Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
skuld3.exe

Overview

General Information

Sample name:skuld3.exe
Analysis ID:1545290
MD5:96cf5bfd737ba042e552c66fbd2d344e
SHA1:861e144cce53b756a81079923011ad87d6e3ce13
SHA256:a4a66b5826dbc95ed463bf1daaa417ae99ea8b1b27ddbacdceba94657babbafc
Tags:exeuser-NDA0E
Infos:

Detection

Skuld Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
UAC bypass detected (Fodhelper)
Yara detected Skuld Stealer
AI detected suspicious sample
Check if machine is in data center or colocation facility
Found many strings related to Crypto-Wallets (likely being stolen)
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Bypass UAC via Fodhelper.exe
Sigma detected: Files With System Process Name In Unsuspected Locations
Uses cmd line tools excessively to alter registry or file data
Creates a process in suspended mode (likely to inject code)
Creates or modifies windows services
Drops PE files
Enables debug privileges
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
PE file contains sections with non-standard names
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Stores large binary data to the registry
Yara detected Credential Stealer

Classification

  • System is w10x64
  • skuld3.exe (PID: 6896 cmdline: "C:\Users\user\Desktop\skuld3.exe" MD5: 96CF5BFD737BA042E552C66FBD2D344E)
    • conhost.exe (PID: 6916 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • attrib.exe (PID: 7164 cmdline: attrib +h +s C:\Users\user\Desktop\skuld3.exe MD5: 5037D8E6670EF1D89FB6AD435F12A9FD)
    • attrib.exe (PID: 6184 cmdline: attrib +h +s C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe MD5: 5037D8E6670EF1D89FB6AD435F12A9FD)
    • WMIC.exe (PID: 2180 cmdline: wmic csproduct get UUID MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
  • SecurityHealthSystray.exe (PID: 3272 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe" MD5: 96CF5BFD737BA042E552C66FBD2D344E)
    • conhost.exe (PID: 1740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3492 cmdline: cmd.exe /C fodhelper MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • fodhelper.exe (PID: 7080 cmdline: fodhelper MD5: 85018BE1FD913656BC9FF541F017EACD)
      • fodhelper.exe (PID: 6848 cmdline: "C:\Windows\system32\fodhelper.exe" MD5: 85018BE1FD913656BC9FF541F017EACD)
      • fodhelper.exe (PID: 6876 cmdline: "C:\Windows\system32\fodhelper.exe" MD5: 85018BE1FD913656BC9FF541F017EACD)
        • SecurityHealthSystray.exe (PID: 2108 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe" MD5: 96CF5BFD737BA042E552C66FBD2D344E)
          • conhost.exe (PID: 6160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • SecurityHealthSystray.exe (PID: 4304 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe" MD5: 96CF5BFD737BA042E552C66FBD2D344E)
    • conhost.exe (PID: 7112 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6876 cmdline: cmd.exe /C fodhelper MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • fodhelper.exe (PID: 3336 cmdline: fodhelper MD5: 85018BE1FD913656BC9FF541F017EACD)
      • fodhelper.exe (PID: 6656 cmdline: "C:\Windows\system32\fodhelper.exe" MD5: 85018BE1FD913656BC9FF541F017EACD)
      • fodhelper.exe (PID: 5312 cmdline: "C:\Windows\system32\fodhelper.exe" MD5: 85018BE1FD913656BC9FF541F017EACD)
        • SecurityHealthSystray.exe (PID: 6864 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe" MD5: 96CF5BFD737BA042E552C66FBD2D344E)
          • conhost.exe (PID: 2304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpJoeSecurity_SkuldStealerYara detected Skuld StealerJoe Security
      00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmpJoeSecurity_SkuldStealerYara detected Skuld StealerJoe Security
          00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 15 entries
            SourceRuleDescriptionAuthorStrings
            13.2.SecurityHealthSystray.exe.d70000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              13.2.SecurityHealthSystray.exe.d70000.0.unpackJoeSecurity_SkuldStealerYara detected Skuld StealerJoe Security
                0.2.skuld3.exe.940000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.skuld3.exe.940000.0.unpackJoeSecurity_SkuldStealerYara detected Skuld StealerJoe Security
                    16.2.SecurityHealthSystray.exe.d70000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      Click to see the 5 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: E.M. Anhaus (originally from Atomic Blue Detections, Tony Lambert), oscd.community: Data: Command: "C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe" , CommandLine: "C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe, NewProcessName: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe, OriginalFileName: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe, ParentCommandLine: "C:\Windows\system32\fodhelper.exe" , ParentImage: C:\Windows\System32\fodhelper.exe, ParentProcessId: 6876, ParentProcessName: fodhelper.exe, ProcessCommandLine: "C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe" , ProcessId: 2108, ProcessName: SecurityHealthSystray.exe
                      Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\skuld3.exe, ProcessId: 6896, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\skuld3.exe, ProcessId: 6896, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio Universal Service
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: skuld3.exeAvira: detected
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeAvira: detection malicious, Label: TR/AD.GenSteal.dwlre
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeReversingLabs: Detection: 44%
                      Source: skuld3.exeReversingLabs: Detection: 44%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 89.4% probability
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeJoe Sandbox ML: detected
                      Source: skuld3.exeJoe Sandbox ML: detected

                      Privilege Escalation

                      barindex
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeRegistry value created: NULL C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeRegistry value created: DelegateExecute Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeRegistry value created: NULL C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeRegistry value created: DelegateExecute Jump to behavior
                      Source: skuld3.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                      Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                      Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                      Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
                      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: ip-api.com
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.orgUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
                      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
                      Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                      Source: global trafficDNS traffic detected: DNS query: ip-api.com
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://ip-api.com/json
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: https://api.gofile.io/getServerhttps://%s.gofile.io/uploadFilesql:
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: https://api.ipify.org/-DisableIOAVProtection-DisableScriptScanning%s
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: https://avatars.githubusercontent.com/u/145487845?v=4sqlite:
                      Source: SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: https://discord.com/api/v9/users/
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: https://discordapp.com/api/webhooks/1293231846204903474/NlFoQQli1eEBiZ1mTgA4lGWcgDGUPQu-TH2KjA0djnkL
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: https://github.com/hackirby/wallets-injection/raw/main/atomic.asarhttps://github.com/hackirby/wallet
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: https://i.ibb.co/GFZ2tHJ/shakabaiano-1674282487.jpgJSON
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: https://raw.githubusercontent.com/hackirby/discord-injection/main/injection.js1157920892103562487626
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                      Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@32/1@2/2
                      Source: C:\Users\user\Desktop\skuld3.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7112:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6916:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6160:120:WilError_03
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeMutant created: \Sessions\1\BaseNamedObjects\Global\3575651c-bb47-448e-a514-22865732bbc
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1740:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2304:120:WilError_03
                      Source: C:\Windows\System32\cmd.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %s.'rbu_tmp_%q' AS SELECT *%s FROM '%q' WHERE 0;
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
                      Source: skuld3.exeReversingLabs: Detection: 44%
                      Source: C:\Users\user\Desktop\skuld3.exeFile read: C:\Users\user\Desktop\skuld3.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\skuld3.exe "C:\Users\user\Desktop\skuld3.exe"
                      Source: C:\Users\user\Desktop\skuld3.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\skuld3.exeProcess created: C:\Windows\System32\attrib.exe attrib +h +s C:\Users\user\Desktop\skuld3.exe
                      Source: C:\Users\user\Desktop\skuld3.exeProcess created: C:\Windows\System32\attrib.exe attrib +h +s C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
                      Source: C:\Users\user\Desktop\skuld3.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get UUID
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe "C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe"
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C fodhelper
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe fodhelper
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe"
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe"
                      Source: C:\Windows\System32\fodhelper.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe "C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe"
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe "C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe"
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C fodhelper
                      Source: C:\Windows\System32\fodhelper.exeProcess created: C:\Windows\System32\fodhelper.exe fodhelper
                      Source: C:\Windows\System32\fodhelper.exeProcess created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe"
                      Source: C:\Windows\System32\fodhelper.exeProcess created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe"
                      Source: C:\Windows\System32\fodhelper.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe "C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe"
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\skuld3.exeProcess created: C:\Windows\System32\attrib.exe attrib +h +s C:\Users\user\Desktop\skuld3.exeJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeProcess created: C:\Windows\System32\attrib.exe attrib +h +s C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get UUIDJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C fodhelperJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe fodhelperJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe" Jump to behavior
                      Source: C:\Windows\System32\fodhelper.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe "C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C fodhelperJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe fodhelperJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe" Jump to behavior
                      Source: C:\Windows\System32\fodhelper.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe "C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe" Jump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\attrib.exeSection loaded: ulib.dllJump to behavior
                      Source: C:\Windows\System32\attrib.exeSection loaded: fsutilext.dllJump to behavior
                      Source: C:\Windows\System32\attrib.exeSection loaded: ulib.dllJump to behavior
                      Source: C:\Windows\System32\attrib.exeSection loaded: fsutilext.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeSection loaded: samlib.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: pcacli.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: ieframe.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: mlang.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: mrmcorer.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windows.staterepositorycore.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windows.ui.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windowmanagementapi.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: inputhost.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: bcp47mrm.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeSection loaded: samlib.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: pcacli.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: ieframe.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: mlang.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: mrmcorer.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windows.staterepositorycore.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windows.ui.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: windowmanagementapi.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: inputhost.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\fodhelper.exeSection loaded: bcp47mrm.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Windows\System32\fodhelper.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\16.0\Access\Capabilities\UrlAssociationsJump to behavior
                      Source: skuld3.exeStatic file information: File size 3319808 > 1048576
                      Source: skuld3.exeStatic PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x32a400
                      Source: skuld3.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: skuld3.exeStatic PE information: section name: UPX2
                      Source: SecurityHealthSystray.exe.0.drStatic PE information: section name: UPX2
                      Source: initial sampleStatic PE information: section name: UPX0
                      Source: initial sampleStatic PE information: section name: UPX1
                      Source: initial sampleStatic PE information: section name: UPX0
                      Source: initial sampleStatic PE information: section name: UPX1

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Users\user\Desktop\skuld3.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeProcess created: attrib.exe
                      Source: C:\Users\user\Desktop\skuld3.exeProcess created: attrib.exe
                      Source: C:\Users\user\Desktop\skuld3.exeProcess created: attrib.exeJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeProcess created: attrib.exeJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeJump to dropped file
                      Source: C:\Users\user\Desktop\skuld3.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\partmgrJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Realtek HD Audio Universal ServiceJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Realtek HD Audio Universal ServiceJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
                      Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT UUID FROM Win32_ComputerSystemProduct
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: Handshakemath/randClassINETAuthorityquestionsinfo_hashuser32.dllvmwaretrayxenservicevmwareusermegadumperscyllahidevirtualboxPxmdUOpVyxQ9IATRKPRHPaul userd1bnJkfVlHQarZhrdBpjPC-DANIELEqarzhrdbpjq9iatrkprhd1bnjkfvlhJUDES-DOJOGJAm1NxXVmdOuyo8RV7105KvAUQKPQOf20XqH4VLpxmduopvyxJcOtj17dZxcM0uEGN4do64F2tKIqO5GexwjQdjXGfNBDSlDTXYmcafee.comnorton.comzillya.comsophos.comclamav.netpowershellsystemrootlogins.txtLogin DataChrome SxS360BrowserUR BrowserdiscordptbinitiationByHackirbysecure.datauto_startsteam-tempEpic Games.minecraftRiot GamesShowWindow-NoProfileExtensionsExodusWeb3PaliWalletwinsymlink/dev/stdinCreateFileterminatedowner diedDnsQuery_WGetIfEntryCancelIoExCreatePipeGetVersionWSACleanupWSAStartupgetsockoptsetsockoptdnsapi.dllws2_32.dllexecerrdotSYSTEMROOTavatar_url
                      Source: SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: tznamerdtscppopcntempty rune1 RGBA64Gray16X25519%w%.0wAcceptServercmd/goheaderAnswerLengthSTREETavx512rdrandrdseedwebhookcryptosregeditollydbgdf5servvmusrvctaskmgrqemu-gafakenetfiddlerdumpcapsharpodsnifferpetoolsharmonycharlesphantomx32_dbgx64_dbgwpe pro3u2v9m8SERVER1MIKE-PCNETTYPClisa-pcHEUeRzljohn-pcZELJAVALISA-PCWILEYPCJOHN-PCserver1wileypcAIDANPC7DBgdxuJAW4Dz0cMkNdS6Mr.Nonej7pNjWMequZE3Jo6jdigqKUv3bT4ymONofgheuerzlIVwoKUFavg.comDefaultFirefoxMercuryAddressNetworkCookiesHistorykey4.dbThoriumIridiumVivaldiOrbitumMaxthonK-MelonSputnikSlimjetOperaGXaccountaddressDesktopcontentAppDatadiscordmodulesRoamingversionWindowsFeatherBadlionleveldbAPPDATACaption%.2f GBprofileDiscord`Nitro`.sqlitecmd.exeWallets\ArmoryCoinomiBinanceMartianPhantomSafepalSolfareiWalletLICENSEProtectfloat32float64readdirconsoleabortedCopySidWSARecvWSASendconnectsignal runningPATHEXT_pragmapragma _txlocknumber nil keyUpgradeTrailersocks5hHEADERSReferer flags= len=%d (conn) %v=%v,expiresrefererrefreshtrailerGODEBUGname %q:method:schemeupgrade:statushttp://chunkedCreatedIM UsedCONNECT19531259765625FreeSidSleepExinvaliduintptrSwapperChanDir Value>Convert\\.\UNCforcegcallocmWcpuprofallocmRunknowngctraceIO waitsyscallwaitingforevernetworkUNKNOWN:events, goid= s=nil
                      Source: SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: OpenEventAUnlockFileunrechableno consoleenter-fastRIPEMD-160impossible[:^alnum:][:^alpha:][:^ascii:][:^blank:][:^cntrl:][:^digit:][:^graph:][:^lower:][:^print:][:^punct:][:^space:][:^upper:][:xdigit:]rune <nil>image: NewBM????res binderres masterresumptionexp masterContent-IdMessage-IdHTTP_PROXYhttp_proxyhttp2debugcrypto/tlsParseAddr(invalid IPClassCSNETClassCHAOSAdditionalskipping: SHA256-RSASHA384-RSASHA512-RSADSA-SHA256ECDSA-SHA1base_noncePOSTALCODEavx512ifmaavx512vbmiavx512vnniavx512gfniavx512vaesavx512bf16EnumWindowsOpenProcessvboxservicecodecrackerBAROSINO-PCCOFFEE-SHOParchibaldpcARCHIBALDPCLANTECH-LLCALENMOOS-PC9yjCPsEYIMHnoK4zG7ZhOfOgJb6GqgK0OnZAp7UBVaS1xPLyvzr8sgCBvJChRPnsxnykj0egq7fzeuHUQIuwoEFUkFu0lQwgX5PryjIJKIrOMs4tgiizsLimS95.25.81.2435.199.6.1334.105.0.2780.211.0.9778.139.8.50totalav.comadaware.comThunderbirdTarget Pathcookies.txt%-70s %-70shistory.txtdescriptionCrypt32.dllLocal StateCentBrowserFiles Foundmot_de_passFatal ErrorMessageBoxW`
                      Source: fodhelper.exe, 0000000C.00000002.1764085757.000001D581E69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: (scan MB in pacer: % CPU ( zombie, j0 = head = panic: nmsys= locks= dying= allocs m->g0= pad1= pad2= text= minpc= value= (scan)types : type TuesdayJanuaryOctoberMUI_StdMUI_DltAvestanBengaliBrailleCypriotDeseretElbasanElymaicGranthaHanunooKannadaMakasarMandaicMarchenMultaniMyanmarOsmanyaSharadaShavianSiddhamSinhalaSogdianSoyomboTagalogTibetanTirhutapdh.dllwindowswsarecvwsasendlookup writetoavx512fSHA-224SHA-256SHA-384SHA-512InstAltInstNopalt -> nop -> any -> NRGBA64tls3desderivedInitialExpiresSubjectcharsetos/execruntimeanswers]?)(.*)Ed25519MD5-RSAserial:eae_prk2.5.4.62.5.4.32.5.4.52.5.4.72.5.4.82.5.4.9amxtileamxint8amxbf16osxsavevmtoolsdvboxtraypestudiovmacthlpksdumperdebuggerstrongodgraywolf0harmonyreversalUSERNAMEEIEEIFYEGBQHURCCORXGKKZCoreleepcJBYQTQBOMARCI-PClmVwjj9bGRXNNIIELUCAS-PCjulia-pcXGNSVODUESPNHOOLORELEEPCVONRAHELTMKNGOMUJULIA-PC05h00Gi05ISYH9SHICQja5iTQZSBJVWMUspG1y1CecVtZ5wEBUiA1hkmOZFUCOD6o8yTi52Th7dk1xPrQORxJKNkgL50ksOpSqgFOf3Gj.seancedxd8DJ7clmvwjj9beset.com-CommandDisabled0.0.0.0 Web DataWaterfoxK-MeleonCyberfoxBlackHawUsernamePasswordBrowsers```%s```ChromiumElementsCatalinaQIP SurfpasswordbancairemetamaskdatabasePicturesOneDriveindex.jsSettingssettings.featherNovolinealts.txtPaladiumgames-%s
                      Source: SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: res binderres masterresumptionexp masterContent-IdMessage-IdHTTP_PROXYhttp_proxyhttp2debugcrypto/tlsParseAddr(invalid IPClassCSNETClassCHAOSAdditionalskipping: SHA256-RSASHA384-RSASHA512-RSADSA-SHA256ECDSA-SHA1base_noncePOSTALCODEavx512ifmaavx512vbmiavx512vnniavx512gfniavx512vaesavx512bf16EnumWindowsOpenProcessvboxservicecodecrackerBAROSINO-PCCOFFEE-SHOParchibaldpcARCHIBALDPCLANTECH-LLCALENMOOS-PC9yjCPsEYIMHnoK4zG7ZhOfOgJb6GqgK0OnZAp7UBVaS1xPLyvzr8sgCBvJChRPnsxnykj0egq7fzeuHUQIuwoEFUkFu0lQwgX5PryjIJKIrOMs4tgiizsLimS95.25.81.2435.199.6.1334.105.0.2780.211.0.9778.139.8.50totalav.comadaware.comThunderbirdTarget Pathcookies.txt%-70s %-70shistory.txtdescriptionCrypt32.dllLocal StateCentBrowserFiles Foundmot_de_passFatal ErrorMessageBoxW`
                      Source: SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: max=scav ptr ] = (usageinit ms, fault tab= top=[...], fp:MarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930monthGreekAdlamBamumBatakBuhidDograKhmerLatinLimbuNushuOghamOriyaOsageRunicTakriTamilcpu%dfilesimap2imap3imapspop3shostsrouteparsesse41sse42ssse3SHA-1matchrune NRGBAtls: Earlyutf-8%s*%dtext/bad n (at ClassP-224P-256P-384P-521ECDSAx32dbgvmsrvcprl_ccx96dbgdbgclrde4dotwindbgpc-retx64dbgghidraVMwarevmwarexc64zb8VizSM373836ALIONETVM-PCgeorgeGRAFPCT00917test42XC64ZB5Y3y73serverh86LHDDdQrgcQfofoGlK3zMRPgfV1XIZZuXj8vizsmASPNETS7WjufUser01tHiF2TGjBsjbLouiseGGw8NR3W1GJT-ForceattribNumberembedssqliteChromeChedotKometaFenrirCoowonLiebaoDragonCocCocYandexsecretpaypalbanquewalletcryptoexodusatomiccomptecreditpermisnumberbackupconfigVideosinlinefieldsConfigIntentMeteorImpactPolyMCBypassSystem
                      Source: skuld3.exe, 00000000.00000002.1698605903.00000229D3BBC000.00000004.00000020.00020000.00000000.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1774461999.000002CB3F34C000.00000004.00000020.00020000.00000000.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1775758684.000001F43DD1D000.00000004.00000020.00020000.00000000.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1861621099.000001986B2AD000.00000004.00000020.00020000.00000000.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1862181006.0000021F341CD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\System32\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeProcess created: C:\Windows\System32\attrib.exe attrib +h +s C:\Users\user\Desktop\skuld3.exeJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeProcess created: C:\Windows\System32\attrib.exe attrib +h +s C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeJump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get UUIDJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C fodhelperJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe fodhelperJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe" Jump to behavior
                      Source: C:\Windows\System32\fodhelper.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe "C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C fodhelperJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe fodhelperJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe" Jump to behavior
                      Source: C:\Windows\System32\fodhelper.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe "C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe" Jump to behavior
                      Source: C:\Users\user\Desktop\skuld3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 13.2.SecurityHealthSystray.exe.d70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.skuld3.exe.940000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.SecurityHealthSystray.exe.d70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.SecurityHealthSystray.exe.d70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.SecurityHealthSystray.exe.d70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: skuld3.exe PID: 6896, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecurityHealthSystray.exe PID: 3272, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecurityHealthSystray.exe PID: 2108, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecurityHealthSystray.exe PID: 4304, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecurityHealthSystray.exe PID: 6864, type: MEMORYSTR
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: %s profiles/invitesBytecoinEthereumElectrum%s\%s\%sCoinbaseCrocobitMetamaskStarcoinProgramsapp.asarGoStringFullPathno anodeCancelIoReadFileAcceptExWSAIoctlshutdownfile[%d]usernameicon_url%s:%d:%sbad instkernel32hijackedNO_ERRORPRIORITYSETTINGSLocation data=%q incr=%v ping=%qif-matchlocationhttp/1.1HTTP/2.0HTTP/1.1no-cacheContinueAcceptedConflict48828125infinitystrconv.parsing ParseIntcompressEqualSidSetEventIsWindowrecvfromnil PoolscavengepollDesctraceBufdeadlockraceFinipanicnilcgocheckrunnable procid rax rbx rcx rdx rdi rsi rbp rsp r8 r9 r10 r11 r12 r13 r14 r15 rip rflags cs fs gs is not pointer packed=BAD RANK status unknown(trigger= npages= nalloc= nfreed=[signal newval= mcount= bytes, stack=[ minLC= maxpc= stack=[ minutes status= etypes wsaioctlThursdaySaturdayFebruaryNovemberDecember%!Month(ZONEINFOArmenianBalineseBopomofoBugineseCherokeeCyrillicDuployanEthiopicGeorgianGujaratiGurmukhiHiraganaJavaneseKatakanaKayah_LiLinear_ALinear_BMahajaniOl_ChikiPhags_PaTagbanwaTai_ThamTai_VietTifinaghUgariticVithkuqinetedns0[::1]:53continue_gatewayinvalid address readfromunixgram
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: - `` - Jaxx%s%sCoreEverMathNamiTrontruefilereadopensyncpipelinkStatquitbindidle.com.exe.bat.cmdUUIDPOSTtext asn1nullbooljson'\''Host&lt;&gt;http1080DATAPINGEtag0x%xdateetagfromhostvaryDategzip%x
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: pacer: assist ratio=workbuf is not emptybad use of bucket.mpbad use of bucket.bpruntime: double waitpreempt off reason: forcegc: phase errorgopark: bad g statusgo of nil func valueselectgo: bad wakeupsemaRoot rotateRightreflect.makeFuncStubtrace: out of memorywirep: already in gotime: invalid numberJordan Standard TimeArabic Standard TimeIsrael Standard TimeTaipei Standard TimeAzores Standard TimeTurkey Standard TimeEgyptian_HieroglyphsMeroitic_Hieroglyphsinvalid DNS responsegetadaptersaddressesunexpected network: form-data; name="%s"EnterCriticalSectionGetFileAttributesExALeaveCriticalSectionSystemTimeToFileTimeGetSidLengthRequiredenter-recursive-loopnumber has no digitsexpression too largeinvalid repeat count[invalid char class]Bad chunk length: %dbad palette length: invalid image size: unknown PSK identitycertificate requiredgzip: invalid headerheader line too longx509usefallbackrootsmissing IPv6 addressunexpected characterflate: closed writerzlib: invalid headergetCert can't be nilinvalid UTF-8 stringx509: malformed spkiunsupported suite IDinvalid integer typesha3: Sum after ReadSafeArrayDestroyDataSafeArrayGetElemsizemodulus must be >= 0systemexplorerserviceSystemParametersInfoWwin32_VideoController-SubmitSamplesConsentcore.asar not in bodyDiscordTokenProtectordiscordtokenprotectorProtectionPayload.dllintegrity_checkmoduleUbisoft Game LauncherTous les utilisateurs\Exodus\exodus.walletreflect.Value.Complextrace/breakpoint trapuser defined signal 1user defined signal 2link has been severedpackage not installedblock device requiredstate not recoverableread-only file systemstale NFS file handleReadDirectoryChangesWNetGetJoinInformationLookupPrivilegeValueWAdjustTokenPrivilegesexec: already startedunsupported operationinternal error: rc %dsequence tag mismatchafter top-level valuein string escape codekey is not comparableclipboard unavailablenot dib format data: bufio: negative counthttp: nil Request.URLUNKNOWN_FRAME_TYPE_%dframe_ping_has_streamRoundTrip failure: %vUnhandled Setting: %vnet/http: nil Contextunknown address type command not supportedPrecondition RequiredInternal Server ErrorWindows Code Page 858186264514923095703125931322574615478515625GetVolumeInformationWEnableCounterForIoctlCM_Get_DevNode_StatusChangeServiceConfig2WDeregisterEventSourceEnumServicesStatusExWGetNamedSecurityInfoWSetNamedSecurityInfoWDwmGetWindowAttributeDwmSetWindowAttributeNtCreateNamedPipeFileSetupDiEnumDeviceInfoSetupUninstallOEMInfWWSALookupServiceNextWWTSEnumerateSessionsWbad type in compare: of unexported methodunexpected value stepreflect.Value.SetZeroreflect.Value.Pointerreflect.Value.SetUintNetUserGetLocalGroupsGetProfilesDirectoryWnegative shift amountsystem goroutine waitconcurrent map writes/gc/heap/allocs:bytesruntime: work.nwait= previous allocCount=, levelBits[level] = runtime: searchIdx = defer on system stackpanic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: inv
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: \Ethereum\keystore%s\extensions-tempreflect.Value.UintGetExitCodeProcesssegmentation faultoperation canceledno child processesconnection refusedRFS specific erroridentifier removedinput/output errormultihop attemptedfile name too longno locks availablestreams pipe errorLookupAccountNameWCreateFileMappingWGetFileAttributesWSetFileAttributesWCommandLineToArgvWunknown _txlock %qnon-minimal lengthtruncated sequencesequence truncatedcannot be negativeexceeded max depthinvalid character in numeric literalcontext.Backgroundunsupported formatbufio: buffer fullhttp: blank cookiereceived from peerFLOW_CONTROL_ERRORframe_goaway_shortproxy-authenticateUNKNOWN_SETTING_%dGo-http-client/2.0Go-http-client/1.1Temporary RedirectPermanent RedirectMethod Not AllowedExpectation Failedbad Content-Lengthfield value for %qIBM Code Page 1047IBM Code Page 1140Macintosh Cyrillicvalue out of range298023223876953125GetPerformanceInfoCM_MapCrToWin32ErrCloseServiceHandleCreateWellKnownSidGetSidSubAuthorityMakeSelfRelativeSDQueryServiceStatusCertGetNameStringWPFXImportCertStoreGetBestInterfaceExClosePseudoConsoleEscapeCommFunctionGetCommModemStatusGetComputerNameExWGetCurrentThreadIdGetModuleFileNameWGetModuleHandleExWGetVolumePathNameWRemoveDllDirectoryTerminateJobObjectWriteProcessMemoryEnumProcessModulesGetModuleBaseNameWreflect.Value.Elemreflect.Value.Typereflect: Zero(nil)adaptivestackstartdontfreezetheworldtraceadvanceperiodtracebackancestorsgarbage collectionsync.RWMutex.RLockGC worker (active)stopping the worldwait until GC endsbad lfnode addresssystem page size (elem align too big but memory size /gc/pauses:seconds because dotdotdotruntime: npages = invalid skip valueruntime: range = {index out of rangeruntime: gp: gp=runtime: getg: g=forEachP: not done in async preempt
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: max=scav ptr ] = (usageinit ms, fault tab= top=[...], fp:MarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930monthGreekAdlamBamumBatakBuhidDograKhmerLatinLimbuNushuOghamOriyaOsageRunicTakriTamilcpu%dfilesimap2imap3imapspop3shostsrouteparsesse41sse42ssse3SHA-1matchrune NRGBAtls: Earlyutf-8%s*%dtext/bad n (at ClassP-224P-256P-384P-521ECDSAx32dbgvmsrvcprl_ccx96dbgdbgclrde4dotwindbgpc-retx64dbgghidraVMwarevmwarexc64zb8VizSM373836ALIONETVM-PCgeorgeGRAFPCT00917test42XC64ZB5Y3y73serverh86LHDDdQrgcQfofoGlK3zMRPgfV1XIZZuXj8vizsmASPNETS7WjufUser01tHiF2TGjBsjbLouiseGGw8NR3W1GJT-ForceattribNumberembedssqliteChromeChedotKometaFenrirCoowonLiebaoDragonCocCocYandexsecretpaypalbanquewalletcryptoexodusatomiccomptecreditpermisnumberbackupconfigVideosinlinefieldsConfigIntentMeteorImpactPolyMCBypassSystem
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: %s profiles/invitesBytecoinEthereumElectrum%s\%s\%sCoinbaseCrocobitMetamaskStarcoinProgramsapp.asarGoStringFullPathno anodeCancelIoReadFileAcceptExWSAIoctlshutdownfile[%d]usernameicon_url%s:%d:%sbad instkernel32hijackedNO_ERRORPRIORITYSETTINGSLocation data=%q incr=%v ping=%qif-matchlocationhttp/1.1HTTP/2.0HTTP/1.1no-cacheContinueAcceptedConflict48828125infinitystrconv.parsing ParseIntcompressEqualSidSetEventIsWindowrecvfromnil PoolscavengepollDesctraceBufdeadlockraceFinipanicnilcgocheckrunnable procid rax rbx rcx rdx rdi rsi rbp rsp r8 r9 r10 r11 r12 r13 r14 r15 rip rflags cs fs gs is not pointer packed=BAD RANK status unknown(trigger= npages= nalloc= nfreed=[signal newval= mcount= bytes, stack=[ minLC= maxpc= stack=[ minutes status= etypes wsaioctlThursdaySaturdayFebruaryNovemberDecember%!Month(ZONEINFOArmenianBalineseBopomofoBugineseCherokeeCyrillicDuployanEthiopicGeorgianGujaratiGurmukhiHiraganaJavaneseKatakanaKayah_LiLinear_ALinear_BMahajaniOl_ChikiPhags_PaTagbanwaTai_ThamTai_VietTifinaghUgariticVithkuqinetedns0[::1]:53continue_gatewayinvalid address readfromunixgram
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: invalid escape sequenceunsupported certificateno application protocolech accept confirmationCLIENT_TRAFFIC_SECRET_0SERVER_TRAFFIC_SECRET_0QUICEncryptionLevel(%v)varint integer overflowexit hook invoked panicpattern bits too long: too many pointers (>10)segment length too longunpacking Question.Nameunpacking Question.Typeskipping Question Classflate: internal error: invalid PrintableStringx509: malformed UTCTimex509: invalid key usagex509: malformed versionVariantTimeToSystemTimeSafeArrayCreateVectorExP224 point not on curveP256 point not on curveP384 point not on curveP521 point not on curveinvalid scalar encodingGetWindowThreadProcessId-EnableNetworkProtection\Coinomi\Coinomi\walletsfloating point exceptionconnection reset by peerlevel 2 not synchronizedlink number out of rangeout of streams resourcesfunction not implementedstructure needs cleaningnot supported by windowsCertFreeCertificateChainCreateToolhelp32SnapshotGetUserProfileDirectoryWGetProcessImageFileNameWexec: Stdout already setskuld - made by hackirbyjson: unsupported type: RegisterClipboardFormatAinvalid argument to Intnunexpected buffer len=%vinvalid pseudo-header %qframe_headers_prio_shortinvalid request :path %qread_frame_conn_error_%sapplication/octet-streamRequest Entity Too Largehttp: nil Request.Header116415321826934814453125582076609134674072265625AllocateAndInitializeSidBuildSecurityDescriptorWAssignProcessToJobObjectGenerateConsoleCtrlEventGetMaximumProcessorCountGetNamedPipeHandleStateWSetConsoleCursorPositionSetDefaultDllDirectoriesNtQuerySystemInformationSetupDiCreateDeviceInfoWSetupDiGetSelectedDeviceSetupDiSetSelectedDevicetracecheckstackownershiphash of unhashable type span has no free objectsruntime: found obj at *(runtime: VirtualFree of /cgo/go-to-c-calls:calls/gc/heap/objects:objects/sched/latencies:secondsqueuefinalizer during GCupdate during transitionruntime: markroot index can't scan our own stackgcDrainN phase incorrectpageAlloc: out of memoryruntime: p.searchAddr = range partially overlapsstack trace unavailable
                      Source: skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: \Ethereum\keystore%s\extensions-tempreflect.Value.UintGetExitCodeProcesssegmentation faultoperation canceledno child processesconnection refusedRFS specific erroridentifier removedinput/output errormultihop attemptedfile name too longno locks availablestreams pipe errorLookupAccountNameWCreateFileMappingWGetFileAttributesWSetFileAttributesWCommandLineToArgvWunknown _txlock %qnon-minimal lengthtruncated sequencesequence truncatedcannot be negativeexceeded max depthinvalid character in numeric literalcontext.Backgroundunsupported formatbufio: buffer fullhttp: blank cookiereceived from peerFLOW_CONTROL_ERRORframe_goaway_shortproxy-authenticateUNKNOWN_SETTING_%dGo-http-client/2.0Go-http-client/1.1Temporary RedirectPermanent RedirectMethod Not AllowedExpectation Failedbad Content-Lengthfield value for %qIBM Code Page 1047IBM Code Page 1140Macintosh Cyrillicvalue out of range298023223876953125GetPerformanceInfoCM_MapCrToWin32ErrCloseServiceHandleCreateWellKnownSidGetSidSubAuthorityMakeSelfRelativeSDQueryServiceStatusCertGetNameStringWPFXImportCertStoreGetBestInterfaceExClosePseudoConsoleEscapeCommFunctionGetCommModemStatusGetComputerNameExWGetCurrentThreadIdGetModuleFileNameWGetModuleHandleExWGetVolumePathNameWRemoveDllDirectoryTerminateJobObjectWriteProcessMemoryEnumProcessModulesGetModuleBaseNameWreflect.Value.Elemreflect.Value.Typereflect: Zero(nil)adaptivestackstartdontfreezetheworldtraceadvanceperiodtracebackancestorsgarbage collectionsync.RWMutex.RLockGC worker (active)stopping the worldwait until GC endsbad lfnode addresssystem page size (elem align too big but memory size /gc/pauses:seconds because dotdotdotruntime: npages = invalid skip valueruntime: range = {index out of rangeruntime: gp: gp=runtime: getg: g=forEachP: not done in async preempt
                      Source: Yara matchFile source: 13.2.SecurityHealthSystray.exe.d70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.skuld3.exe.940000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.SecurityHealthSystray.exe.d70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.SecurityHealthSystray.exe.d70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.SecurityHealthSystray.exe.d70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: skuld3.exe PID: 6896, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecurityHealthSystray.exe PID: 3272, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecurityHealthSystray.exe PID: 2108, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecurityHealthSystray.exe PID: 4304, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecurityHealthSystray.exe PID: 6864, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 13.2.SecurityHealthSystray.exe.d70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.skuld3.exe.940000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.SecurityHealthSystray.exe.d70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.SecurityHealthSystray.exe.d70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.SecurityHealthSystray.exe.d70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: skuld3.exe PID: 6896, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecurityHealthSystray.exe PID: 3272, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecurityHealthSystray.exe PID: 2108, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecurityHealthSystray.exe PID: 4304, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecurityHealthSystray.exe PID: 6864, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                      Windows Management Instrumentation
                      1
                      Windows Service
                      1
                      Windows Service
                      1
                      Masquerading
                      OS Credential Dumping211
                      Security Software Discovery
                      Remote Services1
                      Data from Local System
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Command and Scripting Interpreter
                      1
                      Registry Run Keys / Startup Folder
                      11
                      Process Injection
                      1
                      Modify Registry
                      LSASS Memory1
                      Virtualization/Sandbox Evasion
                      Remote Desktop ProtocolData from Removable Media1
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAt1
                      DLL Side-Loading
                      1
                      Abuse Elevation Control Mechanism
                      1
                      Virtualization/Sandbox Evasion
                      Security Account Manager1
                      Process Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                      Registry Run Keys / Startup Folder
                      11
                      Process Injection
                      NTDS1
                      System Network Configuration Discovery
                      Distributed Component Object ModelInput Capture3
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                      DLL Side-Loading
                      1
                      Abuse Elevation Control Mechanism
                      LSA Secrets1
                      File and Directory Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Obfuscated Files or Information
                      Cached Domain Credentials13
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      Install Root Certificate
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      Software Packing
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                      DLL Side-Loading
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1545290 Sample: skuld3.exe Startdate: 30/10/2024 Architecture: WINDOWS Score: 100 57 ip-api.com 2->57 59 api.ipify.org 2->59 65 Antivirus / Scanner detection for submitted sample 2->65 67 Multi AV Scanner detection for submitted file 2->67 69 Yara detected Skuld Stealer 2->69 71 5 other signatures 2->71 10 skuld3.exe 2 2 2->10         started        15 SecurityHealthSystray.exe 2 1 2->15         started        17 SecurityHealthSystray.exe 2 1 2->17         started        signatures3 process4 dnsIp5 61 ip-api.com 208.95.112.1, 49731, 80 TUT-ASUS United States 10->61 63 api.ipify.org 104.26.13.205, 443, 49730 CLOUDFLARENETUS United States 10->63 55 C:\Users\user\...\SecurityHealthSystray.exe, PE32+ 10->55 dropped 73 Installs new ROOT certificates 10->73 75 Found many strings related to Crypto-Wallets (likely being stolen) 10->75 77 Uses cmd line tools excessively to alter registry or file data 10->77 19 WMIC.exe 1 10->19         started        21 conhost.exe 10->21         started        23 attrib.exe 1 10->23         started        25 attrib.exe 1 10->25         started        79 Antivirus detection for dropped file 15->79 81 Multi AV Scanner detection for dropped file 15->81 83 UAC bypass detected (Fodhelper) 15->83 85 Machine Learning detection for dropped file 15->85 27 cmd.exe 2 15->27         started        29 conhost.exe 15->29         started        31 cmd.exe 2 17->31         started        33 conhost.exe 17->33         started        file6 signatures7 process8 process9 35 fodhelper.exe 12 27->35         started        37 fodhelper.exe 27->37         started        39 fodhelper.exe 27->39         started        41 fodhelper.exe 12 31->41         started        43 fodhelper.exe 31->43         started        45 fodhelper.exe 31->45         started        process10 47 SecurityHealthSystray.exe 1 35->47         started        49 SecurityHealthSystray.exe 1 41->49         started        process11 51 conhost.exe 47->51         started        53 conhost.exe 49->53         started       

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      skuld3.exe45%ReversingLabsWin64.Trojan.TMPNStealer
                      skuld3.exe100%AviraTR/AD.GenSteal.dwlre
                      skuld3.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe100%AviraTR/AD.GenSteal.dwlre
                      C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe45%ReversingLabsWin64.Trojan.TMPNStealer
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://api.ipify.org/0%URL Reputationsafe
                      http://ip-api.com/json0%URL Reputationsafe
                      http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      api.ipify.org
                      104.26.13.205
                      truetrue
                        unknown
                        ip-api.com
                        208.95.112.1
                        truetrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          https://api.ipify.org/true
                          • URL Reputation: safe
                          unknown
                          http://ip-api.com/line/?fields=hostingfalse
                          • URL Reputation: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://discordapp.com/api/webhooks/1293231846204903474/NlFoQQli1eEBiZ1mTgA4lGWcgDGUPQu-TH2KjA0djnkLskuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpfalse
                            unknown
                            https://github.com/hackirby/wallets-injection/raw/main/atomic.asarhttps://github.com/hackirby/walletskuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpfalse
                              unknown
                              https://raw.githubusercontent.com/hackirby/discord-injection/main/injection.js1157920892103562487626skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpfalse
                                unknown
                                https://avatars.githubusercontent.com/u/145487845?v=4sqlite:skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpfalse
                                  unknown
                                  https://api.ipify.org/-DisableIOAVProtection-DisableScriptScanning%sskuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmptrue
                                    unknown
                                    https://api.gofile.io/getServerhttps://%s.gofile.io/uploadFilesql:skuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpfalse
                                      unknown
                                      https://i.ibb.co/GFZ2tHJ/shakabaiano-1674282487.jpgJSONskuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpfalse
                                        unknown
                                        http://ip-api.com/jsonskuld3.exe, 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, SecurityHealthSystray.exe, 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://discord.com/api/v9/users/SecurityHealthSystray.exe, 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmpfalse
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          208.95.112.1
                                          ip-api.comUnited States
                                          53334TUT-ASUStrue
                                          104.26.13.205
                                          api.ipify.orgUnited States
                                          13335CLOUDFLARENETUStrue
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1545290
                                          Start date and time:2024-10-30 11:30:06 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 5m 41s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:27
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:1
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:skuld3.exe
                                          Detection:MAL
                                          Classification:mal100.troj.spyw.expl.evad.winEXE@32/1@2/2
                                          EGA Information:Failed
                                          HCA Information:
                                          • Successful, ratio: 100%
                                          • Number of executed functions: 0
                                          • Number of non-executed functions: 0
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, consent.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • VT rate limit hit for: skuld3.exe
                                          TimeTypeDescription
                                          06:30:57API Interceptor1x Sleep call for process: WMIC.exe modified
                                          10:30:56AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Realtek HD Audio Universal Service C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
                                          10:31:04AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Realtek HD Audio Universal Service C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          208.95.112.1FixTsDfhiC.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                                          • ip-api.com/line/?fields=hosting
                                          file.exeGet hashmaliciousWhiteSnake StealerBrowse
                                          • ip-api.com/line?fields=query,country
                                          Comprobante de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                          • ip-api.com/line/?fields=hosting
                                          O3o5Xzk5Wd.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                          • ip-api.com/line/?fields=hosting
                                          bLaLoo4ET5.exeGet hashmaliciousQuasarBrowse
                                          • ip-api.com/json/
                                          sipari_.exeGet hashmaliciousAgentTeslaBrowse
                                          • ip-api.com/line/?fields=hosting
                                          Transferencia.docGet hashmaliciousQuasarBrowse
                                          • ip-api.com/json/
                                          SecuriteInfo.com.FileRepMalware.22561.28030.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                                          • ip-api.com/json
                                          file.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, Stealc, XWormBrowse
                                          • ip-api.com/line/?fields=hosting
                                          SecuriteInfo.com.Win64.Malware-gen.13500.20938.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                                          • ip-api.com/json
                                          104.26.13.205file.exeGet hashmaliciousUnknownBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousRDPWrap ToolBrowse
                                          • api.ipify.org/
                                          Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousUnknownBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, Stealc, VidarBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                                          • api.ipify.org/
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          ip-api.comFixTsDfhiC.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                                          • 208.95.112.1
                                          file.exeGet hashmaliciousWhiteSnake StealerBrowse
                                          • 208.95.112.1
                                          Comprobante de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          O3o5Xzk5Wd.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                          • 208.95.112.1
                                          bLaLoo4ET5.exeGet hashmaliciousQuasarBrowse
                                          • 208.95.112.1
                                          sipari_.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          Transferencia.docGet hashmaliciousQuasarBrowse
                                          • 208.95.112.1
                                          https://link.edgepilot.com/s/b064b0de/7_W48d8I8kGlXhrfD-hDUg?u=https://delivmodas.ks.infinitoag.com/Get hashmaliciousUnknownBrowse
                                          • 51.195.5.58
                                          SecuriteInfo.com.FileRepMalware.22561.28030.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                                          • 208.95.112.1
                                          file.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, Stealc, XWormBrowse
                                          • 208.95.112.1
                                          api.ipify.orgShipping documents 00039984849900044800.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 104.26.12.205
                                          z1Transaction_ID_REF2418_cmd.batGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                          • 172.67.74.152
                                          Purchase Order PO61000016222.exeGet hashmaliciousAgentTeslaBrowse
                                          • 104.26.12.205
                                          Statement JULY #U007e SEP 2024 USD 19,055.00.exeGet hashmaliciousAgentTeslaBrowse
                                          • 172.67.74.152
                                          EVER ABILITY V66 PARTICULARS.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 104.26.13.205
                                          MV. NORDRHONE VSL's PARTICULARS.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 104.26.13.205
                                          MUM - VESSEL'S PARTICULARS.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 104.26.13.205
                                          INVOICE.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 172.67.74.152
                                          Bill_Of _Lading.exeGet hashmaliciousAgentTeslaBrowse
                                          • 172.67.74.152
                                          Shipping documents 00029399400059.exeGet hashmaliciousAgentTeslaBrowse
                                          • 172.67.74.152
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          CLOUDFLARENETUSViridine84.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                          • 172.67.154.211
                                          https://railrent-railrent.powerappsportals.com/Get hashmaliciousUnknownBrowse
                                          • 172.67.140.116
                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                          • 188.114.96.3
                                          http://etf-remittance-payout.s3.us-east-1.amazonaws.com/DMwNjk0MTU2LWI2MTItNDg5My04YmZhLWNhMzBjZTMzO/jZTMzODU5NwBGAAAAAAA/doc.htmlGet hashmaliciousUnknownBrowse
                                          • 172.67.170.202
                                          https://onedrive.live.com/view.aspx?resid=8656653D19C3C7C0!s553e3fe901654d86bcc4ed44c7c05dd3&migratedtospo=true&redeem=aHR0cHM6Ly8xZHJ2Lm1zL28vYy84NjU2NjUzZDE5YzNjN2MwL0V1a19QbFZsQVlaTnZNVHRSTWZBWGRNQmtvbDQ2b1NlN1o5MGFiazNzS3lGSlE_ZT1UMnQ4S3Y&wd=target%28Sezione%20senza%20titolo.one%7C8d7e5173-6006-4648-a69d-e39e66e7041a%2FAblehnung%20Rechnung%20R15946098273-KU30_WE02%20Vom%2028%5C%2F%7Cd77916b9-b471-429a-a13e-74764563e56b%2F%29&wdorigin=NavigationUrlGet hashmaliciousUnknownBrowse
                                          • 104.21.79.135
                                          INVOICE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                          • 188.114.96.3
                                          file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                          • 188.114.96.3
                                          file.exeGet hashmaliciousStealc, VidarBrowse
                                          • 162.159.61.3
                                          DHr3CzaX5d.exeGet hashmaliciousLummaCBrowse
                                          • 104.21.41.39
                                          Shipping documents 00039984849900044800.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 104.26.12.205
                                          TUT-ASUSFixTsDfhiC.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                                          • 208.95.112.1
                                          file.exeGet hashmaliciousWhiteSnake StealerBrowse
                                          • 208.95.112.1
                                          Comprobante de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          O3o5Xzk5Wd.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                          • 208.95.112.1
                                          bLaLoo4ET5.exeGet hashmaliciousQuasarBrowse
                                          • 208.95.112.1
                                          sipari_.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          Transferencia.docGet hashmaliciousQuasarBrowse
                                          • 208.95.112.1
                                          SecuriteInfo.com.FileRepMalware.22561.28030.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                                          • 208.95.112.1
                                          file.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, Stealc, XWormBrowse
                                          • 208.95.112.1
                                          SecuriteInfo.com.Win64.Malware-gen.13500.20938.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                                          • 208.95.112.1
                                          No context
                                          No context
                                          Process:C:\Users\user\Desktop\skuld3.exe
                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):3319808
                                          Entropy (8bit):7.9999029930932855
                                          Encrypted:true
                                          SSDEEP:49152:yRlxzPzhxMQodCf1Cot+sZsjCsx1S+Of/3SoIT92oOXXbKUEucvUgiekSfmAre1W:yLpxMQt7kCszJ6/3Soe2XXkuZ/Ar
                                          MD5:96CF5BFD737BA042E552C66FBD2D344E
                                          SHA1:861E144CCE53B756A81079923011AD87D6E3CE13
                                          SHA-256:A4A66B5826DBC95ED463BF1DAAA417AE99EA8B1B27DDBACDCEBA94657BABBAFC
                                          SHA-512:6C3D9C276D3BC83D2043566DA244AF4D67F78F8CFB91FEFB2C94204A02AB14F51A422407C912D80270959E1673AF5EDC2CE329821FF7B3DAEB7E4E093199B2E9
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 45%
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........N........".......2.......q..V....q...@...........................................`... ..............................................p..................0...................................................................................................UPX0......q.............................UPX1......2...q...2.................@...UPX2.........p........2.............@...4.24.UPX!.$...Y....K].;....2..P..I...<.........Pm.|E...B..YR..B..#CC.8.v.s.^WV&..dX)Lxe...N:j..\.J.Jp.b..c+.....L.n...3M.4..V..H'.......|v.=*..K.>1`...fR.....)...O.[..1.... ..FA..a.*..7.RLN.."I ..3...W...."-b..Y. 7.k.\...S.u(C..+..2...>N..+.S.0.].}.!.hEz.}.p........A..D.t..W.e,.K$..{h/......./B3Z.G..1y.9..P....oO-....iX.l.._$pR.x.S:.................(..j]]@....(b.....".0-.%...N..|[.6.~x.+f@..<.Kl,ZZ...lx........Jv.....KfZ.[f..U....]d..n..F.....0.=.)U.Npz.}.E:....2
                                          File type:PE32+ executable (console) x86-64, for MS Windows
                                          Entropy (8bit):7.9999029930932855
                                          TrID:
                                          • Win64 Executable Console (202006/5) 81.26%
                                          • UPX compressed Win32 Executable (30571/9) 12.30%
                                          • Win64 Executable (generic) (12005/4) 4.83%
                                          • Generic Win/DOS Executable (2004/3) 0.81%
                                          • DOS Executable Generic (2002/1) 0.81%
                                          File name:skuld3.exe
                                          File size:3'319'808 bytes
                                          MD5:96cf5bfd737ba042e552c66fbd2d344e
                                          SHA1:861e144cce53b756a81079923011ad87d6e3ce13
                                          SHA256:a4a66b5826dbc95ed463bf1daaa417ae99ea8b1b27ddbacdceba94657babbafc
                                          SHA512:6c3d9c276d3bc83d2043566da244af4d67f78f8cfb91fefb2c94204a02ab14f51a422407c912d80270959e1673af5edc2ce329821ff7b3daeb7e4e093199b2e9
                                          SSDEEP:49152:yRlxzPzhxMQodCf1Cot+sZsjCsx1S+Of/3SoIT92oOXXbKUEucvUgiekSfmAre1W:yLpxMQt7kCszJ6/3Soe2XXkuZ/Ar
                                          TLSH:F0E5337562D71302C9E43674606A46B5C8F5FFA0AE8330B05CBE85F95D8443E7A6CBB2
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........N........".......2.......q..V....q...@...........................................`... ............................
                                          Icon Hash:90cececece8e8eb0
                                          Entrypoint:0xe456c0
                                          Entrypoint Section:UPX1
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows cui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:6
                                          OS Version Minor:1
                                          File Version Major:6
                                          File Version Minor:1
                                          Subsystem Version Major:6
                                          Subsystem Version Minor:1
                                          Import Hash:6ed4f5f04d62b18d96b26d6db7c18840
                                          Instruction
                                          push ebx
                                          push esi
                                          push edi
                                          push ebp
                                          dec eax
                                          lea esi, dword ptr [FFCD695Ah]
                                          dec eax
                                          lea edi, dword ptr [esi-0071B025h]
                                          push edi
                                          mov eax, 00A43BE5h
                                          push eax
                                          dec eax
                                          mov ecx, esp
                                          dec eax
                                          mov edx, edi
                                          dec eax
                                          mov edi, esi
                                          mov esi, 0032968Bh
                                          push ebp
                                          dec eax
                                          mov ebp, esp
                                          inc esp
                                          mov ecx, dword ptr [ecx]
                                          dec ecx
                                          mov eax, edx
                                          dec eax
                                          mov edx, esi
                                          dec eax
                                          lea esi, dword ptr [edi+02h]
                                          push esi
                                          mov al, byte ptr [edi]
                                          dec edx
                                          mov cl, al
                                          and al, 07h
                                          shr cl, 00000003h
                                          dec eax
                                          mov ebx, FFFFFD00h
                                          dec eax
                                          shl ebx, cl
                                          mov cl, al
                                          dec eax
                                          lea ebx, dword ptr [esp+ebx*2-00000E78h]
                                          dec eax
                                          and ebx, FFFFFFC0h
                                          push 00000000h
                                          dec eax
                                          cmp esp, ebx
                                          jne 00007F1BC8E182FBh
                                          push ebx
                                          dec eax
                                          lea edi, dword ptr [ebx+08h]
                                          mov cl, byte ptr [esi-01h]
                                          dec edx
                                          mov byte ptr [edi+02h], al
                                          mov al, cl
                                          shr cl, 00000004h
                                          mov byte ptr [edi+01h], cl
                                          and al, 0Fh
                                          mov byte ptr [edi], al
                                          dec eax
                                          lea ecx, dword ptr [edi-04h]
                                          push eax
                                          inc ecx
                                          push edi
                                          dec eax
                                          lea eax, dword ptr [edi+04h]
                                          inc ebp
                                          xor edi, edi
                                          inc ecx
                                          push esi
                                          inc ecx
                                          mov esi, 00000001h
                                          inc ecx
                                          push ebp
                                          inc ebp
                                          xor ebp, ebp
                                          inc ecx
                                          push esp
                                          push ebp
                                          push ebx
                                          dec eax
                                          sub esp, 48h
                                          dec eax
                                          mov dword ptr [esp+38h], ecx
                                          dec eax
                                          mov dword ptr [esp+20h], eax
                                          mov eax, 00000001h
                                          dec eax
                                          mov dword ptr [esp+40h], esi
                                          dec esp
                                          mov dword ptr [esp+30h], eax
                                          mov ebx, eax
                                          inc esp
                                          mov dword ptr [esp+2Ch], ecx
                                          movzx ecx, byte ptr [edi+02h]
                                          shl ebx, cl
                                          mov ecx, ebx
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xa470000x9cUPX2
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0xa0b0000x1bc30UPX1
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          UPX00x10000x71b0000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          UPX10x71c0000x32b0000x32a4005144ed6480ef0f5340956f94106588d0unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          UPX20xa470000x10000x2000d026308cf9c08bebb8f207723307c16False0.1953125data1.3719135890817398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          DLLImport
                                          KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 30, 2024 11:30:57.440970898 CET49730443192.168.2.4104.26.13.205
                                          Oct 30, 2024 11:30:57.441061020 CET44349730104.26.13.205192.168.2.4
                                          Oct 30, 2024 11:30:57.441133022 CET49730443192.168.2.4104.26.13.205
                                          Oct 30, 2024 11:30:57.444428921 CET49730443192.168.2.4104.26.13.205
                                          Oct 30, 2024 11:30:57.444462061 CET44349730104.26.13.205192.168.2.4
                                          Oct 30, 2024 11:30:58.056310892 CET44349730104.26.13.205192.168.2.4
                                          Oct 30, 2024 11:30:58.056653976 CET49730443192.168.2.4104.26.13.205
                                          Oct 30, 2024 11:30:58.056699038 CET44349730104.26.13.205192.168.2.4
                                          Oct 30, 2024 11:30:58.056756020 CET49730443192.168.2.4104.26.13.205
                                          Oct 30, 2024 11:30:58.056771040 CET44349730104.26.13.205192.168.2.4
                                          Oct 30, 2024 11:30:58.057893991 CET44349730104.26.13.205192.168.2.4
                                          Oct 30, 2024 11:30:58.057976007 CET49730443192.168.2.4104.26.13.205
                                          Oct 30, 2024 11:30:58.111639023 CET49730443192.168.2.4104.26.13.205
                                          Oct 30, 2024 11:30:58.111757040 CET49730443192.168.2.4104.26.13.205
                                          Oct 30, 2024 11:30:58.111929893 CET44349730104.26.13.205192.168.2.4
                                          Oct 30, 2024 11:30:58.159477949 CET49730443192.168.2.4104.26.13.205
                                          Oct 30, 2024 11:30:58.159503937 CET44349730104.26.13.205192.168.2.4
                                          Oct 30, 2024 11:30:58.207240105 CET49730443192.168.2.4104.26.13.205
                                          Oct 30, 2024 11:30:58.323821068 CET44349730104.26.13.205192.168.2.4
                                          Oct 30, 2024 11:30:58.323982954 CET44349730104.26.13.205192.168.2.4
                                          Oct 30, 2024 11:30:58.324042082 CET49730443192.168.2.4104.26.13.205
                                          Oct 30, 2024 11:30:58.324424028 CET49730443192.168.2.4104.26.13.205
                                          Oct 30, 2024 11:30:58.324454069 CET44349730104.26.13.205192.168.2.4
                                          Oct 30, 2024 11:30:59.660969973 CET4973180192.168.2.4208.95.112.1
                                          Oct 30, 2024 11:30:59.666384935 CET8049731208.95.112.1192.168.2.4
                                          Oct 30, 2024 11:30:59.666486025 CET4973180192.168.2.4208.95.112.1
                                          Oct 30, 2024 11:30:59.666702032 CET4973180192.168.2.4208.95.112.1
                                          Oct 30, 2024 11:30:59.672390938 CET8049731208.95.112.1192.168.2.4
                                          Oct 30, 2024 11:31:00.261305094 CET8049731208.95.112.1192.168.2.4
                                          Oct 30, 2024 11:31:00.309145927 CET4973180192.168.2.4208.95.112.1
                                          Oct 30, 2024 11:31:00.760133982 CET4973180192.168.2.4208.95.112.1
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 30, 2024 11:30:57.397439957 CET6031153192.168.2.41.1.1.1
                                          Oct 30, 2024 11:30:57.404957056 CET53603111.1.1.1192.168.2.4
                                          Oct 30, 2024 11:30:59.652009010 CET6383653192.168.2.41.1.1.1
                                          Oct 30, 2024 11:30:59.660156012 CET53638361.1.1.1192.168.2.4
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Oct 30, 2024 11:30:57.397439957 CET192.168.2.41.1.1.10x538fStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                          Oct 30, 2024 11:30:59.652009010 CET192.168.2.41.1.1.10x1441Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Oct 30, 2024 11:30:57.404957056 CET1.1.1.1192.168.2.40x538fNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                          Oct 30, 2024 11:30:57.404957056 CET1.1.1.1192.168.2.40x538fNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                          Oct 30, 2024 11:30:57.404957056 CET1.1.1.1192.168.2.40x538fNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                          Oct 30, 2024 11:30:59.660156012 CET1.1.1.1192.168.2.40x1441No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                          • api.ipify.org
                                          • ip-api.com
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.449731208.95.112.1806896C:\Users\user\Desktop\skuld3.exe
                                          TimestampBytes transferredDirectionData
                                          Oct 30, 2024 11:30:59.666702032 CET111OUTGET /line/?fields=hosting HTTP/1.1
                                          Host: ip-api.com
                                          User-Agent: Go-http-client/1.1
                                          Accept-Encoding: gzip
                                          Oct 30, 2024 11:31:00.261305094 CET174INHTTP/1.1 200 OK
                                          Date: Wed, 30 Oct 2024 10:30:59 GMT
                                          Content-Type: text/plain; charset=utf-8
                                          Content-Length: 5
                                          Access-Control-Allow-Origin: *
                                          X-Ttl: 60
                                          X-Rl: 44
                                          Data Raw: 74 72 75 65 0a
                                          Data Ascii: true


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.449730104.26.13.2054436896C:\Users\user\Desktop\skuld3.exe
                                          TimestampBytes transferredDirectionData
                                          2024-10-30 10:30:58 UTC94OUTGET / HTTP/1.1
                                          Host: api.ipify.org
                                          User-Agent: Go-http-client/1.1
                                          Accept-Encoding: gzip
                                          2024-10-30 10:30:58 UTC211INHTTP/1.1 200 OK
                                          Date: Wed, 30 Oct 2024 10:30:58 GMT
                                          Content-Type: text/plain
                                          Content-Length: 14
                                          Connection: close
                                          Vary: Origin
                                          cf-cache-status: DYNAMIC
                                          Server: cloudflare
                                          CF-RAY: 8daabba5dde6315f-DFW
                                          2024-10-30 10:30:58 UTC14INData Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 38
                                          Data Ascii: 173.254.250.78


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:06:30:56
                                          Start date:30/10/2024
                                          Path:C:\Users\user\Desktop\skuld3.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\Desktop\skuld3.exe"
                                          Imagebase:0x940000
                                          File size:3'319'808 bytes
                                          MD5 hash:96CF5BFD737BA042E552C66FBD2D344E
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_SkuldStealer, Description: Yara detected Skuld Stealer, Source: 00000000.00000002.1694869303.0000000000941000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:1
                                          Start time:06:30:56
                                          Start date:30/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:2
                                          Start time:06:30:56
                                          Start date:30/10/2024
                                          Path:C:\Windows\System32\attrib.exe
                                          Wow64 process (32bit):false
                                          Commandline:attrib +h +s C:\Users\user\Desktop\skuld3.exe
                                          Imagebase:0x7ff6829d0000
                                          File size:23'040 bytes
                                          MD5 hash:5037D8E6670EF1D89FB6AD435F12A9FD
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:3
                                          Start time:06:30:56
                                          Start date:30/10/2024
                                          Path:C:\Windows\System32\attrib.exe
                                          Wow64 process (32bit):false
                                          Commandline:attrib +h +s C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
                                          Imagebase:0x7ff6829d0000
                                          File size:23'040 bytes
                                          MD5 hash:5037D8E6670EF1D89FB6AD435F12A9FD
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:4
                                          Start time:06:30:57
                                          Start date:30/10/2024
                                          Path:C:\Windows\System32\wbem\WMIC.exe
                                          Wow64 process (32bit):false
                                          Commandline:wmic csproduct get UUID
                                          Imagebase:0x7ff6c5490000
                                          File size:576'000 bytes
                                          MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:5
                                          Start time:06:31:04
                                          Start date:30/10/2024
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe"
                                          Imagebase:0xd70000
                                          File size:3'319'808 bytes
                                          MD5 hash:96CF5BFD737BA042E552C66FBD2D344E
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_SkuldStealer, Description: Yara detected Skuld Stealer, Source: 00000005.00000002.1769455210.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                          Antivirus matches:
                                          • Detection: 100%, Avira
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 45%, ReversingLabs
                                          Reputation:low
                                          Has exited:true

                                          Target ID:6
                                          Start time:06:31:05
                                          Start date:30/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:7
                                          Start time:06:31:05
                                          Start date:30/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:cmd.exe /C fodhelper
                                          Imagebase:0x7ff644780000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:8
                                          Start time:06:31:05
                                          Start date:30/10/2024
                                          Path:C:\Windows\System32\fodhelper.exe
                                          Wow64 process (32bit):false
                                          Commandline:fodhelper
                                          Imagebase:0x7ff7e7cf0000
                                          File size:49'664 bytes
                                          MD5 hash:85018BE1FD913656BC9FF541F017EACD
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:9
                                          Start time:06:31:05
                                          Start date:30/10/2024
                                          Path:C:\Windows\System32\fodhelper.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\system32\fodhelper.exe"
                                          Imagebase:0x7ff7e7cf0000
                                          File size:49'664 bytes
                                          MD5 hash:85018BE1FD913656BC9FF541F017EACD
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:12
                                          Start time:06:31:06
                                          Start date:30/10/2024
                                          Path:C:\Windows\System32\fodhelper.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\system32\fodhelper.exe"
                                          Imagebase:0x7ff7e7cf0000
                                          File size:49'664 bytes
                                          MD5 hash:85018BE1FD913656BC9FF541F017EACD
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:13
                                          Start time:06:31:06
                                          Start date:30/10/2024
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe"
                                          Imagebase:0xd70000
                                          File size:3'319'808 bytes
                                          MD5 hash:96CF5BFD737BA042E552C66FBD2D344E
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_SkuldStealer, Description: Yara detected Skuld Stealer, Source: 0000000D.00000002.1772275598.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:14
                                          Start time:06:31:06
                                          Start date:30/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:16
                                          Start time:06:31:13
                                          Start date:30/10/2024
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe"
                                          Imagebase:0xd70000
                                          File size:3'319'808 bytes
                                          MD5 hash:96CF5BFD737BA042E552C66FBD2D344E
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_SkuldStealer, Description: Yara detected Skuld Stealer, Source: 00000010.00000002.1848546482.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                          Has exited:true

                                          Target ID:17
                                          Start time:06:31:13
                                          Start date:30/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:18
                                          Start time:06:31:13
                                          Start date:30/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:cmd.exe /C fodhelper
                                          Imagebase:0x7ff644780000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:19
                                          Start time:06:31:13
                                          Start date:30/10/2024
                                          Path:C:\Windows\System32\fodhelper.exe
                                          Wow64 process (32bit):false
                                          Commandline:fodhelper
                                          Imagebase:0x7ff7e7cf0000
                                          File size:49'664 bytes
                                          MD5 hash:85018BE1FD913656BC9FF541F017EACD
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:20
                                          Start time:06:31:14
                                          Start date:30/10/2024
                                          Path:C:\Windows\System32\fodhelper.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\system32\fodhelper.exe"
                                          Imagebase:0x7ff7e7cf0000
                                          File size:49'664 bytes
                                          MD5 hash:85018BE1FD913656BC9FF541F017EACD
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:22
                                          Start time:06:31:14
                                          Start date:30/10/2024
                                          Path:C:\Windows\System32\fodhelper.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\system32\fodhelper.exe"
                                          Imagebase:0x7ff7e7cf0000
                                          File size:49'664 bytes
                                          MD5 hash:85018BE1FD913656BC9FF541F017EACD
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:23
                                          Start time:06:31:14
                                          Start date:30/10/2024
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe"
                                          Imagebase:0xd70000
                                          File size:3'319'808 bytes
                                          MD5 hash:96CF5BFD737BA042E552C66FBD2D344E
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_SkuldStealer, Description: Yara detected Skuld Stealer, Source: 00000017.00000002.1856085680.0000000000D71000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                          Has exited:true

                                          Target ID:24
                                          Start time:06:31:14
                                          Start date:30/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          No disassembly