2910 2904->2737 2906->2837 2908->2855 2909->2891 2913->2887
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: af20038db55e4305048eed6123761eae7f3dd18284aedc8a968e0f66c2a29fa7
                                • Instruction ID: 12d0592ade373f8b643df7c1f17ae9968d8b5cb4eab6d43005ab795e219dc7a5
                                • Opcode Fuzzy Hash: af20038db55e4305048eed6123761eae7f3dd18284aedc8a968e0f66c2a29fa7
                                • Instruction Fuzzy Hash: 3E42EE91A0E3C60FE767A77458761A83FB04F2B148B4A05EBC5C9DB1E7E91C590AC363
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f113abb82c82793da5d748533f1f5fb491f2f9303741c7b6bc0a324971271c86
                                • Instruction ID: 172e003c8822e0da3a3902e52ca981ef37f1b18d1b21e799186cdf40cfad72af
                                • Opcode Fuzzy Hash: f113abb82c82793da5d748533f1f5fb491f2f9303741c7b6bc0a324971271c86
                                • Instruction Fuzzy Hash: 3012E852E0F68B0AF73A67A48C761F83A90DF29354F5A81BAD4C9C71E7ED0C75068352

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 3865 7ffd9b80f10d-7ffd9b80f900 3867 7ffd9b80f909 3865->3867 3868 7ffd9b80f90e-7ffd9b80f913 3867->3868 3869 7ffd9b80f902-7ffd9b80f907 3868->3869 3870 7ffd9b80f915-7ffd9b80f941 3868->3870 3869->3867 3869->3868 3874 7ffd9b80f942-7ffd9b80f947 3870->3874 3875 7ffd9b80f94e-7ffd9b80f953 3874->3875 3876 7ffd9b80f949 3874->3876 3875->3874 3877 7ffd9b80f955-7ffd9b80f988 3875->3877 3876->3875 3881 7ffd9b80f98f-7ffd9b80f9a3 3877->3881 3882 7ffd9b80f98a 3877->3882 3885 7ffd9b80f9be 3881->3885 3886 7ffd9b80f9a5-7ffd9b80f9bd 3881->3886 3882->3881 3887 7ffd9b80f9bf-7ffd9b80f9c1 3885->3887 3886->3887 3888 7ffd9b80f9c2-7ffd9b80f9c7 3887->3888 3889 7ffd9b80f9ce-7ffd9b80f9d3 3888->3889 3890 7ffd9b80f9c9 3888->3890 3889->3888 3891 7ffd9b80f9d5-7ffd9b80fa01 3889->3891 3890->3889 3896 7ffd9b80fa02-7ffd9b80fa07 3891->3896 3897 7ffd9b80fa0e-7ffd9b80fa13 3896->3897 3898 7ffd9b80fa09 3896->3898 3897->3896 3899 7ffd9b80fa15-7ffd9b80fa40 3897->3899 3898->3897 3902 7ffd9b80fa49 3899->3902 3903 7ffd9b80fa4e-7ffd9b80fa53 3902->3903 3904 7ffd9b80fa42-7ffd9b80fa47 3903->3904 3905 7ffd9b80fa55-7ffd9b80fa8e 3903->3905 3904->3902 3904->3903 3909 7ffd9b80fa90 3905->3909 3910 7ffd9b80fa9b-7ffd9b80faa4 3905->3910 3909->3910 3912 7ffd9b80fa92-7ffd9b80fa94 3909->3912 3913 7ffd9b80faa6-7ffd9b80fae0 3910->3913 3912->3913 3914 7ffd9b80fa96 3912->3914 3918 7ffd9b80fae9 3913->3918 3914->3910 3919 7ffd9b80faee-7ffd9b80faf3 3918->3919 3920 7ffd9b80fae2-7ffd9b80fae7 3919->3920 3921 7ffd9b80faf5-7ffd9b80fb32 3919->3921 3920->3918 3920->3919 3925 7ffd9b80fb34-7ffd9b80fb48 3921->3925 3926 7ffd9b80fb7c-7ffd9b80fb8a 3921->3926 3927 7ffd9b80fb4d-7ffd9b80fb54 3925->3927 3931 7ffd9b80fb8c-7ffd9b80fb9f 3926->3931 3929 7ffd9b80fb5e-7ffd9b80fb65 3927->3929 3930 7ffd9b80fb56-7ffd9b80fb59 3927->3930 3932 7ffd9b80feea-7ffd9b80fefa 3929->3932 3933 7ffd9b80fb6b-7ffd9b80fb72 3929->3933 3930->3929 3942 7ffd9b80fbb1-7ffd9b80fbbf 3931->3942 3943 7ffd9b80fba1-7ffd9b80fbad 3931->3943 3937 7ffd9b80fefc-7ffd9b80ff53 3932->3937 3935 7ffd9b80fb78-7ffd9b80fb7a 3933->3935 3936 7ffd9b80feba-7ffd9b80fec1 3933->3936 3935->3926 3935->3931 3938 7ffd9b80fec3-7ffd9b80fec4 3936->3938 3939 7ffd9b80fec9-7ffd9b80fed0 3936->3939 3959 7ffd9b80ff9d-7ffd9b80ffb6 3937->3959 3960 7ffd9b80ff55-7ffd9b80ff9c 3937->3960 3938->3939 3939->3927 3941 7ffd9b80fed6-7ffd9b80fee5 3939->3941 3945 7ffd9b80fee6-7ffd9b80fee9 3941->3945 3951 7ffd9b80fbc6-7ffd9b80fbc8 3942->3951 3949 7ffd9b80fbaf-7ffd9b80fbbf 3943->3949 3950 7ffd9b80fc07-7ffd9b80fc11 3943->3950 3949->3951 3961 7ffd9b80fc42-7ffd9b80fc43 3950->3961 3962 7ffd9b80fc13-7ffd9b80fc23 3950->3962 3952 7ffd9b80fbda-7ffd9b80fbf8 3951->3952 3953 7ffd9b80fbca-7ffd9b80fbd8 3951->3953 3979 7ffd9b80fc0a-7ffd9b80fc11 3952->3979 3980 7ffd9b80fbfa-7ffd9b80fc03 3952->3980 3953->3952 3968 7ffd9b80fff8-7ffd9b810009 3959->3968 3969 7ffd9b80ffb8-7ffd9b80ffc1 3959->3969 3960->3959 3965 7ffd9b80fcc0-7ffd9b80fcce 3961->3965 3966 7ffd9b80fc44 3961->3966 3976 7ffd9b80fc35-7ffd9b80fc40 3962->3976 3977 7ffd9b80fc25-7ffd9b80fc2c 3962->3977 3981 7ffd9b80fce0-7ffd9b80fcef 3965->3981 3982 7ffd9b80fcd0-7ffd9b80fcdd 3965->3982 3970 7ffd9b80fc45-7ffd9b80fc54 3966->3970 3971 7ffd9b80fc56-7ffd9b80fc77 3966->3971 3969->3968 3970->3971 4000 7ffd9b80fc89 3971->4000 4001 7ffd9b80fc79-7ffd9b80fc80 3971->4001 3976->3971 3984 7ffd9b80fc2e-7ffd9b80fc40 3977->3984 3985 7ffd9b80fc8a-7ffd9b80fc93 3977->3985 3979->3961 3979->3962 3980->3950 3993 7ffd9b80fd01-7ffd9b80fd11 3981->3993 3994 7ffd9b80fcf1-7ffd9b80fcff 3981->3994 3997 7ffd9b80fcde 3982->3997 3984->3971 3990 7ffd9b80fc9a-7ffd9b80fca2 3985->3990 3998 7ffd9b80fcb4-7ffd9b80fcbf 3990->3998 3999 7ffd9b80fca4-7ffd9b80fcbf 3990->3999 4007 7ffd9b80fd23-7ffd9b80fd32 3993->4007 4008 7ffd9b80fd13-7ffd9b80fd32 3993->4008 3994->3993 3997->3981 3998->3965 3999->3965 4000->3985 4001->3997 4004 7ffd9b80fc82-7ffd9b80fc93 4001->4004 4004->3990 4013 7ffd9b80fd39-7ffd9b80fd3e 4007->4013 4008->4013 4016 7ffd9b80fd50-7ffd9b80fd56 4013->4016 4017 7ffd9b80fd40-7ffd9b80fd56 4013->4017 4019 7ffd9b80fd68-7ffd9b80fd80 4016->4019 4020 7ffd9b80fd58-7ffd9b80fd5b 4016->4020 4017->4019 4017->4020 4027 7ffd9b80feaf-7ffd9b80feb2 4019->4027 4028 7ffd9b80fd86-7ffd9b80fd8d 4019->4028 4022 7ffd9b80fd5d-7ffd9b80fd5e 4020->4022 4023 7ffd9b80fdd8 4020->4023 4022->4019 4026 7ffd9b80fdda-7ffd9b80fde0 4023->4026 4032 7ffd9b80fdf2-7ffd9b80fe05 4026->4032 4033 7ffd9b80fde2-7ffd9b80fde9 4026->4033 4027->3941 4031 7ffd9b80feb4-7ffd9b80feb5 4027->4031 4030 7ffd9b80fd8f-7ffd9b80fdb0 4028->4030 4045 7ffd9b80fdb7-7ffd9b80fdbb 4030->4045 4031->3936 4043 7ffd9b80fe22-7ffd9b80fe2b 4032->4043 4044 7ffd9b80fe07-7ffd9b80fe12 4032->4044 4035 7ffd9b80fe47 4033->4035 4036 7ffd9b80fdeb-7ffd9b80fdf1 4033->4036 4037 7ffd9b80fe71 4035->4037 4038 7ffd9b80fe48-7ffd9b80fe49 4035->4038 4036->4032 4041 7ffd9b80fe83-7ffd9b80fe87 4037->4041 4042 7ffd9b80fe73-7ffd9b80fe7f 4037->4042 4046 7ffd9b80fe4b-7ffd9b80fe6f 4038->4046 4041->3937 4051 7ffd9b80fe88 4041->4051 4060 7ffd9b80fe91-7ffd9b80fe9f 4042->4060 4061 7ffd9b80fe81 4042->4061 4047 7ffd9b80fe3d-7ffd9b80fe41 4043->4047 4048 7ffd9b80fe2d-7ffd9b80fe39 4043->4048 4049 7ffd9b80fe14 4044->4049 4050 7ffd9b80fe19-7ffd9b80fe1d 4044->4050 4058 7ffd9b80fdc2-7ffd9b80fdc8 4045->4058 4046->4037 4052 7ffd9b80fe42 4047->4052 4053 7ffd9b80feb6 4047->4053 4048->4046 4065 7ffd9b80fe3b 4048->4065 4049->4027 4050->4030 4051->3945 4054 7ffd9b80fe89-7ffd9b80fe8e 4051->4054 4056 7ffd9b80fea0-7ffd9b80feac 4052->4056 4057 7ffd9b80fe43-7ffd9b80fe44 4052->4057 4053->3936 4054->4060 4056->4027 4057->4035 4058->4026 4063 7ffd9b80fdca-7ffd9b80fde0 4058->4063 4060->4056 4061->4041 4063->4032 4063->4033 4065->4047
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d99596a092c6e9c37d1ef525507650ce33045f8303b6e755d11f4f5c270f6a2c
                                • Instruction ID: bb27da02ace405dd9958f42cc797166f7019fd3077cd764cc2e91138ed7d4839
                                • Opcode Fuzzy Hash: d99596a092c6e9c37d1ef525507650ce33045f8303b6e755d11f4f5c270f6a2c
                                • Instruction Fuzzy Hash: DCF10A52E0F68F0AFB3967A48C721F83A90DF25354F5A81BAD4C9C71E7ED1C75068252

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 4384 7ffd9b80f115-7ffd9b80f9a3 4390 7ffd9b80f9be 4384->4390 4391 7ffd9b80f9a5-7ffd9b80f9bd 4384->4391 4392 7ffd9b80f9bf-7ffd9b80f9c1 4390->4392 4391->4392 4393 7ffd9b80f9c2-7ffd9b80f9c7 4392->4393 4394 7ffd9b80f9ce-7ffd9b80f9d3 4393->4394 4395 7ffd9b80f9c9 4393->4395 4394->4393 4396 7ffd9b80f9d5-7ffd9b80fa01 4394->4396 4395->4394 4401 7ffd9b80fa02-7ffd9b80fa07 4396->4401 4402 7ffd9b80fa0e-7ffd9b80fa13 4401->4402 4403 7ffd9b80fa09 4401->4403 4402->4401 4404 7ffd9b80fa15-7ffd9b80fa40 4402->4404 4403->4402 4407 7ffd9b80fa49 4404->4407 4408 7ffd9b80fa4e-7ffd9b80fa53 4407->4408 4409 7ffd9b80fa42-7ffd9b80fa47 4408->4409 4410 7ffd9b80fa55-7ffd9b80fa8e 4408->4410 4409->4407 4409->4408 4414 7ffd9b80fa90 4410->4414 4415 7ffd9b80fa9b-7ffd9b80faa4 4410->4415 4414->4415 4417 7ffd9b80fa92-7ffd9b80fa94 4414->4417 4418 7ffd9b80faa6-7ffd9b80fae0 4415->4418 4417->4418 4419 7ffd9b80fa96 4417->4419 4423 7ffd9b80fae9 4418->4423 4419->4415 4424 7ffd9b80faee-7ffd9b80faf3 4423->4424 4425 7ffd9b80fae2-7ffd9b80fae7 4424->4425 4426 7ffd9b80faf5-7ffd9b80fb32 4424->4426 4425->4423 4425->4424 4430 7ffd9b80fb34-7ffd9b80fb48 4426->4430 4431 7ffd9b80fb7c-7ffd9b80fb8a 4426->4431 4432 7ffd9b80fb4d-7ffd9b80fb54 4430->4432 4436 7ffd9b80fb8c-7ffd9b80fb9f 4431->4436 4434 7ffd9b80fb5e-7ffd9b80fb65 4432->4434 4435 7ffd9b80fb56-7ffd9b80fb59 4432->4435 4437 7ffd9b80feea-7ffd9b80fefa 4434->4437 4438 7ffd9b80fb6b-7ffd9b80fb72 4434->4438 4435->4434 4447 7ffd9b80fbb1-7ffd9b80fbbf 4436->4447 4448 7ffd9b80fba1-7ffd9b80fbad 4436->4448 4442 7ffd9b80fefc-7ffd9b80ff53 4437->4442 4440 7ffd9b80fb78-7ffd9b80fb7a 4438->4440 4441 7ffd9b80feba-7ffd9b80fec1 4438->4441 4440->4431 4440->4436 4443 7ffd9b80fec3-7ffd9b80fec4 4441->4443 4444 7ffd9b80fec9-7ffd9b80fed0 4441->4444 4464 7ffd9b80ff9d-7ffd9b80ffb6 4442->4464 4465 7ffd9b80ff55-7ffd9b80ff9c 4442->4465 4443->4444 4444->4432 4446 7ffd9b80fed6-7ffd9b80fee5 4444->4446 4450 7ffd9b80fee6-7ffd9b80fee9 4446->4450 4456 7ffd9b80fbc6-7ffd9b80fbc8 4447->4456 4454 7ffd9b80fbaf-7ffd9b80fbbf 4448->4454 4455 7ffd9b80fc07-7ffd9b80fc11 4448->4455 4454->4456 4466 7ffd9b80fc42-7ffd9b80fc43 4455->4466 4467 7ffd9b80fc13-7ffd9b80fc23 4455->4467 4457 7ffd9b80fbda-7ffd9b80fbf8 4456->4457 4458 7ffd9b80fbca-7ffd9b80fbd8 4456->4458 4484 7ffd9b80fc0a-7ffd9b80fc11 4457->4484 4485 7ffd9b80fbfa-7ffd9b80fc03 4457->4485 4458->4457 4473 7ffd9b80fff8-7ffd9b810009 4464->4473 4474 7ffd9b80ffb8-7ffd9b80ffc1 4464->4474 4465->4464 4470 7ffd9b80fcc0-7ffd9b80fcce 4466->4470 4471 7ffd9b80fc44 4466->4471 4481 7ffd9b80fc35-7ffd9b80fc40 4467->4481 4482 7ffd9b80fc25-7ffd9b80fc2c 4467->4482 4486 7ffd9b80fce0-7ffd9b80fcef 4470->4486 4487 7ffd9b80fcd0-7ffd9b80fcdd 4470->4487 4475 7ffd9b80fc45-7ffd9b80fc54 4471->4475 4476 7ffd9b80fc56-7ffd9b80fc77 4471->4476 4474->4473 4475->4476 4505 7ffd9b80fc89 4476->4505 4506 7ffd9b80fc79-7ffd9b80fc80 4476->4506 4481->4476 4489 7ffd9b80fc2e-7ffd9b80fc40 4482->4489 4490 7ffd9b80fc8a-7ffd9b80fc93 4482->4490 4484->4466 4484->4467 4485->4455 4498 7ffd9b80fd01-7ffd9b80fd11 4486->4498 4499 7ffd9b80fcf1-7ffd9b80fcff 4486->4499 4502 7ffd9b80fcde 4487->4502 4489->4476 4495 7ffd9b80fc9a-7ffd9b80fca2 4490->4495 4503 7ffd9b80fcb4-7ffd9b80fcbf 4495->4503 4504 7ffd9b80fca4-7ffd9b80fcbf 4495->4504 4512 7ffd9b80fd23-7ffd9b80fd32 4498->4512 4513 7ffd9b80fd13-7ffd9b80fd32 4498->4513 4499->4498 4502->4486 4503->4470 4504->4470 4505->4490 4506->4502 4509 7ffd9b80fc82-7ffd9b80fc93 4506->4509 4509->4495 4518 7ffd9b80fd39-7ffd9b80fd3e 4512->4518 4513->4518 4521 7ffd9b80fd50-7ffd9b80fd56 4518->4521 4522 7ffd9b80fd40-7ffd9b80fd56 4518->4522 4524 7ffd9b80fd68-7ffd9b80fd80 4521->4524 4525 7ffd9b80fd58-7ffd9b80fd5b 4521->4525 4522->4524 4522->4525 4532 7ffd9b80feaf-7ffd9b80feb2 4524->4532 4533 7ffd9b80fd86-7ffd9b80fd8d 4524->4533 4527 7ffd9b80fd5d-7ffd9b80fd5e 4525->4527 4528 7ffd9b80fdd8 4525->4528 4527->4524 4531 7ffd9b80fdda-7ffd9b80fde0 4528->4531 4537 7ffd9b80fdf2-7ffd9b80fe05 4531->4537 4538 7ffd9b80fde2-7ffd9b80fde9 4531->4538 4532->4446 4536 7ffd9b80feb4-7ffd9b80feb5 4532->4536 4535 7ffd9b80fd8f-7ffd9b80fdb0 4533->4535 4550 7ffd9b80fdb7-7ffd9b80fdbb 4535->4550 4536->4441 4548 7ffd9b80fe22-7ffd9b80fe2b 4537->4548 4549 7ffd9b80fe07-7ffd9b80fe12 4537->4549 4540 7ffd9b80fe47 4538->4540 4541 7ffd9b80fdeb-7ffd9b80fdf1 4538->4541 4542 7ffd9b80fe71 4540->4542 4543 7ffd9b80fe48-7ffd9b80fe49 4540->4543 4541->4537 4546 7ffd9b80fe83-7ffd9b80fe87 4542->4546 4547 7ffd9b80fe73-7ffd9b80fe7f 4542->4547 4551 7ffd9b80fe4b-7ffd9b80fe6f 4543->4551 4546->4442 4556 7ffd9b80fe88 4546->4556 4565 7ffd9b80fe91-7ffd9b80fe9f 4547->4565 4566 7ffd9b80fe81 4547->4566 4552 7ffd9b80fe3d-7ffd9b80fe41 4548->4552 4553 7ffd9b80fe2d-7ffd9b80fe39 4548->4553 4554 7ffd9b80fe14 4549->4554 4555 7ffd9b80fe19-7ffd9b80fe1d 4549->4555 4563 7ffd9b80fdc2-7ffd9b80fdc8 4550->4563 4551->4542 4557 7ffd9b80fe42 4552->4557 4558 7ffd9b80feb6 4552->4558 4553->4551 4570 7ffd9b80fe3b 4553->4570 4554->4532 4555->4535 4556->4450 4559 7ffd9b80fe89-7ffd9b80fe8e 4556->4559 4561 7ffd9b80fea0-7ffd9b80feac 4557->4561 4562 7ffd9b80fe43-7ffd9b80fe44 4557->4562 4558->4441 4559->4565 4561->4532 4562->4540 4563->4531 4568 7ffd9b80fdca-7ffd9b80fde0 4563->4568 4565->4561 4566->4546 4568->4537 4568->4538 4570->4552
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bb32ba5da5e31a4872ebf235bed857bf6902be83418e785c61d57b55a5d480df
                                • Instruction ID: 4997d7b6ac04e73a19597c459b5f7d1f979cbf5c2ffd3133f2c0a0fcfb9a4e7f
                                • Opcode Fuzzy Hash: bb32ba5da5e31a4872ebf235bed857bf6902be83418e785c61d57b55a5d480df
                                • Instruction Fuzzy Hash: 73E13E52E0E68F0AFB3967A48C721F83690DF25358F5981B9D4C9C71E7FD1C75064292
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f5daf0458a91083084240ef486abedcadaa54b166eb286536e2deaf7b568f7ae
                                • Instruction ID: 288379b26317659ba1a3d9fe3de3438147fff01a9404c24e8135824b0437a3b2
                                • Opcode Fuzzy Hash: f5daf0458a91083084240ef486abedcadaa54b166eb286536e2deaf7b568f7ae
                                • Instruction Fuzzy Hash: BEF1C730A09A8D8FEBA8DF28C855BE937D1FF58350F04426ED85DC7295DF3899418B82
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6848d85ddca73a3e70a3fc04fb1bfb96d00eabe96311beae331458c6ce8daa73
                                • Instruction ID: f1eff1da5b5da25461d865f971862ae3d4397eebe9287b6b4bc1691b830af8a3
                                • Opcode Fuzzy Hash: 6848d85ddca73a3e70a3fc04fb1bfb96d00eabe96311beae331458c6ce8daa73
                                • Instruction Fuzzy Hash: A0E1E630A09A8D8FEBA8DF28C8557E937D1FF58350F05426ED84DC7295DF7899818B81
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b3f862c585e491404d3918205e2fac16b6d131690ec6e1fb5f32ed46031cccaa
                                • Instruction ID: 8cd29108761519edc58908d53dba41b316993657f82ef56a97200d5b88a02fa8
                                • Opcode Fuzzy Hash: b3f862c585e491404d3918205e2fac16b6d131690ec6e1fb5f32ed46031cccaa
                                • Instruction Fuzzy Hash: 26A1A062E1D51F06FB2CB7A88C622FC7180DF64369FA98178D889D21EBFE5C75074192
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e8aee36f81fbffc7196abd6df2077694f2cadce3f076a84522234e02229cf639
                                • Instruction ID: c4c88e0adfc534cac57c9e328131d062b3f9085bbb5f9a35ed729902b4c927e9
                                • Opcode Fuzzy Hash: e8aee36f81fbffc7196abd6df2077694f2cadce3f076a84522234e02229cf639
                                • Instruction Fuzzy Hash: A0510531F2E51E0AF778E7A884652F67780EF5C396F510578D88DC35F2EE1976068282
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 56cac70c8857425f0f12004f910aba54b3bb33f96d9b22eac8a93f037f4f04d7
                                • Instruction ID: 94210b3d9123eacc37ef5e384b381e6ea2208cc05c680f97f817181c4a39cf11
                                • Opcode Fuzzy Hash: 56cac70c8857425f0f12004f910aba54b3bb33f96d9b22eac8a93f037f4f04d7
                                • Instruction Fuzzy Hash: D751D631F0E54E4FEBB597A884315EA76D1DF99391F0601F9D08CC79F2EE1D69058241
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1940421002.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b800000_svchost.jbxd
                                Similarity
                                • API ID:
                                • String ID: ?L_^$L_^d
                                • API String ID: 0-1714351745
                                • Opcode ID: 41e89c5ae306d84d0b205dce78785008ee0f434e503fe855cd33712796d540a5
                                • Instruction ID: 0e9e62fdd3a6c49dcabb604b3c310b899f9cf396fb36be7829076705c18c8731
                                • Opcode Fuzzy Hash: 41e89c5ae306d84d0b205dce78785008ee0f434e503fe855cd33712796d540a5
                                • Instruction Fuzzy Hash: CDD1E50BF0E59616E325B3FD782A4FD6B60DFC23BAB1A81B7D0ED490D78C09644582D6