Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1571765
MD5:1fab11def99e3bb2401acb5dc50ce122
SHA1:8239507bb7145cace5a6f796a6f9f617c50fd2ce
SHA256:8a1f1f960a33f8280642bcc403f7511f138beb4db00bd12bbecb998e7b01735a
Tags:CoinMinerexex64user-jstrosch
Infos:

Detection

Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Disable power options
Sigma detected: Stop EventLog
System process connects to network (likely due to code injection or exploit)
Yara detected Xmrig cryptocurrency miner
AI detected suspicious sample
DNS related to crypt mining pools
Found direct / indirect Syscall (likely to bypass EDR)
Found strings related to Crypto-Mining
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Self deletion via cmd or bat file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses powercfg.exe to modify the power settings
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Creates driver files
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 6732 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 1FAB11DEF99E3BB2401ACB5DC50CE122)
    • sc.exe (PID: 6308 cmdline: C:\Windows\system32\sc.exe stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 1472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 6456 cmdline: C:\Windows\system32\sc.exe stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 4416 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 1588 cmdline: C:\Windows\system32\sc.exe stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 1672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 5536 cmdline: C:\Windows\system32\sc.exe stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 1112 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 2448 cmdline: C:\Windows\system32\sc.exe stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 6196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 5012 cmdline: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
      • conhost.exe (PID: 2304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 3660 cmdline: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
      • conhost.exe (PID: 3468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 5632 cmdline: C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
      • conhost.exe (PID: 6508 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 3816 cmdline: C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
      • conhost.exe (PID: 3544 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 4900 cmdline: C:\Windows\system32\sc.exe delete "PcHealthTool" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 3108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 5824 cmdline: C:\Windows\system32\sc.exe create "PcHealthTool" binpath= "C:\ProgramData\PcHealthTool\HealthTool.exe" start= "auto" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 5256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 3404 cmdline: C:\Windows\system32\sc.exe stop eventlog MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 3968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 1832 cmdline: C:\Windows\system32\sc.exe start "PcHealthTool" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 2324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4544 cmdline: C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\file.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 5996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • choice.exe (PID: 3000 cmdline: choice /C Y /N /D Y /T 3 MD5: 1A9804F0C374283B094E9E55DC5EE128)
  • HealthTool.exe (PID: 2020 cmdline: C:\ProgramData\PcHealthTool\HealthTool.exe MD5: 1FAB11DEF99E3BB2401ACB5DC50CE122)
    • sc.exe (PID: 5960 cmdline: C:\Windows\system32\sc.exe stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 3260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 1764 cmdline: C:\Windows\system32\sc.exe stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 3048 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 2948 cmdline: C:\Windows\system32\sc.exe stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 1672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 3328 cmdline: C:\Windows\system32\sc.exe stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 5176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 2720 cmdline: C:\Windows\system32\sc.exe stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 5800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 2304 cmdline: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
      • conhost.exe (PID: 6492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 2724 cmdline: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
      • conhost.exe (PID: 6516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 4196 cmdline: C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
      • conhost.exe (PID: 3108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 5916 cmdline: C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
      • conhost.exe (PID: 2444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • conhost.exe (PID: 6556 cmdline: C:\Windows\system32\conhost.exe MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • explorer.exe (PID: 4620 cmdline: explorer.exe MD5: 662F4F92FDE3557E86D110526BB578D5)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
00000034.00000002.4589900423.0000000001064000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    00000034.00000002.4589900423.000000000107E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      00000034.00000003.2323562707.000000000107F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
        00000034.00000002.4589900423.00000000010BB000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
          00000034.00000003.3263289334.00000000010BC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            30.3.HealthTool.exe.880000.2.raw.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
              30.3.HealthTool.exe.880000.2.raw.unpackMacOS_Cryptominer_Xmrig_241780a1unknownunknown
              • 0x36fe08:$a1: mining.set_target
              • 0x362030:$a2: XMRIG_HOSTNAME
              • 0x3649a8:$a3: Usage: xmrig [OPTIONS]
              • 0x362008:$a4: XMRIG_VERSION
              30.3.HealthTool.exe.880000.2.raw.unpackMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
              • 0x3b5561:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
              30.3.HealthTool.exe.880000.2.raw.unpackMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
              • 0x3b5dd8:$s1: %s/%s (Windows NT %lu.%lu
              • 0x3b9400:$s3: \\.\WinRing0_
              • 0x366fa8:$s4: pool_wallet
              • 0x3613d8:$s5: cryptonight
              • 0x3613e8:$s5: cryptonight
              • 0x3613f8:$s5: cryptonight
              • 0x361408:$s5: cryptonight
              • 0x361420:$s5: cryptonight
              • 0x361430:$s5: cryptonight
              • 0x361440:$s5: cryptonight
              • 0x361458:$s5: cryptonight
              • 0x361468:$s5: cryptonight
              • 0x361480:$s5: cryptonight
              • 0x361498:$s5: cryptonight
              • 0x3614a8:$s5: cryptonight
              • 0x3614b8:$s5: cryptonight
              • 0x3614c8:$s5: cryptonight
              • 0x3614e0:$s5: cryptonight
              • 0x3614f8:$s5: cryptonight
              • 0x361508:$s5: cryptonight
              • 0x361518:$s5: cryptonight
              30.3.HealthTool.exe.880000.2.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                Click to see the 3 entries

                Change of critical system settings

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0, CommandLine: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0, CommandLine|base64offset|contains: , Image: C:\Windows\System32\powercfg.exe, NewProcessName: C:\Windows\System32\powercfg.exe, OriginalFileName: C:\Windows\System32\powercfg.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 6732, ParentProcessName: file.exe, ProcessCommandLine: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0, ProcessId: 5012, ProcessName: powercfg.exe

                System Summary

                barindex
                Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: C:\Windows\system32\sc.exe create "PcHealthTool" binpath= "C:\ProgramData\PcHealthTool\HealthTool.exe" start= "auto", CommandLine: C:\Windows\system32\sc.exe create "PcHealthTool" binpath= "C:\ProgramData\PcHealthTool\HealthTool.exe" start= "auto", CommandLine|base64offset|contains: r, Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 6732, ParentProcessName: file.exe, ProcessCommandLine: C:\Windows\system32\sc.exe create "PcHealthTool" binpath= "C:\ProgramData\PcHealthTool\HealthTool.exe" start= "auto", ProcessId: 5824, ProcessName: sc.exe

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\sc.exe stop eventlog, CommandLine: C:\Windows\system32\sc.exe stop eventlog, CommandLine|base64offset|contains: ), Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 6732, ParentProcessName: file.exe, ProcessCommandLine: C:\Windows\system32\sc.exe stop eventlog, ProcessId: 3404, ProcessName: sc.exe
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeReversingLabs: Detection: 68%
                Source: file.exeReversingLabs: Detection: 68%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeJoe Sandbox ML: detected
                Source: file.exeJoe Sandbox ML: detected

                Bitcoin Miner

                barindex
                Source: Yara matchFile source: 30.3.HealthTool.exe.880000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 30.3.HealthTool.exe.880000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000034.00000002.4589900423.0000000001064000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000034.00000002.4589900423.000000000107E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000034.00000003.2323562707.000000000107F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000034.00000002.4589900423.00000000010BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000034.00000003.3263289334.00000000010BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000034.00000002.4589900423.0000000001029000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: HealthTool.exe PID: 2020, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4620, type: MEMORYSTR
                Source: unknownDNS query: name: xmr-eu1.nanopool.org
                Source: HealthTool.exe, 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: stratum+tcp://
                Source: HealthTool.exe, 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: cryptonight/0
                Source: HealthTool.exe, 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: -o, --url=URL URL of mining server
                Source: HealthTool.exe, 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: stratum+tcp://
                Source: HealthTool.exe, 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
                Source: HealthTool.exe, 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
                Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: HealthTool.exe, 0000001E.00000003.2320618328.00000000001B0000.00000004.00000001.00020000.00000000.sdmp, czpmohhvqtjj.sys.30.dr

                Networking

                barindex
                Source: C:\Windows\explorer.exeNetwork Connect: 54.37.137.114 10343Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:49718 -> 54.37.137.114:10343
                Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: xmr-eu1.nanopool.org
                Source: explorer.exe, 00000034.00000002.4589900423.000000000107E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000002.4589900423.00000000010BB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000003.3263289334.00000000010BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.cloudflare.com/origin_ca.crl
                Source: explorer.exe, 00000034.00000003.3263335407.00000000010AE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000002.4589900423.000000000107E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.cloudflare.com/origin_ca.crl0
                Source: HealthTool.exe, 0000001E.00000003.2320618328.00000000001B0000.00000004.00000001.00020000.00000000.sdmp, czpmohhvqtjj.sys.30.drString found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0
                Source: HealthTool.exe, 0000001E.00000003.2320618328.00000000001B0000.00000004.00000001.00020000.00000000.sdmp, czpmohhvqtjj.sys.30.drString found in binary or memory: http://crl.globalsign.net/Root.crl0
                Source: HealthTool.exe, 0000001E.00000003.2320618328.00000000001B0000.00000004.00000001.00020000.00000000.sdmp, czpmohhvqtjj.sys.30.drString found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0
                Source: HealthTool.exe, 0000001E.00000003.2320618328.00000000001B0000.00000004.00000001.00020000.00000000.sdmp, czpmohhvqtjj.sys.30.drString found in binary or memory: http://crl.globalsign.net/primobject.crl0
                Source: explorer.exe, 00000034.00000002.4589900423.000000000107E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.cloudflare.com/origin_ca
                Source: explorer.exe, 00000034.00000003.3263335407.00000000010AE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000002.4589900423.000000000107E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.cloudflare.com/origin_ca0
                Source: HealthTool.exe, 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://xmrig.com/docs/algorithms

                System Summary

                barindex
                Source: 30.3.HealthTool.exe.880000.2.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: 30.3.HealthTool.exe.880000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                Source: 30.3.HealthTool.exe.880000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                Source: 30.3.HealthTool.exe.880000.2.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: 30.3.HealthTool.exe.880000.2.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                Source: 30.3.HealthTool.exe.880000.2.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                Source: 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                Source: 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects coinmining malware Author: ditekSHen
                Source: Process Memory Space: HealthTool.exe PID: 2020, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: file.exeStatic PE information: section name: .Jb)
                Source: file.exeStatic PE information: section name: .-Dk
                Source: HealthTool.exe.0.drStatic PE information: section name: .Jb)
                Source: HealthTool.exe.0.drStatic PE information: section name: .-Dk
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
                Source: C:\Windows\System32\conhost.exeCode function: 50_2_0000000140001394 NtCreateSectionEx,50_2_0000000140001394
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeFile created: C:\Windows\TEMP\czpmohhvqtjj.sysJump to behavior
                Source: C:\Windows\System32\conhost.exeCode function: 50_2_000000014000316050_2_0000000140003160
                Source: C:\Windows\System32\conhost.exeCode function: 50_2_00000001400026E050_2_00000001400026E0
                Source: Joe Sandbox ViewDropped File: C:\Windows\Temp\czpmohhvqtjj.sys 11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                Source: 30.3.HealthTool.exe.880000.2.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: 30.3.HealthTool.exe.880000.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                Source: 30.3.HealthTool.exe.880000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                Source: 30.3.HealthTool.exe.880000.2.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: 30.3.HealthTool.exe.880000.2.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                Source: 30.3.HealthTool.exe.880000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                Source: 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                Source: 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                Source: Process Memory Space: HealthTool.exe PID: 2020, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: czpmohhvqtjj.sys.30.drBinary string: \Device\WinRing0_1_2_0
                Source: classification engineClassification label: mal100.spyw.evad.mine.winEXE@75/2@1/1
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6196:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1472:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4416:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:3260:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3108:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6516:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3968:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:1672:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5996:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5176:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2324:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:3048:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5800:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:2444:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6508:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:3108:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5256:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6492:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1112:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3544:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1672:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3468:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2304:120:WilError_03
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeFile created: C:\Windows\TEMP\czpmohhvqtjj.sysJump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\explorer.exe
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\explorer.exeJump to behavior
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: file.exeReversingLabs: Detection: 68%
                Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "PcHealthTool"
                Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "PcHealthTool" binpath= "C:\ProgramData\PcHealthTool\HealthTool.exe" start= "auto"
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "PcHealthTool"
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\file.exe"
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\ProgramData\PcHealthTool\HealthTool.exe C:\ProgramData\PcHealthTool\HealthTool.exe
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\choice.exe choice /C Y /N /D Y /T 3
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe
                Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\explorer.exe explorer.exe
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvcJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvcJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauservJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bitsJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvcJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "PcHealthTool"Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "PcHealthTool" binpath= "C:\ProgramData\PcHealthTool\HealthTool.exe" start= "auto"Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlogJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "PcHealthTool"Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\file.exe"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvcJump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvcJump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauservJump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bitsJump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvcJump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exeJump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\explorer.exe explorer.exeJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\choice.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
                Source: file.exeStatic PE information: Image base 0x140000000 > 0x60000000
                Source: file.exeStatic file information: File size 5268480 > 1048576
                Source: file.exeStatic PE information: Raw size of .6.2 is bigger than: 0x100000 < 0x505a00
                Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: HealthTool.exe, 0000001E.00000003.2320618328.00000000001B0000.00000004.00000001.00020000.00000000.sdmp, czpmohhvqtjj.sys.30.dr
                Source: initial sampleStatic PE information: section where entry point is pointing to: .6.2
                Source: file.exeStatic PE information: section name: .00cfg
                Source: file.exeStatic PE information: section name: .Jb)
                Source: file.exeStatic PE information: section name: .-Dk
                Source: file.exeStatic PE information: section name: .6.2
                Source: HealthTool.exe.0.drStatic PE information: section name: .00cfg
                Source: HealthTool.exe.0.drStatic PE information: section name: .Jb)
                Source: HealthTool.exe.0.drStatic PE information: section name: .-Dk
                Source: HealthTool.exe.0.drStatic PE information: section name: .6.2
                Source: C:\Windows\System32\conhost.exeCode function: 50_2_0000000140001394 push qword ptr [0000000140008004h]; ret 50_2_0000000140001403

                Persistence and Installation Behavior

                barindex
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeFile created: C:\Windows\TEMP\czpmohhvqtjj.sysJump to behavior
                Source: C:\Users\user\Desktop\file.exeFile created: C:\ProgramData\PcHealthTool\HealthTool.exeJump to dropped file
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeFile created: C:\Windows\Temp\czpmohhvqtjj.sysJump to dropped file
                Source: C:\Users\user\Desktop\file.exeFile created: C:\ProgramData\PcHealthTool\HealthTool.exeJump to dropped file
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeFile created: C:\Windows\Temp\czpmohhvqtjj.sysJump to dropped file
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\file.exe"
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\file.exe"Jump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\explorer.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: explorer.exe, 00000034.00000002.4589900423.00000000010BB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000003.3263289334.00000000010BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
                Source: explorer.exe, 00000034.00000003.2323562707.000000000107F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXEOORAFPQNOCZNXGSA
                Source: explorer.exe, 00000034.00000002.4589900423.0000000001064000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: --CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE
                Source: explorer.exe, 00000034.00000002.4589900423.00000000010BB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000003.3263289334.00000000010BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXEC
                Source: explorer.exe, 00000034.00000002.4589900423.0000000001064000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: EXPLORER.EXE--ALGO=RX/0--URL=XMR-EU1.NANOPOOL.ORG:10343--USER=48EZR9SZUQGF2S1GXVTKPEDREHZ6WPJX3KKSG6ZXMI447NKY7LQEN4P7YE13TKW7G3KGDKP5Q3C47ZUSQPSSXZA27TT3Z82.HERONWATER--PASS=HERONWATER--CPU-MAX-THREADS-HINT=50--CINIT-WINRING=CZPMOHHVQTJJ.SYS--RANDOMX-NO-RDMSR--CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE--CINIT-VERSION=3.4.1--TLS--CINIT-IDLE-WAIT=1--CINIT-IDLE-CPU=100--CINIT-ID=OORAFPQNOCZNXGSA
                Source: explorer.exe, 00000034.00000002.4589900423.0000000001064000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: --ALGO=RX/0 --URL=XMR-EU1.NANOPOOL.ORG:10343 --USER="48EZR9SZUQGF2S1GXVTKPEDREHZ6WPJX3KKSG6ZXMI447NKY7LQEN4P7YE13TKW7G3KGDKP5Q3C47ZUSQPSSXZA27TT3Z82.HERONWATER" --PASS="HERONWATER" --CPU-MAX-THREADS-HINT=50 --CINIT-WINRING="CZPMOHHVQTJJ.SYS" --RANDOMX-NO-RDMSR --CINIT-STEALTH-TARGETS="TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE" --CINIT-VERSION="3.4.1" --TLS --CINIT-IDLE-WAIT=1 --CINIT-IDLE-CPU=100 --CINIT-ID="OORAFPQNOCZNXGSA"
                Source: explorer.exe, 00000034.00000002.4589900423.0000000001064000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000002.4589900423.00000000010BB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000003.2323562707.000000000107F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000003.3263289334.00000000010BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeDropped PE file which has not been started: C:\Windows\Temp\czpmohhvqtjj.sysJump to dropped file
                Source: C:\Windows\System32\conhost.exeAPI coverage: 0.9 %
                Source: C:\Windows\explorer.exe TID: 5256Thread sleep count: 110 > 30Jump to behavior
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: explorer.exe, 00000034.00000002.4589900423.000000000107E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000002.4589900423.0000000001029000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: C:\Windows\explorer.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\System32\conhost.exeCode function: 50_2_0000000140001160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,50_2_0000000140001160

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeNetwork Connect: 54.37.137.114 10343Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeNtProtectVirtualMemory: Direct from: 0x140B64CCDJump to behavior
                Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x1407C4F62Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x1407C212AJump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeNtProtectVirtualMemory: Direct from: 0x1407A590DJump to behavior
                Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x1407ADF8BJump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeNtProtectVirtualMemory: Direct from: 0x140B64D5CJump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeNtProtectVirtualMemory: Direct from: 0x1407B6216Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x140BEBAD8Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeNtProtectVirtualMemory: Direct from: 0x1407C3AF1Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeNtProtectVirtualMemory: Direct from: 0x1407BBE1AJump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeNtProtectVirtualMemory: Direct from: 0x1407C4F4EJump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeNtProtectVirtualMemory: Direct from: 0x140785D0FJump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeNtProtectVirtualMemory: Direct from: 0x140777285Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeNtProtectVirtualMemory: Direct from: 0x1407DA9E5Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x140BF6D5AJump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeMemory written: PID: 4620 base: 140000000 value: 4DJump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeMemory written: PID: 4620 base: 140001000 value: 40Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeMemory written: PID: 4620 base: 140360000 value: 00Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeMemory written: PID: 4620 base: 1404C8000 value: 20Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeMemory written: PID: 4620 base: 1407FB000 value: 00Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeMemory written: PID: 4620 base: 14081B000 value: 48Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeMemory written: PID: 4620 base: 14081C000 value: 48Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeMemory written: PID: 4620 base: 14081F000 value: 48Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeMemory written: PID: 4620 base: 140821000 value: CEJump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeMemory written: PID: 4620 base: 140822000 value: 00Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeMemory written: PID: 4620 base: 140823000 value: 00Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeMemory written: PID: 4620 base: F19010 value: 00Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeThread register set: target process: 6556Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeThread register set: target process: 4620Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exeJump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\explorer.exe explorer.exeJump to behavior
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Lowering of HIPS / PFW / Operating System Security Settings

                barindex
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0Jump to behavior
                Source: C:\ProgramData\PcHealthTool\HealthTool.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0Jump to behavior
                Source: explorer.exe, 00000034.00000002.4589900423.00000000010BB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000003.3263289334.00000000010BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procexp.exe
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                Windows Management Instrumentation
                11
                Windows Service
                11
                Windows Service
                1
                Masquerading
                OS Credential Dumping321
                Security Software Discovery
                Remote Services1
                Archive Collected Data
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Service Execution
                1
                DLL Side-Loading
                311
                Process Injection
                12
                Virtualization/Sandbox Evasion
                LSASS Memory12
                Virtualization/Sandbox Evasion
                Remote Desktop ProtocolData from Removable Media1
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                Abuse Elevation Control Mechanism
                311
                Process Injection
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin SharesData from Network Shared Drive1
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                NTDS3
                System Information Discovery
                Distributed Component Object ModelInput Capture1
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Obfuscated Files or Information
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                File Deletion
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1571765 Sample: file.exe Startdate: 09/12/2024 Architecture: WINDOWS Score: 100 54 xmr-eu1.nanopool.org 2->54 58 Malicious sample detected (through community Yara rule) 2->58 60 Multi AV Scanner detection for submitted file 2->60 62 Yara detected Xmrig cryptocurrency miner 2->62 66 5 other signatures 2->66 8 HealthTool.exe 1 2->8         started        12 file.exe 2 2->12         started        signatures3 64 DNS related to crypt mining pools 54->64 process4 file5 50 C:\Windows\Temp\czpmohhvqtjj.sys, PE32+ 8->50 dropped 68 Multi AV Scanner detection for dropped file 8->68 70 Machine Learning detection for dropped file 8->70 72 Found strings related to Crypto-Mining 8->72 80 4 other signatures 8->80 14 explorer.exe 8->14         started        18 powercfg.exe 1 8->18         started        20 powercfg.exe 1 8->20         started        28 8 other processes 8->28 52 C:\ProgramData\PcHealthTool\HealthTool.exe, PE32+ 12->52 dropped 74 Self deletion via cmd or bat file 12->74 76 Uses powercfg.exe to modify the power settings 12->76 78 Found direct / indirect Syscall (likely to bypass EDR) 12->78 22 cmd.exe 1 12->22         started        24 powercfg.exe 1 12->24         started        26 powercfg.exe 1 12->26         started        30 11 other processes 12->30 signatures6 process7 dnsIp8 56 54.37.137.114, 10343, 49718 OVHFR France 14->56 82 System process connects to network (likely due to code injection or exploit) 14->82 84 Query firmware table information (likely to detect VMs) 14->84 86 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 14->86 32 conhost.exe 18->32         started        34 conhost.exe 20->34         started        44 2 other processes 22->44 36 conhost.exe 24->36         started        38 conhost.exe 26->38         started        46 7 other processes 28->46 40 conhost.exe 30->40         started        42 conhost.exe 30->42         started        48 9 other processes 30->48 signatures9 process10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                file.exe68%ReversingLabsWin64.Trojan.Miner
                file.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\ProgramData\PcHealthTool\HealthTool.exe100%Joe Sandbox ML
                C:\ProgramData\PcHealthTool\HealthTool.exe68%ReversingLabsWin64.Trojan.Miner
                C:\Windows\Temp\czpmohhvqtjj.sys5%ReversingLabs
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                xmr-eu1.nanopool.org
                54.37.232.103
                truefalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://crl.cloudflare.com/origin_ca.crl0explorer.exe, 00000034.00000003.3263335407.00000000010AE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000002.4589900423.000000000107E000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://ocsp.cloudflare.com/origin_caexplorer.exe, 00000034.00000002.4589900423.000000000107E000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://ocsp.cloudflare.com/origin_ca0explorer.exe, 00000034.00000003.3263335407.00000000010AE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000002.4589900423.000000000107E000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://crl.cloudflare.com/origin_ca.crlexplorer.exe, 00000034.00000002.4589900423.000000000107E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000002.4589900423.00000000010BB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000003.3263289334.00000000010BC000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://xmrig.com/docs/algorithmsHealthTool.exe, 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            54.37.137.114
                            unknownFrance
                            16276OVHFRtrue
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1571765
                            Start date and time:2024-12-09 17:31:30 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 8m 17s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:55
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:file.exe
                            Detection:MAL
                            Classification:mal100.spyw.evad.mine.winEXE@75/2@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 1
                            • Number of non-executed functions: 10
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                            • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.63
                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: file.exe
                            No simulations
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            54.37.137.114file.exeGet hashmaliciousXmrigBrowse
                              SecuriteInfo.com.Trojan.Siggen29.54948.7115.19193.exeGet hashmaliciousXmrigBrowse
                                ft1i6jvAdD.exeGet hashmaliciousXmrigBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  xmr-eu1.nanopool.orgnlGOh9K5X5.exeGet hashmaliciousXmrigBrowse
                                  • 51.15.58.224
                                  LfHJdrALlh.exeGet hashmaliciousXmrigBrowse
                                  • 51.15.58.224
                                  rLaC8kO1rD.exeGet hashmaliciousXmrigBrowse
                                  • 51.15.65.182
                                  6xQ8CMUaES.exeGet hashmaliciousXmrigBrowse
                                  • 51.89.23.91
                                  4o8Tgrb384.exeGet hashmaliciousXmrigBrowse
                                  • 51.15.65.182
                                  rtYpMDeKUq.exeGet hashmaliciousXmrigBrowse
                                  • 51.89.23.91
                                  NH95Vhokye.exeGet hashmaliciousXmrigBrowse
                                  • 54.37.137.114
                                  ahlntQUj2t.exeGet hashmaliciousXmrigBrowse
                                  • 54.37.232.103
                                  file.exeGet hashmaliciousXmrigBrowse
                                  • 163.172.154.142
                                  HmA7s2gaa5.exeGet hashmaliciousXmrigBrowse
                                  • 162.19.224.121
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  OVHFRmeerkat.x86.elfGet hashmaliciousMiraiBrowse
                                  • 51.75.58.225
                                  main_x86.dllGet hashmaliciousUnknownBrowse
                                  • 37.59.132.162
                                  main_x86.dllGet hashmaliciousUnknownBrowse
                                  • 37.59.132.162
                                  arm.elfGet hashmaliciousUnknownBrowse
                                  • 51.81.244.20
                                  jmhgeojeri.elfGet hashmaliciousUnknownBrowse
                                  • 188.165.97.109
                                  home.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
                                  • 213.32.50.240
                                  home.ppc.elfGet hashmaliciousMiraiBrowse
                                  • 51.178.95.193
                                  home.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                  • 46.105.5.101
                                  home.m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
                                  • 164.132.7.19
                                  jew.arm7.elfGet hashmaliciousMiraiBrowse
                                  • 192.99.71.222
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  C:\Windows\Temp\czpmohhvqtjj.sysStep 3 - Setup_Install.exeGet hashmaliciousXmrigBrowse
                                    Step 3 - Setup_Install.exeGet hashmaliciousXmrigBrowse
                                      file.exeGet hashmaliciousDarkVision Rat, XmrigBrowse
                                        IYXE4Uz61k.exeGet hashmaliciousDCRat, PureLog Stealer, Xmrig, zgRATBrowse
                                          file.exeGet hashmaliciousAmadey, DCRat, DarkVision Rat, LummaC Stealer, Stealc, VidarBrowse
                                            file.exeGet hashmaliciousDarkVision Rat, XmrigBrowse
                                              nlGOh9K5X5.exeGet hashmaliciousXmrigBrowse
                                                LfHJdrALlh.exeGet hashmaliciousXmrigBrowse
                                                  iKvzvknzW1.exeGet hashmaliciousXmrigBrowse
                                                    2zirzlMVqX.batGet hashmaliciousXmrigBrowse
                                                      Process:C:\Users\user\Desktop\file.exe
                                                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):5268480
                                                      Entropy (8bit):7.977273259993024
                                                      Encrypted:false
                                                      SSDEEP:98304:+Y3VyfY4qJnswUj0YPE2+tki8VcV3QMzyaogtIti+799+Ikde8ex8xcJs:+TsuM2PQ7ogn+799+xdAJs
                                                      MD5:1FAB11DEF99E3BB2401ACB5DC50CE122
                                                      SHA1:8239507BB7145CACE5A6F796A6F9F617C50FD2CE
                                                      SHA-256:8A1F1F960A33F8280642BCC403F7511F138BEB4DB00BD12BBECB998E7B01735A
                                                      SHA-512:A29CE741022E8184B139EF2A0916C3E6CEDEDE461CC7B0D3AC8FD2540C7452E301AD1B2E4E14D5944816789DC212EB376709A461D59C957F3AE35F495D14D98A
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 68%
                                                      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...../g..........#..........(l.......w........@.............................`............ .................................................p.v.P...........PU..<.............................................(....T..8.............u.X............................text...F........................... ..`.rdata..............................@..@.data.....l.........................@....pdata........l.....................@..@.00cfg........l.....................@..@.tls..........m.....................@....Jb)..........m..................... ..`.-Dk..........u.....................@....6.2.....XP...v..ZP.................`..h................................................................................................................................................................................................................................................................
                                                      Process:C:\ProgramData\PcHealthTool\HealthTool.exe
                                                      File Type:PE32+ executable (native) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):14544
                                                      Entropy (8bit):6.2660301556221185
                                                      Encrypted:false
                                                      SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                                      MD5:0C0195C48B6B8582FA6F6373032118DA
                                                      SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                                      SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                                      SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 5%
                                                      Joe Sandbox View:
                                                      • Filename: Step 3 - Setup_Install.exe, Detection: malicious, Browse
                                                      • Filename: Step 3 - Setup_Install.exe, Detection: malicious, Browse
                                                      • Filename: file.exe, Detection: malicious, Browse
                                                      • Filename: IYXE4Uz61k.exe, Detection: malicious, Browse
                                                      • Filename: file.exe, Detection: malicious, Browse
                                                      • Filename: file.exe, Detection: malicious, Browse
                                                      • Filename: nlGOh9K5X5.exe, Detection: malicious, Browse
                                                      • Filename: LfHJdrALlh.exe, Detection: malicious, Browse
                                                      • Filename: iKvzvknzW1.exe, Detection: malicious, Browse
                                                      • Filename: 2zirzlMVqX.bat, Detection: malicious, Browse
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                                      File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                      Entropy (8bit):7.977273259993024
                                                      TrID:
                                                      • Win64 Executable GUI (202006/5) 92.65%
                                                      • Win64 Executable (generic) (12005/4) 5.51%
                                                      • Generic Win/DOS Executable (2004/3) 0.92%
                                                      • DOS Executable Generic (2002/1) 0.92%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:file.exe
                                                      File size:5'268'480 bytes
                                                      MD5:1fab11def99e3bb2401acb5dc50ce122
                                                      SHA1:8239507bb7145cace5a6f796a6f9f617c50fd2ce
                                                      SHA256:8a1f1f960a33f8280642bcc403f7511f138beb4db00bd12bbecb998e7b01735a
                                                      SHA512:a29ce741022e8184b139ef2a0916c3e6cedede461cc7b0d3ac8fd2540c7452e301ad1b2e4e14d5944816789dc212eb376709a461d59c957f3ae35f495d14d98a
                                                      SSDEEP:98304:+Y3VyfY4qJnswUj0YPE2+tki8VcV3QMzyaogtIti+799+Ikde8ex8xcJs:+TsuM2PQ7ogn+799+xdAJs
                                                      TLSH:E33623A1168977FCD426C334A1C2B89F71FA3BB598518728D279F9179F3268D1C3222D
                                                      File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...../g..........#..........(l.......w........@.............................`............ ........................................
                                                      Icon Hash:00928e8e8686b000
                                                      Entrypoint:0x14077fe80
                                                      Entrypoint Section:.6.2
                                                      Digitally signed:false
                                                      Imagebase:0x140000000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                      DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x672FDAD7 [Sat Nov 9 21:57:43 2024 UTC]
                                                      TLS Callbacks:0x407b7f2a, 0x1, 0x40001760, 0x1, 0x400017e0, 0x1
                                                      CLR (.Net) Version:
                                                      OS Version Major:6
                                                      OS Version Minor:0
                                                      File Version Major:6
                                                      File Version Minor:0
                                                      Subsystem Version Major:6
                                                      Subsystem Version Minor:0
                                                      Import Hash:ba3659f02ec8d63edf96b7bfef12b632
                                                      Instruction
                                                      push ecx
                                                      dec eax
                                                      mov ecx, 5D16D38Eh
                                                      sbb dword ptr [ecx-6Dh], ebx
                                                      pop esi
                                                      pushfd
                                                      sub cx, 14ABh
                                                      sub cx, cx
                                                      or ecx, 0D28FEB8h
                                                      inc ecx
                                                      push eax
                                                      jc 00007FB150FB537Eh
                                                      dec eax
                                                      mov ecx, dword ptr [esp+ecx-5D3EFEA8h]
                                                      dec eax
                                                      mov dword ptr [esp+10h], 70377F27h
                                                      push dword ptr [esp+08h]
                                                      popfd
                                                      dec eax
                                                      lea esp, dword ptr [esp+10h]
                                                      call 00007FB151486B89h
                                                      inc esi
                                                      mov esi, 2D5DA5F8h
                                                      aam DAh
                                                      dec esp
                                                      mov esp, 2366004Ah
                                                      retf
                                                      arpl word ptr [edx], cx
                                                      wait
                                                      sbb dl, byte ptr [edx+74h]
                                                      out 10h, al
                                                      mov ch, 9Dh
                                                      cmp ah, ah
                                                      mov ch, B4h
                                                      and al, 92h
                                                      sbb dh, bh
                                                      inc esi
                                                      sub edi, dword ptr [ebx-636D72AEh]
                                                      xchg eax, esp
                                                      shl bl, 00000022h
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x76b2700x50.6.2
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0xc655500x33c.6.2
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0xb69ee80x28.6.2
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xc654100x138.6.2
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x75f0000x58.-Dk
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x88460x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0xa0000x1f8c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0xc0000x6c11000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .pdata0x6ce0000x18c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .00cfg0x6cf0000x100x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .tls0x6d00000x100x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .Jb)0x6d10000x8da190x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .-Dk0x75f0000x4c80x6009c30f74cc9322c80d8e135a6f8abae04False0.03515625data0.18205531782765003IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .6.20x7600000x50588c0x505a00d6355a9ffd8a941b11f0f715e22d635cunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      DLLImport
                                                      msvcrt.dll__C_specific_handler
                                                      KERNEL32.dllDeleteCriticalSection
                                                      KERNEL32.dllHeapAlloc, HeapFree, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 9, 2024 17:32:42.222912073 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:32:42.342423916 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:32:42.345088959 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:32:42.345427990 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:32:42.464816093 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:32:43.631052017 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:32:43.631680965 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:32:43.631721020 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:32:43.632280111 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:32:43.751672983 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:32:44.045660019 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:32:44.098526955 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:32:44.281917095 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:32:44.332896948 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:32:48.366364002 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:32:48.411072016 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:32:58.470010996 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:32:58.645493031 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:33:08.489124060 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:33:08.645590067 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:33:18.481764078 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:33:18.708060026 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:33:28.497442007 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:33:28.692353964 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:33:38.536130905 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:33:38.656503916 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:33:48.540849924 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:33:48.692481041 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:33:49.438735962 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:33:49.504954100 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:33:59.438249111 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:33:59.504893064 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:34:09.465811014 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:34:09.708056927 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:34:19.481060982 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:34:19.692457914 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:34:29.480021954 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:34:29.598721981 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:34:39.473238945 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:34:39.591814041 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:34:49.489598989 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:34:49.692486048 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:34:59.490956068 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:34:59.708137035 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:35:09.532536983 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:35:09.708159924 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:35:19.522521973 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:35:19.708137989 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:35:29.607187986 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:35:29.692550898 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:35:39.610670090 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:35:39.692567110 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:35:49.562283039 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:35:49.689676046 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:36:00.558968067 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:36:00.708303928 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:36:10.549938917 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:36:10.692640066 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:36:20.583545923 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:36:20.708352089 CET4971810343192.168.2.654.37.137.114
                                                      Dec 9, 2024 17:36:30.579308033 CET103434971854.37.137.114192.168.2.6
                                                      Dec 9, 2024 17:36:30.623529911 CET4971810343192.168.2.654.37.137.114
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 9, 2024 17:32:42.081123114 CET5397353192.168.2.61.1.1.1
                                                      Dec 9, 2024 17:32:42.220264912 CET53539731.1.1.1192.168.2.6
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Dec 9, 2024 17:32:42.081123114 CET192.168.2.61.1.1.10x8768Standard query (0)xmr-eu1.nanopool.orgA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Dec 9, 2024 17:32:42.220264912 CET1.1.1.1192.168.2.60x8768No error (0)xmr-eu1.nanopool.org54.37.232.103A (IP address)IN (0x0001)false
                                                      Dec 9, 2024 17:32:42.220264912 CET1.1.1.1192.168.2.60x8768No error (0)xmr-eu1.nanopool.org212.47.253.124A (IP address)IN (0x0001)false
                                                      Dec 9, 2024 17:32:42.220264912 CET1.1.1.1192.168.2.60x8768No error (0)xmr-eu1.nanopool.org51.15.58.224A (IP address)IN (0x0001)false
                                                      Dec 9, 2024 17:32:42.220264912 CET1.1.1.1192.168.2.60x8768No error (0)xmr-eu1.nanopool.org51.15.193.130A (IP address)IN (0x0001)false
                                                      Dec 9, 2024 17:32:42.220264912 CET1.1.1.1192.168.2.60x8768No error (0)xmr-eu1.nanopool.org163.172.154.142A (IP address)IN (0x0001)false
                                                      Dec 9, 2024 17:32:42.220264912 CET1.1.1.1192.168.2.60x8768No error (0)xmr-eu1.nanopool.org162.19.224.121A (IP address)IN (0x0001)false
                                                      Dec 9, 2024 17:32:42.220264912 CET1.1.1.1192.168.2.60x8768No error (0)xmr-eu1.nanopool.org51.89.23.91A (IP address)IN (0x0001)false
                                                      Dec 9, 2024 17:32:42.220264912 CET1.1.1.1192.168.2.60x8768No error (0)xmr-eu1.nanopool.org51.15.65.182A (IP address)IN (0x0001)false
                                                      Dec 9, 2024 17:32:42.220264912 CET1.1.1.1192.168.2.60x8768No error (0)xmr-eu1.nanopool.org141.94.23.83A (IP address)IN (0x0001)false
                                                      Dec 9, 2024 17:32:42.220264912 CET1.1.1.1192.168.2.60x8768No error (0)xmr-eu1.nanopool.org146.59.154.106A (IP address)IN (0x0001)false
                                                      Dec 9, 2024 17:32:42.220264912 CET1.1.1.1192.168.2.60x8768No error (0)xmr-eu1.nanopool.org54.37.137.114A (IP address)IN (0x0001)false

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:11:32:20
                                                      Start date:09/12/2024
                                                      Path:C:\Users\user\Desktop\file.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Users\user\Desktop\file.exe"
                                                      Imagebase:0x140000000
                                                      File size:5'268'480 bytes
                                                      MD5 hash:1FAB11DEF99E3BB2401ACB5DC50CE122
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:2
                                                      Start time:11:32:30
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\sc.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\sc.exe stop UsoSvc
                                                      Imagebase:0x7ff630a40000
                                                      File size:72'192 bytes
                                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:11:32:30
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:4
                                                      Start time:11:32:30
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\sc.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                      Imagebase:0x7ff630a40000
                                                      File size:72'192 bytes
                                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:5
                                                      Start time:11:32:30
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:6
                                                      Start time:11:32:30
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\sc.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\sc.exe stop wuauserv
                                                      Imagebase:0x7ff630a40000
                                                      File size:72'192 bytes
                                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:7
                                                      Start time:11:32:30
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:8
                                                      Start time:11:32:30
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\sc.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\sc.exe stop bits
                                                      Imagebase:0x7ff630a40000
                                                      File size:72'192 bytes
                                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:9
                                                      Start time:11:32:30
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:10
                                                      Start time:11:32:30
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\sc.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\sc.exe stop dosvc
                                                      Imagebase:0x7ff630a40000
                                                      File size:72'192 bytes
                                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:11
                                                      Start time:11:32:30
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:12
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\powercfg.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                      Imagebase:0x7ff665fb0000
                                                      File size:96'256 bytes
                                                      MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:13
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\powercfg.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                      Imagebase:0x7ff665fb0000
                                                      File size:96'256 bytes
                                                      MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:14
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:15
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\powercfg.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                      Imagebase:0x7ff665fb0000
                                                      File size:96'256 bytes
                                                      MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:16
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:17
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\powercfg.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                      Imagebase:0x7ff665fb0000
                                                      File size:96'256 bytes
                                                      MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:18
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:19
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\sc.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\sc.exe delete "PcHealthTool"
                                                      Imagebase:0x7ff630a40000
                                                      File size:72'192 bytes
                                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:20
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:21
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:22
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\sc.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\sc.exe create "PcHealthTool" binpath= "C:\ProgramData\PcHealthTool\HealthTool.exe" start= "auto"
                                                      Imagebase:0x7ff630a40000
                                                      File size:72'192 bytes
                                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:23
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:24
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\sc.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\sc.exe stop eventlog
                                                      Imagebase:0x7ff630a40000
                                                      File size:72'192 bytes
                                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:25
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\sc.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\sc.exe start "PcHealthTool"
                                                      Imagebase:0x7ff630a40000
                                                      File size:72'192 bytes
                                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:26
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:27
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\file.exe"
                                                      Imagebase:0x7ff6e5b00000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:28
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:29
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:30
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\ProgramData\PcHealthTool\HealthTool.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\ProgramData\PcHealthTool\HealthTool.exe
                                                      Imagebase:0x140000000
                                                      File size:5'268'480 bytes
                                                      MD5 hash:1FAB11DEF99E3BB2401ACB5DC50CE122
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmp, Author: unknown
                                                      • Rule: MAL_XMR_Miner_May19_1, Description: Detects Monero Crypto Coin Miner, Source: 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmp, Author: Florian Roth
                                                      • Rule: MALWARE_Win_CoinMiner02, Description: Detects coinmining malware, Source: 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmp, Author: ditekSHen
                                                      Antivirus matches:
                                                      • Detection: 100%, Joe Sandbox ML
                                                      • Detection: 68%, ReversingLabs
                                                      Has exited:true

                                                      Target ID:31
                                                      Start time:11:32:31
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\choice.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:choice /C Y /N /D Y /T 3
                                                      Imagebase:0x7ff646620000
                                                      File size:35'840 bytes
                                                      MD5 hash:1A9804F0C374283B094E9E55DC5EE128
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:33
                                                      Start time:11:32:39
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\sc.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\sc.exe stop UsoSvc
                                                      Imagebase:0x7ff630a40000
                                                      File size:72'192 bytes
                                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:34
                                                      Start time:11:32:39
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:35
                                                      Start time:11:32:39
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\sc.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                      Imagebase:0x7ff630a40000
                                                      File size:72'192 bytes
                                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:36
                                                      Start time:11:32:39
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:37
                                                      Start time:11:32:39
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\sc.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\sc.exe stop wuauserv
                                                      Imagebase:0x7ff630a40000
                                                      File size:72'192 bytes
                                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:38
                                                      Start time:11:32:39
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:39
                                                      Start time:11:32:40
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\sc.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\sc.exe stop bits
                                                      Imagebase:0x7ff630a40000
                                                      File size:72'192 bytes
                                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:40
                                                      Start time:11:32:40
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:41
                                                      Start time:11:32:40
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\sc.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\sc.exe stop dosvc
                                                      Imagebase:0x7ff630a40000
                                                      File size:72'192 bytes
                                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:42
                                                      Start time:11:32:40
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:43
                                                      Start time:11:32:40
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\powercfg.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                      Imagebase:0x7ff665fb0000
                                                      File size:96'256 bytes
                                                      MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:44
                                                      Start time:11:32:40
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\powercfg.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                      Imagebase:0x7ff665fb0000
                                                      File size:96'256 bytes
                                                      MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:45
                                                      Start time:11:32:40
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:46
                                                      Start time:11:32:40
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\powercfg.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                      Imagebase:0x7ff665fb0000
                                                      File size:96'256 bytes
                                                      MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:47
                                                      Start time:11:32:40
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:48
                                                      Start time:11:32:40
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\powercfg.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                      Imagebase:0x7ff665fb0000
                                                      File size:96'256 bytes
                                                      MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:49
                                                      Start time:11:32:40
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:50
                                                      Start time:11:32:40
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:false

                                                      Target ID:51
                                                      Start time:11:32:40
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:52
                                                      Start time:11:32:40
                                                      Start date:09/12/2024
                                                      Path:C:\Windows\explorer.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:explorer.exe
                                                      Imagebase:0x7ff609140000
                                                      File size:5'141'208 bytes
                                                      MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000034.00000002.4589900423.0000000001064000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000034.00000002.4589900423.000000000107E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000034.00000003.2323562707.000000000107F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000034.00000002.4589900423.00000000010BB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000034.00000003.3263289334.00000000010BC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000034.00000002.4589900423.0000000001029000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:2.4%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:11.4%
                                                        Total number of Nodes:860
                                                        Total number of Limit Nodes:2
                                                        execution_graph 2831 140001ac3 2832 140001a70 2831->2832 2833 14000199e 2832->2833 2834 140001b36 2832->2834 2836 140001b53 2832->2836 2835 140001a0f 2833->2835 2838 1400019e9 VirtualProtect 2833->2838 2837 140001ba0 4 API calls 2834->2837 2837->2836 2838->2833 1973 140001ae4 1974 140001a70 1973->1974 1975 14000199e 1974->1975 1976 140001b36 1974->1976 1979 140001b53 1974->1979 1977 140001a0f 1975->1977 1980 1400019e9 VirtualProtect 1975->1980 1981 140001ba0 1976->1981 1980->1975 1983 140001bc2 1981->1983 1982 140001c04 memcpy 1982->1979 1983->1982 1985 140001c45 VirtualQuery 1983->1985 1986 140001cf4 1983->1986 1985->1986 1990 140001c72 1985->1990 1987 140001d23 GetLastError 1986->1987 1988 140001d37 1987->1988 1989 140001ca4 VirtualProtect 1989->1982 1989->1987 1990->1982 1990->1989 2018 140001404 2091 140001394 2018->2091 2020 140001413 2021 140001394 2 API calls 2020->2021 2022 140001422 2021->2022 2023 140001394 2 API calls 2022->2023 2024 140001431 2023->2024 2025 140001394 2 API calls 2024->2025 2026 140001440 2025->2026 2027 140001394 2 API calls 2026->2027 2028 14000144f 2027->2028 2029 140001394 2 API calls 2028->2029 2030 14000145e 2029->2030 2031 140001394 2 API calls 2030->2031 2032 14000146d 2031->2032 2033 140001394 2 API calls 2032->2033 2034 14000147c 2033->2034 2035 140001394 2 API calls 2034->2035 2036 14000148b 2035->2036 2037 140001394 2 API calls 2036->2037 2038 14000149a 2037->2038 2039 140001394 2 API calls 2038->2039 2040 1400014a9 2039->2040 2041 140001394 2 API calls 2040->2041 2042 1400014b8 2041->2042 2043 140001394 2 API calls 2042->2043 2044 1400014c7 2043->2044 2045 140001394 2 API calls 2044->2045 2046 1400014d6 2045->2046 2047 1400014e5 2046->2047 2048 140001394 2 API calls 2046->2048 2049 140001394 2 API calls 2047->2049 2048->2047 2050 1400014ef 2049->2050 2051 1400014f4 2050->2051 2052 140001394 2 API calls 2050->2052 2053 140001394 2 API calls 2051->2053 2052->2051 2054 1400014fe 2053->2054 2055 140001503 2054->2055 2056 140001394 2 API calls 2054->2056 2057 140001394 2 API calls 2055->2057 2056->2055 2058 14000150d 2057->2058 2059 140001394 2 API calls 2058->2059 2060 140001512 2059->2060 2061 140001394 2 API calls 2060->2061 2062 140001521 2061->2062 2063 140001394 2 API calls 2062->2063 2064 140001530 2063->2064 2065 140001394 2 API calls 2064->2065 2066 14000153f 2065->2066 2067 140001394 2 API calls 2066->2067 2068 14000154e 2067->2068 2069 140001394 2 API calls 2068->2069 2070 14000155d 2069->2070 2071 140001394 2 API calls 2070->2071 2072 14000156c 2071->2072 2073 140001394 2 API calls 2072->2073 2074 14000157b 2073->2074 2075 140001394 2 API calls 2074->2075 2076 14000158a 2075->2076 2077 140001394 2 API calls 2076->2077 2078 140001599 2077->2078 2079 140001394 2 API calls 2078->2079 2080 1400015a8 2079->2080 2081 140001394 2 API calls 2080->2081 2082 1400015b7 2081->2082 2083 140001394 2 API calls 2082->2083 2084 1400015c6 2083->2084 2085 140001394 2 API calls 2084->2085 2086 1400015d5 2085->2086 2087 140001394 2 API calls 2086->2087 2088 1400015e4 2087->2088 2089 140001394 2 API calls 2088->2089 2090 1400015f3 2089->2090 2092 1400057c0 malloc 2091->2092 2093 1400013b8 2092->2093 2094 1400013c6 NtCreateSectionEx 2093->2094 2094->2020 2095 140002104 2096 140002111 EnterCriticalSection 2095->2096 2101 140002218 2095->2101 2097 14000220b LeaveCriticalSection 2096->2097 2103 14000212e 2096->2103 2097->2101 2098 140002272 2099 14000214d TlsGetValue GetLastError 2099->2103 2100 140002241 DeleteCriticalSection 2100->2098 2101->2098 2101->2100 2102 140002230 free 2101->2102 2102->2100 2102->2102 2103->2097 2103->2099 1991 140001e65 1992 140001e67 signal 1991->1992 1993 140001e7c 1992->1993 1995 140001e99 1992->1995 1994 140001e82 signal 1993->1994 1993->1995 1994->1995 2839 140001f47 2840 140001e67 signal 2839->2840 2843 140001e99 2839->2843 2841 140001e7c 2840->2841 2840->2843 2842 140001e82 signal 2841->2842 2841->2843 2842->2843 1996 14000216f 1997 140002185 1996->1997 1998 140002178 InitializeCriticalSection 1996->1998 1998->1997 1999 140001a70 2001 14000199e 1999->2001 2004 140001a7d 1999->2004 2000 140001a0f 2001->2000 2002 1400019e9 VirtualProtect 2001->2002 2002->2001 2003 140001b53 2004->1999 2004->2003 2005 140001b36 2004->2005 2006 140001ba0 4 API calls 2005->2006 2006->2003 2104 140001e10 2105 140001e2f 2104->2105 2106 140001ecc 2105->2106 2110 140001eb5 2105->2110 2111 140001e55 2105->2111 2107 140001ed3 signal 2106->2107 2106->2110 2108 140001ee4 2107->2108 2107->2110 2109 140001eea signal 2108->2109 2108->2110 2109->2110 2111->2110 2112 140001f12 signal 2111->2112 2112->2110 2844 140002050 2845 14000205e EnterCriticalSection 2844->2845 2846 1400020cf 2844->2846 2847 1400020c2 LeaveCriticalSection 2845->2847 2848 140002079 2845->2848 2847->2846 2848->2847 2849 1400020bd free 2848->2849 2849->2847 2850 140001fd0 2851 140001fe4 2850->2851 2852 140002033 2850->2852 2851->2852 2853 140001ffd EnterCriticalSection LeaveCriticalSection 2851->2853 2853->2852 2121 140001ab3 2122 140001a70 2121->2122 2122->2121 2123 14000199e 2122->2123 2124 140001b36 2122->2124 2127 140001b53 2122->2127 2125 140001a0f 2123->2125 2128 1400019e9 VirtualProtect 2123->2128 2126 140001ba0 4 API calls 2124->2126 2126->2127 2128->2123 1963 140001394 1967 1400057c0 1963->1967 1965 1400013b8 1966 1400013c6 NtCreateSectionEx 1965->1966 1968 1400057de 1967->1968 1969 14000580b 1967->1969 1968->1965 1969->1968 1970 1400058b3 1969->1970 1971 1400058cf malloc 1970->1971 1972 1400058f0 1971->1972 1972->1968 2113 14000219e 2114 140002272 2113->2114 2115 1400021ab EnterCriticalSection 2113->2115 2116 140002265 LeaveCriticalSection 2115->2116 2118 1400021c8 2115->2118 2116->2114 2117 1400021e9 TlsGetValue GetLastError 2117->2118 2118->2116 2118->2117 2007 140001800 2008 140001812 2007->2008 2009 140001835 fprintf 2008->2009 2010 140001000 2011 14000108b __set_app_type 2010->2011 2012 140001040 2010->2012 2014 1400010b6 2011->2014 2012->2011 2013 1400010e5 2014->2013 2016 140001e00 2014->2016 2017 140005d50 __setusermatherr 2016->2017 2119 140002320 strlen 2120 140002337 2119->2120 2129 140001140 2132 140001160 2129->2132 2131 140001156 2133 1400011b9 2132->2133 2134 14000118b 2132->2134 2135 1400011d3 2133->2135 2136 1400011c7 _amsg_exit 2133->2136 2134->2133 2137 1400011a0 Sleep 2134->2137 2138 140001201 _initterm 2135->2138 2139 14000121a 2135->2139 2136->2135 2137->2133 2137->2134 2138->2139 2155 140001880 2139->2155 2142 14000126a 2143 14000126f malloc 2142->2143 2144 14000128b 2143->2144 2146 1400012d0 2143->2146 2145 1400012a0 strlen malloc memcpy 2144->2145 2145->2145 2145->2146 2166 140003160 2146->2166 2148 140001315 2149 140001344 2148->2149 2150 140001324 2148->2150 2153 140001160 67 API calls 2149->2153 2151 140001338 2150->2151 2152 14000132d _cexit 2150->2152 2151->2131 2152->2151 2154 140001366 2153->2154 2154->2131 2156 140001247 SetUnhandledExceptionFilter 2155->2156 2157 1400018a2 2155->2157 2156->2142 2157->2156 2158 14000194d 2157->2158 2162 140001a20 2157->2162 2159 14000199e 2158->2159 2160 140001ba0 4 API calls 2158->2160 2159->2156 2161 1400019e9 VirtualProtect 2159->2161 2160->2158 2161->2159 2162->2159 2163 140001b53 2162->2163 2164 140001b36 2162->2164 2165 140001ba0 4 API calls 2164->2165 2165->2163 2169 140003176 2166->2169 2167 1400032c8 wcslen 2251 14000153f 2167->2251 2169->2167 2171 1400034be 2171->2148 2174 1400033c3 2177 1400033e9 memset 2174->2177 2180 14000341b 2177->2180 2179 14000346b wcslen 2181 140003481 2179->2181 2185 1400034bc 2179->2185 2180->2179 2182 140003490 _wcsnicmp 2181->2182 2183 1400034a6 wcslen 2182->2183 2182->2185 2183->2182 2183->2185 2184 140003581 wcscpy wcscat memset 2187 1400035c0 2184->2187 2185->2184 2186 140003603 wcscpy wcscat memset 2189 140003646 2186->2189 2187->2186 2188 14000374e wcscpy wcscat memset 2190 140003790 2188->2190 2189->2188 2191 140003ae5 wcslen 2190->2191 2192 140003af3 2191->2192 2196 140003b2b 2191->2196 2193 140003b00 _wcsnicmp 2192->2193 2194 140003b16 wcslen 2193->2194 2193->2196 2194->2193 2194->2196 2195 140003c11 wcscpy wcscat memset 2198 140003c53 2195->2198 2196->2195 2197 140003c96 wcscpy wcscat memset 2199 140003cdc 2197->2199 2198->2197 2200 140003d0c wcscpy wcscat memset 2199->2200 2202 140003d60 2200->2202 2201 140003da5 wcscpy wcscat wcslen 2391 14000146d 2201->2391 2202->2201 2205 140003f5a 2208 140004020 memset 2205->2208 2212 140004044 wcscpy wcscat wcslen 2208->2212 2213 14000549d 2208->2213 2209 140003ec2 2477 1400014a9 2209->2477 2210 140004000 2211 14000145e 2 API calls 2210->2211 2211->2205 2226 140004170 2212->2226 2217 140003fef 2220 14000145e 2 API calls 2217->2220 2220->2205 2222 140003f4e 2223 14000145e 2 API calls 2222->2223 2223->2205 2224 14000425e wcslen 2225 14000153f 2 API calls 2224->2225 2225->2226 2226->2224 2227 1400051ce memcpy 2226->2227 2228 140004688 wcslen 2226->2228 2229 14000441d wcslen 2226->2229 2232 1400044ab memset 2226->2232 2233 140004515 wcslen 2226->2233 2236 140005213 memcpy 2226->2236 2237 14000457d _wcsnicmp 2226->2237 2238 140004b5b memset 2226->2238 2239 1400026e0 11 API calls 2226->2239 2240 140004d70 memset 2226->2240 2241 14000145e NtCreateSectionEx malloc 2226->2241 2242 140004fbd wcslen 2226->2242 2243 140004bcb memset 2226->2243 2244 140004dce wcscpy wcscat wcslen 2226->2244 2247 140004c25 wcscpy wcscat wcslen 2226->2247 2250 140004f12 2226->2250 2593 1400014d6 2226->2593 2666 140001521 2226->2666 2764 140001431 2226->2764 2227->2226 2230 14000153f 2 API calls 2228->2230 2638 14000157b 2229->2638 2230->2226 2232->2226 2655 1400015a8 2233->2655 2236->2226 2237->2226 2238->2226 2238->2240 2239->2226 2240->2226 2241->2226 2245 1400015a8 2 API calls 2242->2245 2243->2226 2246 140001422 2 API calls 2244->2246 2245->2226 2246->2226 2695 140001422 2247->2695 2250->2148 2252 140001394 2 API calls 2251->2252 2253 14000154e 2252->2253 2254 140001394 2 API calls 2253->2254 2255 14000155d 2254->2255 2256 140001394 2 API calls 2255->2256 2257 14000156c 2256->2257 2258 140001394 2 API calls 2257->2258 2259 14000157b 2258->2259 2260 140001394 2 API calls 2259->2260 2261 14000158a 2260->2261 2262 140001394 2 API calls 2261->2262 2263 140001599 2262->2263 2264 140001394 2 API calls 2263->2264 2265 1400015a8 2264->2265 2266 140001394 2 API calls 2265->2266 2267 1400015b7 2266->2267 2268 140001394 2 API calls 2267->2268 2269 1400015c6 2268->2269 2270 140001394 2 API calls 2269->2270 2271 1400015d5 2270->2271 2272 140001394 2 API calls 2271->2272 2273 1400015e4 2272->2273 2274 140001394 2 API calls 2273->2274 2275 1400015f3 2274->2275 2275->2171 2276 140001503 2275->2276 2277 140001394 2 API calls 2276->2277 2278 14000150d 2277->2278 2279 140001394 2 API calls 2278->2279 2280 140001512 2279->2280 2281 140001394 2 API calls 2280->2281 2282 140001521 2281->2282 2283 140001394 2 API calls 2282->2283 2284 140001530 2283->2284 2285 140001394 2 API calls 2284->2285 2286 14000153f 2285->2286 2287 140001394 2 API calls 2286->2287 2288 14000154e 2287->2288 2289 140001394 2 API calls 2288->2289 2290 14000155d 2289->2290 2291 140001394 2 API calls 2290->2291 2292 14000156c 2291->2292 2293 140001394 2 API calls 2292->2293 2294 14000157b 2293->2294 2295 140001394 2 API calls 2294->2295 2296 14000158a 2295->2296 2297 140001394 2 API calls 2296->2297 2298 140001599 2297->2298 2299 140001394 2 API calls 2298->2299 2300 1400015a8 2299->2300 2301 140001394 2 API calls 2300->2301 2302 1400015b7 2301->2302 2303 140001394 2 API calls 2302->2303 2304 1400015c6 2303->2304 2305 140001394 2 API calls 2304->2305 2306 1400015d5 2305->2306 2307 140001394 2 API calls 2306->2307 2308 1400015e4 2307->2308 2309 140001394 2 API calls 2308->2309 2310 1400015f3 2309->2310 2310->2174 2311 14000156c 2310->2311 2312 140001394 2 API calls 2311->2312 2313 14000157b 2312->2313 2314 140001394 2 API calls 2313->2314 2315 14000158a 2314->2315 2316 140001394 2 API calls 2315->2316 2317 140001599 2316->2317 2318 140001394 2 API calls 2317->2318 2319 1400015a8 2318->2319 2320 140001394 2 API calls 2319->2320 2321 1400015b7 2320->2321 2322 140001394 2 API calls 2321->2322 2323 1400015c6 2322->2323 2324 140001394 2 API calls 2323->2324 2325 1400015d5 2324->2325 2326 140001394 2 API calls 2325->2326 2327 1400015e4 2326->2327 2328 140001394 2 API calls 2327->2328 2329 1400015f3 2328->2329 2329->2174 2330 14000145e 2329->2330 2331 140001394 2 API calls 2330->2331 2332 14000146d 2331->2332 2333 140001394 2 API calls 2332->2333 2334 14000147c 2333->2334 2335 140001394 2 API calls 2334->2335 2336 14000148b 2335->2336 2337 140001394 2 API calls 2336->2337 2338 14000149a 2337->2338 2339 140001394 2 API calls 2338->2339 2340 1400014a9 2339->2340 2341 140001394 2 API calls 2340->2341 2342 1400014b8 2341->2342 2343 140001394 2 API calls 2342->2343 2344 1400014c7 2343->2344 2345 140001394 2 API calls 2344->2345 2346 1400014d6 2345->2346 2347 1400014e5 2346->2347 2348 140001394 2 API calls 2346->2348 2349 140001394 2 API calls 2347->2349 2348->2347 2350 1400014ef 2349->2350 2351 1400014f4 2350->2351 2352 140001394 2 API calls 2350->2352 2353 140001394 2 API calls 2351->2353 2352->2351 2354 1400014fe 2353->2354 2355 140001503 2354->2355 2356 140001394 2 API calls 2354->2356 2357 140001394 2 API calls 2355->2357 2356->2355 2358 14000150d 2357->2358 2359 140001394 2 API calls 2358->2359 2360 140001512 2359->2360 2361 140001394 2 API calls 2360->2361 2362 140001521 2361->2362 2363 140001394 2 API calls 2362->2363 2364 140001530 2363->2364 2365 140001394 2 API calls 2364->2365 2366 14000153f 2365->2366 2367 140001394 2 API calls 2366->2367 2368 14000154e 2367->2368 2369 140001394 2 API calls 2368->2369 2370 14000155d 2369->2370 2371 140001394 2 API calls 2370->2371 2372 14000156c 2371->2372 2373 140001394 2 API calls 2372->2373 2374 14000157b 2373->2374 2375 140001394 2 API calls 2374->2375 2376 14000158a 2375->2376 2377 140001394 2 API calls 2376->2377 2378 140001599 2377->2378 2379 140001394 2 API calls 2378->2379 2380 1400015a8 2379->2380 2381 140001394 2 API calls 2380->2381 2382 1400015b7 2381->2382 2383 140001394 2 API calls 2382->2383 2384 1400015c6 2383->2384 2385 140001394 2 API calls 2384->2385 2386 1400015d5 2385->2386 2387 140001394 2 API calls 2386->2387 2388 1400015e4 2387->2388 2389 140001394 2 API calls 2388->2389 2390 1400015f3 2389->2390 2390->2174 2392 140001394 2 API calls 2391->2392 2393 14000147c 2392->2393 2394 140001394 2 API calls 2393->2394 2395 14000148b 2394->2395 2396 140001394 2 API calls 2395->2396 2397 14000149a 2396->2397 2398 140001394 2 API calls 2397->2398 2399 1400014a9 2398->2399 2400 140001394 2 API calls 2399->2400 2401 1400014b8 2400->2401 2402 140001394 2 API calls 2401->2402 2403 1400014c7 2402->2403 2404 140001394 2 API calls 2403->2404 2405 1400014d6 2404->2405 2406 1400014e5 2405->2406 2407 140001394 2 API calls 2405->2407 2408 140001394 2 API calls 2406->2408 2407->2406 2409 1400014ef 2408->2409 2410 1400014f4 2409->2410 2411 140001394 2 API calls 2409->2411 2412 140001394 2 API calls 2410->2412 2411->2410 2413 1400014fe 2412->2413 2414 140001503 2413->2414 2415 140001394 2 API calls 2413->2415 2416 140001394 2 API calls 2414->2416 2415->2414 2417 14000150d 2416->2417 2418 140001394 2 API calls 2417->2418 2419 140001512 2418->2419 2420 140001394 2 API calls 2419->2420 2421 140001521 2420->2421 2422 140001394 2 API calls 2421->2422 2423 140001530 2422->2423 2424 140001394 2 API calls 2423->2424 2425 14000153f 2424->2425 2426 140001394 2 API calls 2425->2426 2427 14000154e 2426->2427 2428 140001394 2 API calls 2427->2428 2429 14000155d 2428->2429 2430 140001394 2 API calls 2429->2430 2431 14000156c 2430->2431 2432 140001394 2 API calls 2431->2432 2433 14000157b 2432->2433 2434 140001394 2 API calls 2433->2434 2435 14000158a 2434->2435 2436 140001394 2 API calls 2435->2436 2437 140001599 2436->2437 2438 140001394 2 API calls 2437->2438 2439 1400015a8 2438->2439 2440 140001394 2 API calls 2439->2440 2441 1400015b7 2440->2441 2442 140001394 2 API calls 2441->2442 2443 1400015c6 2442->2443 2444 140001394 2 API calls 2443->2444 2445 1400015d5 2444->2445 2446 140001394 2 API calls 2445->2446 2447 1400015e4 2446->2447 2448 140001394 2 API calls 2447->2448 2449 1400015f3 2448->2449 2449->2205 2450 140001530 2449->2450 2451 140001394 2 API calls 2450->2451 2452 14000153f 2451->2452 2453 140001394 2 API calls 2452->2453 2454 14000154e 2453->2454 2455 140001394 2 API calls 2454->2455 2456 14000155d 2455->2456 2457 140001394 2 API calls 2456->2457 2458 14000156c 2457->2458 2459 140001394 2 API calls 2458->2459 2460 14000157b 2459->2460 2461 140001394 2 API calls 2460->2461 2462 14000158a 2461->2462 2463 140001394 2 API calls 2462->2463 2464 140001599 2463->2464 2465 140001394 2 API calls 2464->2465 2466 1400015a8 2465->2466 2467 140001394 2 API calls 2466->2467 2468 1400015b7 2467->2468 2469 140001394 2 API calls 2468->2469 2470 1400015c6 2469->2470 2471 140001394 2 API calls 2470->2471 2472 1400015d5 2471->2472 2473 140001394 2 API calls 2472->2473 2474 1400015e4 2473->2474 2475 140001394 2 API calls 2474->2475 2476 1400015f3 2475->2476 2476->2209 2476->2210 2478 140001394 2 API calls 2477->2478 2479 1400014b8 2478->2479 2480 140001394 2 API calls 2479->2480 2481 1400014c7 2480->2481 2482 140001394 2 API calls 2481->2482 2483 1400014d6 2482->2483 2484 1400014e5 2483->2484 2485 140001394 2 API calls 2483->2485 2486 140001394 2 API calls 2484->2486 2485->2484 2487 1400014ef 2486->2487 2488 1400014f4 2487->2488 2489 140001394 2 API calls 2487->2489 2490 140001394 2 API calls 2488->2490 2489->2488 2491 1400014fe 2490->2491 2492 140001503 2491->2492 2493 140001394 2 API calls 2491->2493 2494 140001394 2 API calls 2492->2494 2493->2492 2495 14000150d 2494->2495 2496 140001394 2 API calls 2495->2496 2497 140001512 2496->2497 2498 140001394 2 API calls 2497->2498 2499 140001521 2498->2499 2500 140001394 2 API calls 2499->2500 2501 140001530 2500->2501 2502 140001394 2 API calls 2501->2502 2503 14000153f 2502->2503 2504 140001394 2 API calls 2503->2504 2505 14000154e 2504->2505 2506 140001394 2 API calls 2505->2506 2507 14000155d 2506->2507 2508 140001394 2 API calls 2507->2508 2509 14000156c 2508->2509 2510 140001394 2 API calls 2509->2510 2511 14000157b 2510->2511 2512 140001394 2 API calls 2511->2512 2513 14000158a 2512->2513 2514 140001394 2 API calls 2513->2514 2515 140001599 2514->2515 2516 140001394 2 API calls 2515->2516 2517 1400015a8 2516->2517 2518 140001394 2 API calls 2517->2518 2519 1400015b7 2518->2519 2520 140001394 2 API calls 2519->2520 2521 1400015c6 2520->2521 2522 140001394 2 API calls 2521->2522 2523 1400015d5 2522->2523 2524 140001394 2 API calls 2523->2524 2525 1400015e4 2524->2525 2526 140001394 2 API calls 2525->2526 2527 1400015f3 2526->2527 2527->2217 2528 140001440 2527->2528 2529 140001394 2 API calls 2528->2529 2530 14000144f 2529->2530 2531 140001394 2 API calls 2530->2531 2532 14000145e 2531->2532 2533 140001394 2 API calls 2532->2533 2534 14000146d 2533->2534 2535 140001394 2 API calls 2534->2535 2536 14000147c 2535->2536 2537 140001394 2 API calls 2536->2537 2538 14000148b 2537->2538 2539 140001394 2 API calls 2538->2539 2540 14000149a 2539->2540 2541 140001394 2 API calls 2540->2541 2542 1400014a9 2541->2542 2543 140001394 2 API calls 2542->2543 2544 1400014b8 2543->2544 2545 140001394 2 API calls 2544->2545 2546 1400014c7 2545->2546 2547 140001394 2 API calls 2546->2547 2548 1400014d6 2547->2548 2549 1400014e5 2548->2549 2550 140001394 2 API calls 2548->2550 2551 140001394 2 API calls 2549->2551 2550->2549 2552 1400014ef 2551->2552 2553 1400014f4 2552->2553 2554 140001394 2 API calls 2552->2554 2555 140001394 2 API calls 2553->2555 2554->2553 2556 1400014fe 2555->2556 2557 140001503 2556->2557 2558 140001394 2 API calls 2556->2558 2559 140001394 2 API calls 2557->2559 2558->2557 2560 14000150d 2559->2560 2561 140001394 2 API calls 2560->2561 2562 140001512 2561->2562 2563 140001394 2 API calls 2562->2563 2564 140001521 2563->2564 2565 140001394 2 API calls 2564->2565 2566 140001530 2565->2566 2567 140001394 2 API calls 2566->2567 2568 14000153f 2567->2568 2569 140001394 2 API calls 2568->2569 2570 14000154e 2569->2570 2571 140001394 2 API calls 2570->2571 2572 14000155d 2571->2572 2573 140001394 2 API calls 2572->2573 2574 14000156c 2573->2574 2575 140001394 2 API calls 2574->2575 2576 14000157b 2575->2576 2577 140001394 2 API calls 2576->2577 2578 14000158a 2577->2578 2579 140001394 2 API calls 2578->2579 2580 140001599 2579->2580 2581 140001394 2 API calls 2580->2581 2582 1400015a8 2581->2582 2583 140001394 2 API calls 2582->2583 2584 1400015b7 2583->2584 2585 140001394 2 API calls 2584->2585 2586 1400015c6 2585->2586 2587 140001394 2 API calls 2586->2587 2588 1400015d5 2587->2588 2589 140001394 2 API calls 2588->2589 2590 1400015e4 2589->2590 2591 140001394 2 API calls 2590->2591 2592 1400015f3 2591->2592 2592->2217 2592->2222 2594 1400014e5 2593->2594 2595 140001394 2 API calls 2593->2595 2596 140001394 2 API calls 2594->2596 2595->2594 2597 1400014ef 2596->2597 2598 1400014f4 2597->2598 2599 140001394 2 API calls 2597->2599 2600 140001394 2 API calls 2598->2600 2599->2598 2601 1400014fe 2600->2601 2602 140001503 2601->2602 2603 140001394 2 API calls 2601->2603 2604 140001394 2 API calls 2602->2604 2603->2602 2605 14000150d 2604->2605 2606 140001394 2 API calls 2605->2606 2607 140001512 2606->2607 2608 140001394 2 API calls 2607->2608 2609 140001521 2608->2609 2610 140001394 2 API calls 2609->2610 2611 140001530 2610->2611 2612 140001394 2 API calls 2611->2612 2613 14000153f 2612->2613 2614 140001394 2 API calls 2613->2614 2615 14000154e 2614->2615 2616 140001394 2 API calls 2615->2616 2617 14000155d 2616->2617 2618 140001394 2 API calls 2617->2618 2619 14000156c 2618->2619 2620 140001394 2 API calls 2619->2620 2621 14000157b 2620->2621 2622 140001394 2 API calls 2621->2622 2623 14000158a 2622->2623 2624 140001394 2 API calls 2623->2624 2625 140001599 2624->2625 2626 140001394 2 API calls 2625->2626 2627 1400015a8 2626->2627 2628 140001394 2 API calls 2627->2628 2629 1400015b7 2628->2629 2630 140001394 2 API calls 2629->2630 2631 1400015c6 2630->2631 2632 140001394 2 API calls 2631->2632 2633 1400015d5 2632->2633 2634 140001394 2 API calls 2633->2634 2635 1400015e4 2634->2635 2636 140001394 2 API calls 2635->2636 2637 1400015f3 2636->2637 2637->2226 2639 140001394 2 API calls 2638->2639 2640 14000158a 2639->2640 2641 140001394 2 API calls 2640->2641 2642 140001599 2641->2642 2643 140001394 2 API calls 2642->2643 2644 1400015a8 2643->2644 2645 140001394 2 API calls 2644->2645 2646 1400015b7 2645->2646 2647 140001394 2 API calls 2646->2647 2648 1400015c6 2647->2648 2649 140001394 2 API calls 2648->2649 2650 1400015d5 2649->2650 2651 140001394 2 API calls 2650->2651 2652 1400015e4 2651->2652 2653 140001394 2 API calls 2652->2653 2654 1400015f3 2653->2654 2654->2226 2656 140001394 2 API calls 2655->2656 2657 1400015b7 2656->2657 2658 140001394 2 API calls 2657->2658 2659 1400015c6 2658->2659 2660 140001394 2 API calls 2659->2660 2661 1400015d5 2660->2661 2662 140001394 2 API calls 2661->2662 2663 1400015e4 2662->2663 2664 140001394 2 API calls 2663->2664 2665 1400015f3 2664->2665 2665->2226 2667 140001394 2 API calls 2666->2667 2668 140001530 2667->2668 2669 140001394 2 API calls 2668->2669 2670 14000153f 2669->2670 2671 140001394 2 API calls 2670->2671 2672 14000154e 2671->2672 2673 140001394 2 API calls 2672->2673 2674 14000155d 2673->2674 2675 140001394 2 API calls 2674->2675 2676 14000156c 2675->2676 2677 140001394 2 API calls 2676->2677 2678 14000157b 2677->2678 2679 140001394 2 API calls 2678->2679 2680 14000158a 2679->2680 2681 140001394 2 API calls 2680->2681 2682 140001599 2681->2682 2683 140001394 2 API calls 2682->2683 2684 1400015a8 2683->2684 2685 140001394 2 API calls 2684->2685 2686 1400015b7 2685->2686 2687 140001394 2 API calls 2686->2687 2688 1400015c6 2687->2688 2689 140001394 2 API calls 2688->2689 2690 1400015d5 2689->2690 2691 140001394 2 API calls 2690->2691 2692 1400015e4 2691->2692 2693 140001394 2 API calls 2692->2693 2694 1400015f3 2693->2694 2694->2226 2696 140001394 2 API calls 2695->2696 2697 140001431 2696->2697 2698 140001394 2 API calls 2697->2698 2699 140001440 2698->2699 2700 140001394 2 API calls 2699->2700 2701 14000144f 2700->2701 2702 140001394 2 API calls 2701->2702 2703 14000145e 2702->2703 2704 140001394 2 API calls 2703->2704 2705 14000146d 2704->2705 2706 140001394 2 API calls 2705->2706 2707 14000147c 2706->2707 2708 140001394 2 API calls 2707->2708 2709 14000148b 2708->2709 2710 140001394 2 API calls 2709->2710 2711 14000149a 2710->2711 2712 140001394 2 API calls 2711->2712 2713 1400014a9 2712->2713 2714 140001394 2 API calls 2713->2714 2715 1400014b8 2714->2715 2716 140001394 2 API calls 2715->2716 2717 1400014c7 2716->2717 2718 140001394 2 API calls 2717->2718 2719 1400014d6 2718->2719 2720 1400014e5 2719->2720 2721 140001394 2 API calls 2719->2721 2722 140001394 2 API calls 2720->2722 2721->2720 2723 1400014ef 2722->2723 2724 1400014f4 2723->2724 2725 140001394 2 API calls 2723->2725 2726 140001394 2 API calls 2724->2726 2725->2724 2727 1400014fe 2726->2727 2728 140001503 2727->2728 2729 140001394 2 API calls 2727->2729 2730 140001394 2 API calls 2728->2730 2729->2728 2731 14000150d 2730->2731 2732 140001394 2 API calls 2731->2732 2733 140001512 2732->2733 2734 140001394 2 API calls 2733->2734 2735 140001521 2734->2735 2736 140001394 2 API calls 2735->2736 2737 140001530 2736->2737 2738 140001394 2 API calls 2737->2738 2739 14000153f 2738->2739 2740 140001394 2 API calls 2739->2740 2741 14000154e 2740->2741 2742 140001394 2 API calls 2741->2742 2743 14000155d 2742->2743 2744 140001394 2 API calls 2743->2744 2745 14000156c 2744->2745 2746 140001394 2 API calls 2745->2746 2747 14000157b 2746->2747 2748 140001394 2 API calls 2747->2748 2749 14000158a 2748->2749 2750 140001394 2 API calls 2749->2750 2751 140001599 2750->2751 2752 140001394 2 API calls 2751->2752 2753 1400015a8 2752->2753 2754 140001394 2 API calls 2753->2754 2755 1400015b7 2754->2755 2756 140001394 2 API calls 2755->2756 2757 1400015c6 2756->2757 2758 140001394 2 API calls 2757->2758 2759 1400015d5 2758->2759 2760 140001394 2 API calls 2759->2760 2761 1400015e4 2760->2761 2762 140001394 2 API calls 2761->2762 2763 1400015f3 2762->2763 2763->2226 2765 140001394 2 API calls 2764->2765 2766 140001440 2765->2766 2767 140001394 2 API calls 2766->2767 2768 14000144f 2767->2768 2769 140001394 2 API calls 2768->2769 2770 14000145e 2769->2770 2771 140001394 2 API calls 2770->2771 2772 14000146d 2771->2772 2773 140001394 2 API calls 2772->2773 2774 14000147c 2773->2774 2775 140001394 2 API calls 2774->2775 2776 14000148b 2775->2776 2777 140001394 2 API calls 2776->2777 2778 14000149a 2777->2778 2779 140001394 2 API calls 2778->2779 2780 1400014a9 2779->2780 2781 140001394 2 API calls 2780->2781 2782 1400014b8 2781->2782 2783 140001394 2 API calls 2782->2783 2784 1400014c7 2783->2784 2785 140001394 2 API calls 2784->2785 2786 1400014d6 2785->2786 2787 1400014e5 2786->2787 2788 140001394 2 API calls 2786->2788 2789 140001394 2 API calls 2787->2789 2788->2787 2790 1400014ef 2789->2790 2791 1400014f4 2790->2791 2792 140001394 2 API calls 2790->2792 2793 140001394 2 API calls 2791->2793 2792->2791 2794 1400014fe 2793->2794 2795 140001503 2794->2795 2796 140001394 2 API calls 2794->2796 2797 140001394 2 API calls 2795->2797 2796->2795 2798 14000150d 2797->2798 2799 140001394 2 API calls 2798->2799 2800 140001512 2799->2800 2801 140001394 2 API calls 2800->2801 2802 140001521 2801->2802 2803 140001394 2 API calls 2802->2803 2804 140001530 2803->2804 2805 140001394 2 API calls 2804->2805 2806 14000153f 2805->2806 2807 140001394 2 API calls 2806->2807 2808 14000154e 2807->2808 2809 140001394 2 API calls 2808->2809 2810 14000155d 2809->2810 2811 140001394 2 API calls 2810->2811 2812 14000156c 2811->2812 2813 140001394 2 API calls 2812->2813 2814 14000157b 2813->2814 2815 140001394 2 API calls 2814->2815 2816 14000158a 2815->2816 2817 140001394 2 API calls 2816->2817 2818 140001599 2817->2818 2819 140001394 2 API calls 2818->2819 2820 1400015a8 2819->2820 2821 140001394 2 API calls 2820->2821 2822 1400015b7 2821->2822 2823 140001394 2 API calls 2822->2823 2824 1400015c6 2823->2824 2825 140001394 2 API calls 2824->2825 2826 1400015d5 2825->2826 2827 140001394 2 API calls 2826->2827 2828 1400015e4 2827->2828 2829 140001394 2 API calls 2828->2829 2830 1400015f3 2829->2830 2830->2226

                                                        Callgraph

                                                        • Executed
                                                        • Not Executed
                                                        • Opacity -> Relevance
                                                        • Disassembly available
                                                        callgraph 0 Function_00000001400054E1 1 Function_00000001400056E1 2 Function_0000000140001AE4 33 Function_0000000140001D40 2->33 72 Function_0000000140001BA0 2->72 3 Function_00000001400014E5 69 Function_0000000140001394 3->69 4 Function_00000001400010F0 5 Function_00000001400055F1 6 Function_00000001400014F4 6->69 7 Function_0000000140001800 63 Function_0000000140002290 7->63 8 Function_0000000140001000 9 Function_0000000140001E00 8->9 39 Function_0000000140001750 8->39 78 Function_0000000140001FB0 8->78 85 Function_0000000140001FC0 8->85 10 Function_0000000140002F00 56 Function_0000000140001370 10->56 11 Function_0000000140002500 12 Function_0000000140005501 13 Function_0000000140003101 14 Function_0000000140001503 14->69 15 Function_0000000140001404 15->69 16 Function_0000000140002104 17 Function_0000000140001E10 18 Function_0000000140005611 19 Function_0000000140001512 19->69 20 Function_0000000140002420 21 Function_0000000140002320 22 Function_0000000140003120 23 Function_0000000140005620 24 Function_0000000140001521 24->69 25 Function_0000000140005521 26 Function_0000000140005721 27 Function_0000000140001422 27->69 28 Function_0000000140001530 28->69 29 Function_0000000140001431 29->69 30 Function_000000014000153F 30->69 31 Function_0000000140001440 31->69 32 Function_0000000140003140 33->63 34 Function_0000000140001140 46 Function_0000000140001160 34->46 35 Function_0000000140005541 36 Function_0000000140005641 37 Function_0000000140001F47 55 Function_0000000140001870 37->55 38 Function_0000000140002050 40 Function_0000000140001650 41 Function_0000000140003051 42 Function_000000014000155D 42->69 43 Function_000000014000145E 43->69 44 Function_0000000140002660 45 Function_0000000140003160 45->10 45->14 45->24 45->27 45->28 45->29 45->30 45->31 45->43 45->44 51 Function_000000014000156C 45->51 52 Function_000000014000146D 45->52 45->56 60 Function_000000014000157B 45->60 74 Function_00000001400015A8 45->74 75 Function_00000001400014A9 45->75 77 Function_00000001400057B0 45->77 86 Function_00000001400016C0 45->86 96 Function_00000001400014D6 45->96 98 Function_00000001400026E0 45->98 46->45 46->46 46->55 61 Function_0000000140001880 46->61 62 Function_0000000140001F90 46->62 46->86 47 Function_0000000140001760 99 Function_00000001400020E0 47->99 48 Function_0000000140002460 49 Function_0000000140005561 50 Function_0000000140001E65 50->55 51->69 52->69 53 Function_000000014000216F 54 Function_0000000140003070 57 Function_0000000140005A70 57->77 58 Function_0000000140001A70 58->33 58->72 59 Function_0000000140005671 60->69 61->20 61->33 61->44 61->72 64 Function_0000000140002590 65 Function_0000000140003090 66 Function_0000000140005790 67 Function_0000000140002691 68 Function_0000000140005591 69->57 87 Function_00000001400057C0 69->87 70 Function_0000000140002194 70->55 71 Function_000000014000219E 72->33 76 Function_00000001400023B0 72->76 92 Function_00000001400024D0 72->92 73 Function_0000000140001FA0 74->69 75->69 79 Function_00000001400022B0 80 Function_00000001400026B0 81 Function_00000001400030B1 82 Function_00000001400055B1 83 Function_00000001400056B1 84 Function_0000000140001AB3 84->33 84->72 87->77 88 Function_0000000140001AC3 88->33 88->72 89 Function_00000001400014C7 89->69 90 Function_0000000140001FD0 91 Function_00000001400017D0 93 Function_00000001400026D0 94 Function_00000001400055D1 95 Function_0000000140001AD4 95->33 95->72 96->69 97 Function_00000001400022E0 98->3 98->6 98->14 98->19 98->42 98->43 98->44 98->56 98->75 98->77 98->89 100 Function_00000001400017E0 100->99

                                                        Control-flow Graph

                                                        APIs
                                                        • NtCreateSectionEx.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140001156), ref: 00000001400013F7
                                                        Memory Dump Source
                                                        • Source File: 00000032.00000002.4589795477.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                        • Associated: 00000032.00000002.4589744614.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589826496.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589854066.0000000140008000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589881322.0000000140009000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_50_2_140000000_conhost.jbxd
                                                        Similarity
                                                        • API ID: CreateSection
                                                        • String ID:
                                                        • API String ID: 2449625523-0
                                                        • Opcode ID: fb89a9efb201708dd9eb1b01ca0dd14f9c9dc06bd7ef1b9c45da6e9893e8aafe
                                                        • Instruction ID: eb691c209f9bc11a271e68aedc8edf6c1b57c364a51424189517efa5f345a188
                                                        • Opcode Fuzzy Hash: fb89a9efb201708dd9eb1b01ca0dd14f9c9dc06bd7ef1b9c45da6e9893e8aafe
                                                        • Instruction Fuzzy Hash: F0F09DB6608B40C6EAA2DB52F89579A77A1F38D7C4F009919BBC843735DB38C1948F84
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000032.00000002.4589795477.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                        • Associated: 00000032.00000002.4589744614.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589826496.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589854066.0000000140008000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589881322.0000000140009000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_50_2_140000000_conhost.jbxd
                                                        Similarity
                                                        • API ID: memsetwcslen$wcscatwcscpy$_wcsnicmp
                                                        • String ID: $ $H_$ImagePath$PROGRAMDATA=$SYSTEMROOT=$Start$\??\$\??\$\BaseNamedObjects\afxtekfxsti$\BaseNamedObjects\lfbarwgwdwxztonvmckbzjaj$\BaseNamedObjects\oorafpqnocznxgsa$\PcHealthTool\HealthTool.exe$\Registry\Machine\SYSTEM\CurrentControlSet\Services\PcHealthTool$\System32$\WindowsPowerShell\v1.0\powershell.exe$\cmd.exe$\reg.exe$\sc.exe
                                                        • API String ID: 3506639089-1777332595
                                                        • Opcode ID: 11a204419da912bd3fd83720df77722094ddb2a54df2563c55e75a22438c7824
                                                        • Instruction ID: 93d8e1dda64f015eba631f78228baa69cb41b191d46a0d682c2bb83b09603d46
                                                        • Opcode Fuzzy Hash: 11a204419da912bd3fd83720df77722094ddb2a54df2563c55e75a22438c7824
                                                        • Instruction Fuzzy Hash: E71317B1524BC088F733DB2AB8563E56760BB9D3C8F445216FFC4676B2EB7982858305

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 293 1400026e0-14000273b call 140002660 memset 296 140002741-14000274b 293->296 297 14000280e-14000285e call 14000155d 293->297 299 140002774-14000277a 296->299 302 140002953-14000297b call 1400014c7 297->302 303 140002864-140002873 297->303 299->297 301 140002780-140002787 299->301 304 140002789-140002792 301->304 305 140002750-140002752 301->305 320 140002986-1400029c8 call 140001503 call 1400057b0 memset 302->320 321 14000297d 302->321 306 140002eb7-140002ef4 call 140001370 303->306 307 140002879-140002888 303->307 310 140002794-1400027ab 304->310 311 1400027f8-1400027fb 304->311 308 14000275a-14000276e 305->308 312 1400028e4-14000294e wcsncmp call 1400014e5 307->312 313 14000288a-1400028dd 307->313 308->297 308->299 316 1400027f5 310->316 317 1400027ad-1400027c2 310->317 311->308 312->302 313->312 316->311 322 1400027d0-1400027d7 317->322 329 140002e49-140002e84 call 140001370 320->329 330 1400029ce-1400029d5 320->330 321->320 323 1400027d9-1400027f3 322->323 324 140002800-140002809 322->324 323->316 323->322 324->308 333 1400029d7-140002a0c 329->333 337 140002e8a 329->337 332 140002a13-140002a43 wcscpy wcscat wcslen 330->332 330->333 335 140002a45-140002a76 wcslen 332->335 336 140002a78-140002aa5 332->336 333->332 338 140002aa8-140002abf wcslen 335->338 336->338 337->332 339 140002ac5-140002ad8 338->339 340 140002e8f-140002eab call 140001370 338->340 342 140002af5-140002dfb wcslen call 1400014a9 * 2 call 1400014f4 call 1400014c7 * 2 call 14000145e * 3 339->342 343 140002ada-140002aee 339->343 340->306 361 140002dfd-140002e1b call 140001512 342->361 362 140002e20-140002e48 call 14000145e 342->362 343->342 361->362
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000032.00000002.4589795477.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                        • Associated: 00000032.00000002.4589744614.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589826496.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589854066.0000000140008000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589881322.0000000140009000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_50_2_140000000_conhost.jbxd
                                                        Similarity
                                                        • API ID: wcslen$memset$wcscatwcscpywcsncmp
                                                        • String ID: 0$H_$X$`
                                                        • API String ID: 780471329-3485602398
                                                        • Opcode ID: 53d71534ab79b3215246cab828ea8e9ccecbd3e7d7aca27e6c0a42c7772d0cfd
                                                        • Instruction ID: 27663a5b9d41d1ead69c7db5ee0d07020405347f807ffbc44362aa3ac6234149
                                                        • Opcode Fuzzy Hash: 53d71534ab79b3215246cab828ea8e9ccecbd3e7d7aca27e6c0a42c7772d0cfd
                                                        • Instruction Fuzzy Hash: C21239B2618BC085E762CB26F8443DA77A4F789794F404215EBA957BF5EF78C189C700

                                                        Control-flow Graph

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000032.00000002.4589795477.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                        • Associated: 00000032.00000002.4589744614.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589826496.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589854066.0000000140008000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589881322.0000000140009000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_50_2_140000000_conhost.jbxd
                                                        Similarity
                                                        • API ID: malloc$ExceptionFilterSleepUnhandled_amsg_exit_cexit_inittermmemcpystrlen
                                                        • String ID:
                                                        • API String ID: 2643109117-0
                                                        • Opcode ID: 15470176daf5ece33db489f256bde1790463aab957f9e66861d4e148f1776d81
                                                        • Instruction ID: ff6d72ce0636fd7a631d906ddbe6d6ba55a5c8ce85ccef1dfacd2dc6292eb848
                                                        • Opcode Fuzzy Hash: 15470176daf5ece33db489f256bde1790463aab957f9e66861d4e148f1776d81
                                                        • Instruction Fuzzy Hash: 915116B1615A4485FA66EF27F9943EA27A1B78D7C0F448021FF8D973B2DE38C4998700

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 407 140001ba0-140001bc0 408 140001bc2-140001bd7 407->408 409 140001c09 407->409 410 140001be9-140001bf1 408->410 411 140001c0c-140001c17 call 1400023b0 409->411 412 140001bf3-140001c02 410->412 413 140001be0-140001be7 410->413 417 140001cf4-140001cfe call 140001d40 411->417 418 140001c1d-140001c6c call 1400024d0 VirtualQuery 411->418 412->413 415 140001c04 412->415 413->410 413->411 419 140001cd7-140001cf3 memcpy 415->419 422 140001d03-140001d1e call 140001d40 417->422 418->422 425 140001c72-140001c79 418->425 426 140001d23-140001d38 GetLastError call 140001d40 422->426 427 140001c7b-140001c7e 425->427 428 140001c8e-140001c97 425->428 430 140001cd1 427->430 431 140001c80-140001c83 427->431 432 140001ca4-140001ccf VirtualProtect 428->432 433 140001c99-140001c9c 428->433 430->419 431->430 435 140001c85-140001c8a 431->435 432->426 432->430 433->430 436 140001c9e 433->436 435->430 437 140001c8c 435->437 436->432 437->436
                                                        APIs
                                                        • VirtualQuery.KERNEL32(?,?,?,?,0000000140006B48,0000000140006B48,?,?,0000000140000000,?,0000000140001991), ref: 0000000140001C63
                                                        • VirtualProtect.KERNEL32(?,?,?,?,0000000140006B48,0000000140006B48,?,?,0000000140000000,?,0000000140001991), ref: 0000000140001CC7
                                                        • memcpy.MSVCRT ref: 0000000140001CE0
                                                        • GetLastError.KERNEL32(?,?,?,?,0000000140006B48,0000000140006B48,?,?,0000000140000000,?,0000000140001991), ref: 0000000140001D23
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000032.00000002.4589795477.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                        • Associated: 00000032.00000002.4589744614.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589826496.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589854066.0000000140008000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589881322.0000000140009000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_50_2_140000000_conhost.jbxd
                                                        Similarity
                                                        • API ID: Virtual$ErrorLastProtectQuerymemcpy
                                                        • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
                                                        • API String ID: 2595394609-2123141913
                                                        • Opcode ID: 563643a3e2a8902866fd6c68c65f8ff2608c0d87b9d30f1cc720a37c5bd0a50c
                                                        • Instruction ID: 77ce9c54f56db69844f235dc3e88de9f8295b90646256aafdfc9dc6f06d544fc
                                                        • Opcode Fuzzy Hash: 563643a3e2a8902866fd6c68c65f8ff2608c0d87b9d30f1cc720a37c5bd0a50c
                                                        • Instruction Fuzzy Hash: 7F4114B1200A4482FA66DF57F884BE927A1F79DBC4F554526AF0E877B1DA38C586C700

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 438 1400057c0-1400057dc 439 14000580b-14000582f call 1400057b0 438->439 440 1400057de 438->440 445 140005a56-140005a68 439->445 447 140005835-140005849 call 1400057b0 439->447 442 1400057e5-1400057ea 440->442 443 1400057f0-1400057f3 442->443 443->445 446 1400057f9-1400057ff 443->446 446->443 448 140005801-140005806 446->448 451 14000585f-140005871 447->451 448->445 452 140005853-14000585d 451->452 453 140005873-14000588d call 1400057b0 451->453 452->451 454 1400058b5-1400058b8 452->454 459 14000588f-1400058b1 call 1400057b0 * 2 453->459 460 140005850 453->460 454->445 456 1400058be-1400058ea call 1400057b0 malloc 454->456 464 140005a4c 456->464 465 1400058f0-1400058f2 456->465 459->452 470 1400058b3 459->470 460->452 464->445 465->464 467 1400058f8-140005928 call 1400057b0 * 2 465->467 474 140005930-140005947 467->474 470->456 475 140005a23-140005a2b 474->475 476 14000594d-140005953 474->476 479 140005a36-140005a44 475->479 480 140005a2d-140005a30 475->480 477 1400059a2 476->477 478 140005955-140005973 call 1400057b0 476->478 483 1400059a7-1400059e9 call 1400057b0 * 2 477->483 486 140005980-14000599e 478->486 479->442 482 140005a4a 479->482 480->474 480->479 482->445 491 140005a18-140005a1f 483->491 492 1400059eb 483->492 486->486 488 1400059a0 486->488 488->483 491->475 493 1400059f0-1400059fc 492->493 494 140005a13 493->494 495 1400059fe-140005a11 493->495 494->491 495->493 495->494
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000032.00000002.4589795477.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                        • Associated: 00000032.00000002.4589744614.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589826496.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589854066.0000000140008000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589881322.0000000140009000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_50_2_140000000_conhost.jbxd
                                                        Similarity
                                                        • API ID: malloc
                                                        • String ID: $_$H_$\BaseNamedObjects\afxtekfxsti$^$^
                                                        • API String ID: 2803490479-334052985
                                                        • Opcode ID: 5fa1c398858ab756a92c6273b37516b0b1ae50538d784730ad0561803f0e6d1e
                                                        • Instruction ID: 1a801c663eebf89c967cc652b017f4fc04d6e18e9af12e932fe0075b521b2fe0
                                                        • Opcode Fuzzy Hash: 5fa1c398858ab756a92c6273b37516b0b1ae50538d784730ad0561803f0e6d1e
                                                        • Instruction Fuzzy Hash: 4971E3B6701A008BE766EF26B8407AB3791F38EBD9F445214FF4A573A1EB34C8509781

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 496 140002104-14000210b 497 140002111-140002128 EnterCriticalSection 496->497 498 140002218-140002221 496->498 499 14000220b-140002212 LeaveCriticalSection 497->499 500 14000212e-14000213c 497->500 501 140002272-140002280 498->501 502 140002223-14000222d 498->502 499->498 503 14000214d-140002159 TlsGetValue GetLastError 500->503 504 140002241-140002263 DeleteCriticalSection 502->504 505 14000222f 502->505 507 14000215b-14000215e 503->507 508 140002140-140002147 503->508 504->501 506 140002230-14000223f free 505->506 506->504 506->506 507->508 509 140002160-14000216d 507->509 508->499 508->503 509->508
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000032.00000002.4589795477.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                        • Associated: 00000032.00000002.4589744614.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589826496.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589854066.0000000140008000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589881322.0000000140009000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_50_2_140000000_conhost.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$DeleteEnterErrorLastLeaveValuefree
                                                        • String ID:
                                                        • API String ID: 3326252324-0
                                                        • Opcode ID: 219e6811cb4dbd0eaf4b720b5686c11eb9767625e90dbed7d4bbae1a474769ac
                                                        • Instruction ID: 71da54d2aca9ec38bd8cf65828b766720a55c5141fd63171e5496b79edfde151
                                                        • Opcode Fuzzy Hash: 219e6811cb4dbd0eaf4b720b5686c11eb9767625e90dbed7d4bbae1a474769ac
                                                        • Instruction Fuzzy Hash: 562113B5205A5092FA2BDB53FD443E823A5BB2CBD0F444021FF4A576B0DB78C9868700

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 543 140001e10-140001e2d 544 140001e3e-140001e48 543->544 545 140001e2f-140001e38 543->545 547 140001ea3-140001ea8 544->547 548 140001e4a-140001e53 544->548 545->544 546 140001f60-140001f69 545->546 547->546 551 140001eae-140001eb3 547->551 549 140001e55-140001e60 548->549 550 140001ecc-140001ed1 548->550 549->547 554 140001f23-140001f2d 550->554 555 140001ed3-140001ee2 signal 550->555 552 140001eb5-140001eba 551->552 553 140001efb-140001f0a call 140005d60 551->553 552->546 559 140001ec0 552->559 553->554 564 140001f0c-140001f10 553->564 557 140001f43-140001f45 554->557 558 140001f2f-140001f3f 554->558 555->554 560 140001ee4-140001ee8 555->560 557->546 558->557 559->554 561 140001eea-140001ef9 signal 560->561 562 140001f4e-140001f53 560->562 561->546 565 140001f5a 562->565 566 140001f12-140001f21 signal 564->566 567 140001f55 564->567 565->546 566->546 567->565
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000032.00000002.4589795477.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                        • Associated: 00000032.00000002.4589744614.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589826496.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589854066.0000000140008000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589881322.0000000140009000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_50_2_140000000_conhost.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: CCG
                                                        • API String ID: 0-1584390748
                                                        • Opcode ID: 3de0bc6c07db5a3900877cfc27d66ef88d8d5ac307be47936e0e183d85f56a5a
                                                        • Instruction ID: ab52e7b193850e4574a867d0ec6fdb73409e6e3475e62ec0eb085df6fd4049ba
                                                        • Opcode Fuzzy Hash: 3de0bc6c07db5a3900877cfc27d66ef88d8d5ac307be47936e0e183d85f56a5a
                                                        • Instruction Fuzzy Hash: EC215CB160150542FA7BDA17B5943FA1182A7CD7E4F298536BF19473F5DE3888828241

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 568 140001880-14000189c 569 1400018a2-1400018f9 call 140002420 call 140002660 568->569 570 140001a0f-140001a1f 568->570 569->570 575 1400018ff-140001910 569->575 576 140001912-14000191c 575->576 577 14000193e-140001941 575->577 578 14000194d-140001954 576->578 579 14000191e-140001929 576->579 577->578 580 140001943-140001947 577->580 583 140001956-140001961 578->583 584 14000199e-1400019a6 578->584 579->578 581 14000192b-14000193a 579->581 580->578 582 140001a20-140001a26 580->582 581->577 586 140001b87-140001b98 call 140001d40 582->586 587 140001a2c-140001a37 582->587 588 140001970-14000199c call 140001ba0 583->588 584->570 585 1400019a8-1400019c1 584->585 589 1400019df-1400019e7 585->589 587->584 590 140001a3d-140001a5f 587->590 588->584 593 1400019e9-140001a0d VirtualProtect 589->593 594 1400019d0-1400019dd 589->594 595 140001a7d-140001a97 590->595 593->594 594->570 594->589 598 140001b74-140001b82 call 140001d40 595->598 599 140001a9d-140001afa 595->599 598->586 605 140001b22-140001b26 599->605 606 140001afc-140001b0e 599->606 609 140001b2c-140001b30 605->609 610 140001a70-140001a77 605->610 607 140001b5c-140001b6c 606->607 608 140001b10-140001b20 606->608 607->598 612 140001b6f call 140001d40 607->612 608->605 608->607 609->610 611 140001b36-140001b57 call 140001ba0 609->611 610->584 610->595 611->607 612->598
                                                        APIs
                                                        • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140001247), ref: 00000001400019F9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000032.00000002.4589795477.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                        • Associated: 00000032.00000002.4589744614.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589826496.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589854066.0000000140008000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589881322.0000000140009000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_50_2_140000000_conhost.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
                                                        • API String ID: 544645111-395989641
                                                        • Opcode ID: c667dc6977e1ad6755672339da8102460607e3f3c6a2ade29b4ec71d9f3407dc
                                                        • Instruction ID: 043126c04cb609baffb415e0f6b01859f699c64fdfbedb126c5ad19c85170399
                                                        • Opcode Fuzzy Hash: c667dc6977e1ad6755672339da8102460607e3f3c6a2ade29b4ec71d9f3407dc
                                                        • Instruction Fuzzy Hash: 5B5126B6710A44D6EB62CF67F8407D92762B75DBE8F448221EB19177B4CB38C586C700

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 616 140001800-140001810 617 140001812-140001822 616->617 618 140001824 616->618 619 14000182b-140001867 call 140002290 fprintf 617->619 618->619
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000032.00000002.4589795477.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                        • Associated: 00000032.00000002.4589744614.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589826496.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589854066.0000000140008000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589881322.0000000140009000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_50_2_140000000_conhost.jbxd
                                                        Similarity
                                                        • API ID: fprintf
                                                        • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                        • API String ID: 383729395-3474627141
                                                        • Opcode ID: 8ab9b346c69e6b58b393154426e063c05e37c586a3a38a25c10748d33e801104
                                                        • Instruction ID: b81482b2ad7ce3b6f95a342960602fb1671662ff4384eed38f3dd9c5daba20ce
                                                        • Opcode Fuzzy Hash: 8ab9b346c69e6b58b393154426e063c05e37c586a3a38a25c10748d33e801104
                                                        • Instruction Fuzzy Hash: E5F09671614A4492E622EB76B9413ED6361E75D7C1F54D211FF4D67662DF38D182C300

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 622 14000219e-1400021a5 623 140002272-140002280 622->623 624 1400021ab-1400021c2 EnterCriticalSection 622->624 625 140002265-14000226c LeaveCriticalSection 624->625 626 1400021c8-1400021d6 624->626 625->623 627 1400021e9-1400021f5 TlsGetValue GetLastError 626->627 628 1400021f7-1400021fa 627->628 629 1400021e0-1400021e7 627->629 628->629 630 1400021fc-140002209 628->630 629->625 629->627 630->629
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000032.00000002.4589795477.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                        • Associated: 00000032.00000002.4589744614.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589826496.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589854066.0000000140008000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000032.00000002.4589881322.0000000140009000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_50_2_140000000_conhost.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterErrorLastLeaveValue
                                                        • String ID:
                                                        • API String ID: 682475483-0
                                                        • Opcode ID: 8d5e4087d8d3237533aca3fb0399f62f90020e524c136c0ade81304cfa87a66f
                                                        • Instruction ID: 30510f73f7ce196ebcd39b5dd0349e3e95b46a9c1ed33dd71523ed44c39a83f3
                                                        • Opcode Fuzzy Hash: 8d5e4087d8d3237533aca3fb0399f62f90020e524c136c0ade81304cfa87a66f
                                                        • Instruction Fuzzy Hash: 4401B6B6305A5092FA57DB63FE043D86365BB2CBD1F494021EF09536B4DBB9C9968300