Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Scvi1cE64H.exe

Overview

General Information

Sample name:Scvi1cE64H.exe
renamed because original name is a hash value
Original sample name:638a8fcaec15d795231c5267c9649453ba4b85d0ea09a4455b2f20ea12be39a5.exe
Analysis ID:1561586
MD5:07c09b14a7719a820968ad2222428b87
SHA1:c31e61138c6c7f9ae64da86420eb474ca88f734f
SHA256:638a8fcaec15d795231c5267c9649453ba4b85d0ea09a4455b2f20ea12be39a5
Tags:exeuser-Chainskilabs
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Scvi1cE64H.exe (PID: 5016 cmdline: "C:\Users\user\Desktop\Scvi1cE64H.exe" MD5: 07C09B14A7719A820968AD2222428B87)
    • WerFault.exe (PID: 5984 cmdline: C:\Windows\system32\WerFault.exe -u -p 5016 -s 1936 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
{"C2 url": ["81.161.238.249"], "Port": 7000, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.2"}
SourceRuleDescriptionAuthorStrings
Scvi1cE64H.exeJoeSecurity_XWormYara detected XWormJoe Security
    Scvi1cE64H.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0xf524:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0xf5c1:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0xf6d6:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0xe9da:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Temp\SystemBootComponent.exeJoeSecurity_XWormYara detected XWormJoe Security
      C:\Users\user\AppData\Local\Temp\SystemBootComponent.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xf524:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0xf5c1:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0xf6d6:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xe9da:$cnc4: POST / HTTP/1.1
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.2106877000.00000000005E2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        00000000.00000000.2106877000.00000000005E2000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0xf324:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0xf3c1:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0xf4d6:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0xe7da:$cnc4: POST / HTTP/1.1
        00000000.00000002.3018554385.00000000028B1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
          Process Memory Space: Scvi1cE64H.exe PID: 5016JoeSecurity_XWormYara detected XWormJoe Security
            SourceRuleDescriptionAuthorStrings
            0.0.Scvi1cE64H.exe.5e0000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
              0.0.Scvi1cE64H.exe.5e0000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
              • 0xf524:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
              • 0xf5c1:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
              • 0xf6d6:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
              • 0xe9da:$cnc4: POST / HTTP/1.1

              System Summary

              barindex
              Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\Scvi1cE64H.exe, ProcessId: 5016, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SystemBootComponent.lnk
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T21:02:07.465700+010028528701Malware Command and Control Activity Detected81.161.238.2497000192.168.2.649707TCP
              2024-11-23T21:02:13.400101+010028528701Malware Command and Control Activity Detected81.161.238.2497000192.168.2.649707TCP
              2024-11-23T21:02:23.557552+010028528701Malware Command and Control Activity Detected81.161.238.2497000192.168.2.649707TCP
              2024-11-23T21:02:33.751740+010028528701Malware Command and Control Activity Detected81.161.238.2497000192.168.2.649707TCP
              2024-11-23T21:02:37.469899+010028528701Malware Command and Control Activity Detected81.161.238.2497000192.168.2.649707TCP
              2024-11-23T21:02:44.031724+010028528701Malware Command and Control Activity Detected81.161.238.2497000192.168.2.649707TCP
              2024-11-23T21:02:54.258816+010028528701Malware Command and Control Activity Detected81.161.238.2497000192.168.2.649707TCP
              2024-11-23T21:03:04.530376+010028528701Malware Command and Control Activity Detected81.161.238.2497000192.168.2.649707TCP
              2024-11-23T21:03:07.459544+010028528701Malware Command and Control Activity Detected81.161.238.2497000192.168.2.649707TCP
              2024-11-23T21:03:14.808213+010028528701Malware Command and Control Activity Detected81.161.238.2497000192.168.2.649707TCP
              2024-11-23T21:03:15.682718+010028528701Malware Command and Control Activity Detected81.161.238.2497000192.168.2.649707TCP
              2024-11-23T21:03:17.594967+010028528701Malware Command and Control Activity Detected81.161.238.2497000192.168.2.649707TCP
              2024-11-23T21:03:17.878758+010028528701Malware Command and Control Activity Detected81.161.238.2497000192.168.2.649707TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T21:02:13.402157+010028529231Malware Command and Control Activity Detected192.168.2.64970781.161.238.2497000TCP
              2024-11-23T21:02:23.559692+010028529231Malware Command and Control Activity Detected192.168.2.64970781.161.238.2497000TCP
              2024-11-23T21:02:33.755268+010028529231Malware Command and Control Activity Detected192.168.2.64970781.161.238.2497000TCP
              2024-11-23T21:02:44.052119+010028529231Malware Command and Control Activity Detected192.168.2.64970781.161.238.2497000TCP
              2024-11-23T21:02:54.261219+010028529231Malware Command and Control Activity Detected192.168.2.64970781.161.238.2497000TCP
              2024-11-23T21:03:04.533275+010028529231Malware Command and Control Activity Detected192.168.2.64970781.161.238.2497000TCP
              2024-11-23T21:03:14.821165+010028529231Malware Command and Control Activity Detected192.168.2.64970781.161.238.2497000TCP
              2024-11-23T21:03:15.684773+010028529231Malware Command and Control Activity Detected192.168.2.64970781.161.238.2497000TCP
              2024-11-23T21:03:17.598172+010028529231Malware Command and Control Activity Detected192.168.2.64970781.161.238.2497000TCP
              2024-11-23T21:03:17.881558+010028529231Malware Command and Control Activity Detected192.168.2.64970781.161.238.2497000TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T21:02:07.465700+010028528741Malware Command and Control Activity Detected81.161.238.2497000192.168.2.649707TCP
              2024-11-23T21:02:37.469899+010028528741Malware Command and Control Activity Detected81.161.238.2497000192.168.2.649707TCP
              2024-11-23T21:03:07.459544+010028528741Malware Command and Control Activity Detected81.161.238.2497000192.168.2.649707TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T21:02:12.893886+010028559241Malware Command and Control Activity Detected192.168.2.64970781.161.238.2497000TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: Scvi1cE64H.exeAvira: detected
              Source: C:\Users\user\AppData\Local\Temp\SystemBootComponent.exeAvira: detection malicious, Label: TR/Spy.Gen
              Source: Scvi1cE64H.exeMalware Configuration Extractor: Xworm {"C2 url": ["81.161.238.249"], "Port": 7000, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.2"}
              Source: C:\Users\user\AppData\Local\Temp\SystemBootComponent.exeReversingLabs: Detection: 81%
              Source: Scvi1cE64H.exeReversingLabs: Detection: 81%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Local\Temp\SystemBootComponent.exeJoe Sandbox ML: detected
              Source: Scvi1cE64H.exeJoe Sandbox ML: detected
              Source: Scvi1cE64H.exeString decryptor: 81.161.238.249
              Source: Scvi1cE64H.exeString decryptor: 7000
              Source: Scvi1cE64H.exeString decryptor: <123456789>
              Source: Scvi1cE64H.exeString decryptor: <Xwormmm>
              Source: Scvi1cE64H.exeString decryptor: XWorm V5.2
              Source: Scvi1cE64H.exeString decryptor: USB.exe
              Source: Scvi1cE64H.exeString decryptor: %Temp%
              Source: Scvi1cE64H.exeString decryptor: SystemBootComponent.exe
              Source: Scvi1cE64H.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Scvi1cE64H.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3020481994.000000001B732000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Xml.ni.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb-08 source: Scvi1cE64H.exe, 00000000.00000002.3017551517.0000000000A59000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.ni.pdbRSDS source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: .pdbq source: Scvi1cE64H.exe, 00000000.00000002.3021009050.000000001BC48000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.ni.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Drawing.ni.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Configuration.ni.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3021009050.000000001BC48000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb.> source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbb source: Scvi1cE64H.exe, 00000000.00000002.3020481994.000000001B732000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Configuration.pdb. source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Drawing.pdb@ source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Configuration.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: symbols\dll\mscorlib.pdbpdb` source: Scvi1cE64H.exe, 00000000.00000002.3021009050.000000001BC48000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Drawing.ni.pdbRSDS source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Xml.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: 0C:\Windows\mscorlib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3021009050.000000001BC48000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Xml.ni.pdbRSDS# source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Core.ni.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: Microsoft.VisualBasic.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3021009050.000000001BC48000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdbj source: Scvi1cE64H.exe, 00000000.00000002.3020481994.000000001B732000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3017551517.0000000000A59000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3020481994.000000001B732000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3020481994.000000001B732000.00000004.00000020.00020000.00000000.sdmp, WEREE1A.tmp.dmp.9.dr
              Source: Binary string: mscorlib.pdb[ source: Scvi1cE64H.exe, 00000000.00000002.3020481994.000000001B732000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3020481994.000000001B732000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Users\user\Desktop\Scvi1cE64H.PDB source: Scvi1cE64H.exe, 00000000.00000002.3020481994.000000001B732000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdbMZ@ source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Management.ni.pdbRSDSJ< source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Management.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Drawing.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: mscorlib.ni.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Management.ni.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3020481994.000000001B732000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: indoC:\Windows\mscorlib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3021009050.000000001BC48000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.ni.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Core.ni.pdbRSDS source: WEREE1A.tmp.dmp.9.dr

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2852870 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes : 81.161.238.249:7000 -> 192.168.2.6:49707
              Source: Network trafficSuricata IDS: 2852874 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 : 81.161.238.249:7000 -> 192.168.2.6:49707
              Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.6:49707 -> 81.161.238.249:7000
              Source: Network trafficSuricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.6:49707 -> 81.161.238.249:7000
              Source: Malware configuration extractorURLs: 81.161.238.249
              Source: global trafficTCP traffic: 192.168.2.6:49707 -> 81.161.238.249:7000
              Source: Joe Sandbox ViewASN Name: NETIKOM-ASIT NETIKOM-ASIT
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: unknownTCP traffic detected without corresponding DNS query: 81.161.238.249
              Source: Scvi1cE64H.exe, 00000000.00000002.3018554385.00000000028B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: Amcache.hve.9.drString found in binary or memory: http://upx.sf.net

              Operating System Destruction

              barindex
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: 01 00 00 00 Jump to behavior

              System Summary

              barindex
              Source: Scvi1cE64H.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.0.Scvi1cE64H.exe.5e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000000.00000000.2106877000.00000000005E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: C:\Users\user\AppData\Local\Temp\SystemBootComponent.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeCode function: 0_2_00007FFD348BB8920_2_00007FFD348BB892
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeCode function: 0_2_00007FFD348B10880_2_00007FFD348B1088
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeCode function: 0_2_00007FFD348B61FB0_2_00007FFD348B61FB
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeCode function: 0_2_00007FFD348BAAE60_2_00007FFD348BAAE6
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeCode function: 0_2_00007FFD348B28190_2_00007FFD348B2819
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeCode function: 0_2_00007FFD348BC7650_2_00007FFD348BC765
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeCode function: 0_2_00007FFD348B10800_2_00007FFD348B1080
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeCode function: 0_2_00007FFD348B10D30_2_00007FFD348B10D3
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeCode function: 0_2_00007FFD348B321C0_2_00007FFD348B321C
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeCode function: 0_2_00007FFD348B11680_2_00007FFD348B1168
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeCode function: 0_2_00007FFD348BF16C0_2_00007FFD348BF16C
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeCode function: 0_2_00007FFD348B398A0_2_00007FFD348B398A
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeCode function: 0_2_00007FFD348B61580_2_00007FFD348B6158
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeCode function: 0_2_00007FFD348B0EE50_2_00007FFD348B0EE5
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeCode function: 0_2_00007FFD348B0FFA0_2_00007FFD348B0FFA
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5016 -s 1936
              Source: Scvi1cE64H.exe, 00000000.00000000.2106894872.00000000005F4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSystemBootComponent.exe4 vs Scvi1cE64H.exe
              Source: Scvi1cE64H.exeBinary or memory string: OriginalFilenameSystemBootComponent.exe4 vs Scvi1cE64H.exe
              Source: Scvi1cE64H.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Scvi1cE64H.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.0.Scvi1cE64H.exe.5e0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000000.00000000.2106877000.00000000005E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: C:\Users\user\AppData\Local\Temp\SystemBootComponent.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: Scvi1cE64H.exe, jAL32Rk0A5AWYI1hrBWR3Y1o.csCryptographic APIs: 'TransformFinalBlock'
              Source: Scvi1cE64H.exe, pFJU8PVl0OMHVTXOMKghPYws.csCryptographic APIs: 'TransformFinalBlock'
              Source: Scvi1cE64H.exe, pFJU8PVl0OMHVTXOMKghPYws.csCryptographic APIs: 'TransformFinalBlock'
              Source: SystemBootComponent.exe.0.dr, jAL32Rk0A5AWYI1hrBWR3Y1o.csCryptographic APIs: 'TransformFinalBlock'
              Source: SystemBootComponent.exe.0.dr, pFJU8PVl0OMHVTXOMKghPYws.csCryptographic APIs: 'TransformFinalBlock'
              Source: SystemBootComponent.exe.0.dr, pFJU8PVl0OMHVTXOMKghPYws.csCryptographic APIs: 'TransformFinalBlock'
              Source: SystemBootComponent.exe.0.dr, 2zpWi5nbN4skGn.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: SystemBootComponent.exe.0.dr, 2zpWi5nbN4skGn.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: Scvi1cE64H.exe, 2zpWi5nbN4skGn.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: Scvi1cE64H.exe, 2zpWi5nbN4skGn.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: classification engineClassification label: mal100.troj.evad.winEXE@2/8@0/1
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SystemBootComponent.lnkJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeMutant created: NULL
              Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5016
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeMutant created: \Sessions\1\BaseNamedObjects\ZIobbhsTRfU5iXhA
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeFile created: C:\Users\user\AppData\Local\Temp\SystemBootComponent.exeJump to behavior
              Source: Scvi1cE64H.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: Scvi1cE64H.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: Scvi1cE64H.exeReversingLabs: Detection: 81%
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeFile read: C:\Users\user\Desktop\Scvi1cE64H.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\Scvi1cE64H.exe "C:\Users\user\Desktop\Scvi1cE64H.exe"
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5016 -s 1936
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: linkinfo.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: ntshrui.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: cscapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: avicap32.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: msvfw32.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32Jump to behavior
              Source: SystemBootComponent.lnk.0.drLNK file: ..\..\..\..\..\..\Local\Temp\SystemBootComponent.exe
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: Scvi1cE64H.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: Scvi1cE64H.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3020481994.000000001B732000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Xml.ni.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb-08 source: Scvi1cE64H.exe, 00000000.00000002.3017551517.0000000000A59000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.ni.pdbRSDS source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: .pdbq source: Scvi1cE64H.exe, 00000000.00000002.3021009050.000000001BC48000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.ni.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Drawing.ni.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Configuration.ni.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3021009050.000000001BC48000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb.> source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbb source: Scvi1cE64H.exe, 00000000.00000002.3020481994.000000001B732000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Configuration.pdb. source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Drawing.pdb@ source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Configuration.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: symbols\dll\mscorlib.pdbpdb` source: Scvi1cE64H.exe, 00000000.00000002.3021009050.000000001BC48000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Drawing.ni.pdbRSDS source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Xml.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: 0C:\Windows\mscorlib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3021009050.000000001BC48000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Xml.ni.pdbRSDS# source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Core.ni.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: Microsoft.VisualBasic.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3021009050.000000001BC48000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdbj source: Scvi1cE64H.exe, 00000000.00000002.3020481994.000000001B732000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3017551517.0000000000A59000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3020481994.000000001B732000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3020481994.000000001B732000.00000004.00000020.00020000.00000000.sdmp, WEREE1A.tmp.dmp.9.dr
              Source: Binary string: mscorlib.pdb[ source: Scvi1cE64H.exe, 00000000.00000002.3020481994.000000001B732000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3020481994.000000001B732000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Users\user\Desktop\Scvi1cE64H.PDB source: Scvi1cE64H.exe, 00000000.00000002.3020481994.000000001B732000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdbMZ@ source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Management.ni.pdbRSDSJ< source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Management.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Drawing.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: mscorlib.ni.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Management.ni.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3020481994.000000001B732000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: indoC:\Windows\mscorlib.pdb source: Scvi1cE64H.exe, 00000000.00000002.3021009050.000000001BC48000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.ni.pdb source: WEREE1A.tmp.dmp.9.dr
              Source: Binary string: System.Core.ni.pdbRSDS source: WEREE1A.tmp.dmp.9.dr

              Data Obfuscation

              barindex
              Source: Scvi1cE64H.exe, ZOdQlYmq59O21neTylhk7EoGC92YlEK3g7xAHmmlcaE3hjA1lzMOE08xwo0wFz9fMiiWPuuH1sCsDIl.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{TptcJis7agb7YD.zYREBPbbV2qyCc,TptcJis7agb7YD._0q5ZqjAz8nOPYc,TptcJis7agb7YD._3Z8SFQZCdbk40V,TptcJis7agb7YD.ZyvQ6RWMFVefWn,pFJU8PVl0OMHVTXOMKghPYws.PcXZFGhsZtOblrQ23HKrWa7k()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: Scvi1cE64H.exe, ZOdQlYmq59O21neTylhk7EoGC92YlEK3g7xAHmmlcaE3hjA1lzMOE08xwo0wFz9fMiiWPuuH1sCsDIl.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{tcU5eQeyxx29kiemMB3W65RWRW8xlZ0nt0wACEarvG2nwAICq1bZiXvvYL5tZOFl4pVwwKnFqSkLYuL0XZFZcrlmpu5omc03[2],pFJU8PVl0OMHVTXOMKghPYws.VaMsrQcyrRkSmHOAChjfXW7E(Convert.FromBase64String(tcU5eQeyxx29kiemMB3W65RWRW8xlZ0nt0wACEarvG2nwAICq1bZiXvvYL5tZOFl4pVwwKnFqSkLYuL0XZFZcrlmpu5omc03[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: Scvi1cE64H.exe, ZOdQlYmq59O21neTylhk7EoGC92YlEK3g7xAHmmlcaE3hjA1lzMOE08xwo0wFz9fMiiWPuuH1sCsDIl.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { tcU5eQeyxx29kiemMB3W65RWRW8xlZ0nt0wACEarvG2nwAICq1bZiXvvYL5tZOFl4pVwwKnFqSkLYuL0XZFZcrlmpu5omc03[2] }}, (string[])null, (Type[])null, (bool[])null, true)
              Source: SystemBootComponent.exe.0.dr, ZOdQlYmq59O21neTylhk7EoGC92YlEK3g7xAHmmlcaE3hjA1lzMOE08xwo0wFz9fMiiWPuuH1sCsDIl.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{TptcJis7agb7YD.zYREBPbbV2qyCc,TptcJis7agb7YD._0q5ZqjAz8nOPYc,TptcJis7agb7YD._3Z8SFQZCdbk40V,TptcJis7agb7YD.ZyvQ6RWMFVefWn,pFJU8PVl0OMHVTXOMKghPYws.PcXZFGhsZtOblrQ23HKrWa7k()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: SystemBootComponent.exe.0.dr, ZOdQlYmq59O21neTylhk7EoGC92YlEK3g7xAHmmlcaE3hjA1lzMOE08xwo0wFz9fMiiWPuuH1sCsDIl.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{tcU5eQeyxx29kiemMB3W65RWRW8xlZ0nt0wACEarvG2nwAICq1bZiXvvYL5tZOFl4pVwwKnFqSkLYuL0XZFZcrlmpu5omc03[2],pFJU8PVl0OMHVTXOMKghPYws.VaMsrQcyrRkSmHOAChjfXW7E(Convert.FromBase64String(tcU5eQeyxx29kiemMB3W65RWRW8xlZ0nt0wACEarvG2nwAICq1bZiXvvYL5tZOFl4pVwwKnFqSkLYuL0XZFZcrlmpu5omc03[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: SystemBootComponent.exe.0.dr, ZOdQlYmq59O21neTylhk7EoGC92YlEK3g7xAHmmlcaE3hjA1lzMOE08xwo0wFz9fMiiWPuuH1sCsDIl.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { tcU5eQeyxx29kiemMB3W65RWRW8xlZ0nt0wACEarvG2nwAICq1bZiXvvYL5tZOFl4pVwwKnFqSkLYuL0XZFZcrlmpu5omc03[2] }}, (string[])null, (Type[])null, (bool[])null, true)
              Source: Scvi1cE64H.exe, ZOdQlYmq59O21neTylhk7EoGC92YlEK3g7xAHmmlcaE3hjA1lzMOE08xwo0wFz9fMiiWPuuH1sCsDIl.cs.Net Code: _7Xfuj2grk5ViS4utjwlw65hmfgOi7J1o1WvwJDHrjlsNtdpJuoAyNZTUgFdakbciAxN0dhY8QDTiVEh System.AppDomain.Load(byte[])
              Source: Scvi1cE64H.exe, ZOdQlYmq59O21neTylhk7EoGC92YlEK3g7xAHmmlcaE3hjA1lzMOE08xwo0wFz9fMiiWPuuH1sCsDIl.cs.Net Code: S2k6YvmdZFg3y7EhcplKH2cyo5rki2hRZ7gAvVjDo60dxszrTHt58s7xk4o6z2tx System.AppDomain.Load(byte[])
              Source: Scvi1cE64H.exe, ZOdQlYmq59O21neTylhk7EoGC92YlEK3g7xAHmmlcaE3hjA1lzMOE08xwo0wFz9fMiiWPuuH1sCsDIl.cs.Net Code: S2k6YvmdZFg3y7EhcplKH2cyo5rki2hRZ7gAvVjDo60dxszrTHt58s7xk4o6z2tx
              Source: SystemBootComponent.exe.0.dr, ZOdQlYmq59O21neTylhk7EoGC92YlEK3g7xAHmmlcaE3hjA1lzMOE08xwo0wFz9fMiiWPuuH1sCsDIl.cs.Net Code: _7Xfuj2grk5ViS4utjwlw65hmfgOi7J1o1WvwJDHrjlsNtdpJuoAyNZTUgFdakbciAxN0dhY8QDTiVEh System.AppDomain.Load(byte[])
              Source: SystemBootComponent.exe.0.dr, ZOdQlYmq59O21neTylhk7EoGC92YlEK3g7xAHmmlcaE3hjA1lzMOE08xwo0wFz9fMiiWPuuH1sCsDIl.cs.Net Code: S2k6YvmdZFg3y7EhcplKH2cyo5rki2hRZ7gAvVjDo60dxszrTHt58s7xk4o6z2tx System.AppDomain.Load(byte[])
              Source: SystemBootComponent.exe.0.dr, ZOdQlYmq59O21neTylhk7EoGC92YlEK3g7xAHmmlcaE3hjA1lzMOE08xwo0wFz9fMiiWPuuH1sCsDIl.cs.Net Code: S2k6YvmdZFg3y7EhcplKH2cyo5rki2hRZ7gAvVjDo60dxszrTHt58s7xk4o6z2tx
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeCode function: 0_2_00007FFD348B5A87 push ebx; retf 5F4Ch0_2_00007FFD348B5ADA
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeCode function: 0_2_00007FFD348B00BD pushad ; iretd 0_2_00007FFD348B00C1
              Source: Scvi1cE64H.exe, ZlL3D9KbmHSvkrKnUH4Va1fWZ3p83RkW7l1NAqI3dbAH47AVh0iMWTnd.csHigh entropy of concatenated method names: 'mo5BLVBKsmpMh2rONYS0984TkvIxqr6MQ94KO1XDxdKnGP0IlwX8oB95', 'XQ1Xbhj7R0RDD5Y49fCQ96ILXAuyG4J9UkxeJHAthyhsS58RnyM0a1zi', 'Pz48E8fEpoACFKMzDU3EVSdPSXhkoSLWNV41zgyWhzQGtSJRis5xoWwj', '_8aNzHK2u4ZzdqyiQHFmMhDt4huw5ZJtjjM3I5ws2iahzVWvm1bMkuLApU0QC9o7f43vIvJo2CJhXZ2oSz6k', 'aHRhYay7ZJ5VSmcjpN6kAd4hnWwAaKQWqlBwWsI8XThKrFNYG63xv05sEn9yuPX6mpB4U6eJgOELpGVXm9f', '_8Lz6ogy6PqvIXQoUtoppb5Fakig4ptMSTQco8mqmpfu5JStKh1PgW2SkK8zFpz668f5rUZsINaJBtj131Ak', '_7Lgr4Nc7ft7R1Xspn1K8lRVcExAB18Q9l0SJIW754zl3RDptkZnqgigilZsrb3UXPstAUuv9ARUbvZkV6PB', 'HhbhJmlA3L5rKQPwf5flCy4lOdAmYWxHjTOLTAlqU6h87BkJteYSn1k8vRmf7N3OZNAsOcKWPGCmEAKg42G', 'YtFJcDGZ20M54Sr5BQh0aFwUmbIpgeiNdUs6w8n2oT5HrXzFgeUKtg8kxddBeftm8QPkWjufaDA0PhFwvsV', '_5t2ihwXfAxCGfRmkGWkfrt1mKFWQ47Hq4NTBvprp8sZEF8ZJRYoJsmQ0mmQQiCipf0opI6ChB1l1xtBqkWX'
              Source: Scvi1cE64H.exe, JXkizmRngv50etlHAeIOHrbgu8AM0.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'Tt5C8HXVlF5d1Kbv', 'V1YbTlMA4HAFBrI7', 'xLwVHbaVcMA4QZrg', 'lcYhqdSpIPPdVJ3Q'
              Source: Scvi1cE64H.exe, VpmzBc3f598aquFiwXNhIxTBuX6LJzZNksXSMNQ3LBdweOxeqNii6Hm95bmJF4R6EIPriZQM1vB41ORiCblxI5Wp1MeuHnrv.csHigh entropy of concatenated method names: 'CvR9P5lAIclf2oGb1YdMctJLenwO42L6ZUbjbo4ixPd9Twzv96tYe440LuqMhqkAkBv4ELNDsOlnarjqnfCddzWDj7IEXtGn', 'ZFdvpob5Y2vLfICQbAp', '_8f5fegXfVsd2dCItAWb', 'BdZT9yM28P4Q10wjF7z', 'QOxSw019TQQHFVLco8N'
              Source: Scvi1cE64H.exe, iOYSc1YnPaSxZX.csHigh entropy of concatenated method names: 'pgeqosPsoRKuOy', 'S7O9v0Wbys2XuU', 'ks6Ym1jt88jDRl', 'F9jBk8meRXehJh', 'LdKmwi0kPIyb4rlr', 'wcIKSu5e793IJX9R', 'BcOjWVU9EXrDDYf1', '_6BW3hutaedNqdDMe', 'MCbx3ZVtslDC0OoC', 'hZbXDSafbk8DNJeo'
              Source: Scvi1cE64H.exe, ZOdQlYmq59O21neTylhk7EoGC92YlEK3g7xAHmmlcaE3hjA1lzMOE08xwo0wFz9fMiiWPuuH1sCsDIl.csHigh entropy of concatenated method names: '_77vZspajKG4MXnstLSkix7k55gIld4cV3fFsLoa25Fv0uxfusVC6i5IMnIZJqY1MERf6dujTqbmiFW4', '_7Xfuj2grk5ViS4utjwlw65hmfgOi7J1o1WvwJDHrjlsNtdpJuoAyNZTUgFdakbciAxN0dhY8QDTiVEh', 'LmARPzCmtdhthclG0qwBlPVYNmN0PpKUAsiFQpY0ncwfJJby3ftBqgOHZSSFahCG', '_4uQFJWi48147Fktt3okMwdxCBlkk9gRKVLIk59g34XLaxRY71ytyd18PBCTeCUyH', 'YH2iCsxPOE14jkcSgJDQD4mMrJobpxpFhDIpr1W3LdwLt3KSBVaiOM1MiLLtZXXx', '_1lFTVul5ygYE7tSuEVJo1vy03xwbC3Tyj7eyIqWbQO7uUUARMEQlZLxKnujRSz38', 'ULnqhtulRJGPqKGrPrQWnI0xBtN1xuVi0KUt4aX7WY08NDRaCNGCrQP4cMGL0SoH', 'XwQu23QjD4y2N2HJmttlFwA0wLnNxaMf5zZdaSOVwDEimbXPyzNM41kPISCQ0qbp', 'aHJQwDQ58gUTWzeLirtXVclOWTvXWQTG3Jf3YbHByBtb7H6C8ARTMJy9KngddhZy', '_396kMFMRAjwTTJH9tmYDOF89sUX27RzXIQiyanyHwMbMpcygx9PZrVySHsSIt4mU'
              Source: Scvi1cE64H.exe, pFJU8PVl0OMHVTXOMKghPYws.csHigh entropy of concatenated method names: 'duKd51dyVhRJbCXh5M8wNsTd', '_0rDo9wucrOUIJ9TIYixqtaZl', 'F3qmsInRxwSf494bI0U9fkv4', 'onYpxJeDXBxNGc7PFu91cU5y', 'Ew15iN7ag49yMK6HadKdCEb6', 'V9ZG59lIVH0F5UDTxMarEyZ6', 'Q6o3F9brlMmtc0d3HNdTYlV6', 'ylXVxyBriCeesyZbVDMwkGQi', 'wZrQ3VOvb76xdIVrlklnxYM5', 'fNqMuvpw0E9QTBPBQsT9QmG9'
              Source: Scvi1cE64H.exe, UytzpvvfhgdodWuM1KZ7aZTAPVSQEtXSdsOGaz2e9C21jVxQ3nbdZxqQpNN4nQBhEe0PcRdS6U3mwtTdmWxuuTrZVixA3A6L.csHigh entropy of concatenated method names: 'mPoxmxnEaOCFM4FngcgX4ZW5Riw7RaPfsj6BlWekcyyN9bDcWDQKMTuSwosZcXgXqsLYurU8AHNcl6QZrFHaPkFUb2l5ju30', 'YKMP4UTFLhYwMAmh8dqi04tykZJx37SmD4UfPyuLjqZIa0UlzOqKImejHESMgiunqv8Rdk03jbT0eYPj1W', 'XM4nYoTQJzx56ZHfQlTgnP6S6PFzSGaJR59ONBCXLB8c62mZdqwTK1ZS784Aei5EX5MXUNODKS3Vrhi2Ml', 'sjAbjOE0f1n8E7jRSvbKJGangE81gCgoVpGBswvIJbIzAVlsvCvKQ86Sd0newKUQdoTJawvRQmKTEj3Ssb', 'dT0wADgG7q6vvxNwBFMuVZ9brjbZgQ9wNz2Dmde8x77gFpgN2FQad97vlZpZGlBm1Rxv2n6B4lvMFhUBrn', '_6e6kh99vJlznoNBWfUB9AeUiQoSjKrL7pSRHLW9K0ceSBt2mC22PSV4aJIFFH3LROyw0tKj3BB1DGQ0NWO', 'c5ctS7kBTSbR6KmDNp0cVrBvcYL7kceVTc6bNTOrK7sd2dGi41OV5P5J29jYY9njVTHvsX5aW0i3a5nKPJ', 'lZX6C2p0SpEY2HELb4gaPIBcTR0DQJUKQqf345wMgT7eKYr8vcts6rfMqfKxODgg07byJOjQxtHII313hF', '_7y8tbnPvRPICJ0zJNVrU7dPvJhZrKy2MZ8Aj41QbyBiidK3nfw5ybTARxgHasFWEHLohZFdF5Zc9lALMAC', 'bfuvvKGkPfldi9lLEqOR5FtfP2zeSUatWqUb64YarUHJvSlLa07PpLGb2vgQALqLHS1IANEwIXOP9rMblS'
              Source: Scvi1cE64H.exe, 4mqXBzlFteZTbYmXywgrmwgY6theYoKVNbvtVSjLucwWfRste8BLoH7qiaUn7z8hTKI0R2sNFUjkhgUgcbU30rPHKVxzg2sY.csHigh entropy of concatenated method names: '_0d7XLkLfb51c0DlKNz4piTLVG0jMCQn6MM568KcAn5uSRhBna6KVBPxdeQloQZhXEIX3qOvEMH7PE6B2PrsOOPnI0r8YrLSE', 'mPXrozmuf0Ep2R91l7igqphUryt0cdOrxOqduna739uCrRYae80zTVx1X1PhFrvTKT10Z0GbOxcyGOr4BbWnfeDNhmYk71W5', 'vBMgtLWrGgaojoCiplOV42qpEWgiTIss56UrETzlZ393wfa7e27rq3ebKeDtA9WXvhocfgcUm5xDDUfNIrP1xMUg2PnvKRtr', 'mD5kAVWHwxX4PvNKxJK', '_6cEKQ1E5GTiVwfzoPCx', 'Ziu8lcgrnG4lBdhS89v', 'byobc78NZzKNJyUh4nU', 'MinIft9cR3e6F44oDnz', 'T3XbsVKbkslmdX4P8Tl', 'drL7bhwkUlqbt6HwSqz'
              Source: Scvi1cE64H.exe, l3FDt0SSWoF5yrP2FocxyGUC.csHigh entropy of concatenated method names: 'yhxDH3tHEmGEgAdkClAhRNLr', '_67Lund9yrSYGUCIbivekypOy', '_2rKXAAyov6HwiAHsyLNwAN2M', 'Kw7sZCUuK0vpMwZsMe70c4xE', 'DeNdHVAqrZnNB4O3lvW', 'OBGL9QPHXcAxFmb4on6', 'AYReesvbQZwwVAbVKmp', 'Tdh96rJsN66ngRJC0w6', 'yv4iNm33ZmRTdWV9Di4', 'FbgEfMQhgVWQDmFAH6g'
              Source: Scvi1cE64H.exe, 2zpWi5nbN4skGn.csHigh entropy of concatenated method names: 'lIXPxIW7Sa7S0cdlY3bJ1fO64BjDmaazwavFTgV91jIFkZ', 'iWuM6kr6Sb2RoYVv5eTaxPSZPCjvxLCTtVhF5nDwlS31gm', 'O4LbHkrXqGjSRSr7sYtuIIIWFtbcHU7duJt7Nq0jH1iDJc', '_1NhVAqBV8PQ2mstxFrG4wsuRmgOlMLGFU9zc3ryelldbYw', 'FYITLHmzZVVyREUG97e88echKY7YjidaEBsaO68lq3Zp77', 'UenQD4pgQvrmBF8w4FpTd6xJuMmGKFlHUOeA0k1ohjRN0r', 'cv76Wbq1Sojn9quMosvpbHlnRaDI5XjyF89AbirkEaafeo', 'qlvrFjaupdlSBcLdduIzIEGwvJMUQUQ5BaPXuAWJch5dwi', 'ggJMZNJ3E4Ejb9PWkO3su4Qgpwx2RNtKyqijG10XidMkiR', 'OSTx9wrJVu7iMwRofMFMrmKJhGD9O0W2ncmAEDfjz4L58A'
              Source: SystemBootComponent.exe.0.dr, ZlL3D9KbmHSvkrKnUH4Va1fWZ3p83RkW7l1NAqI3dbAH47AVh0iMWTnd.csHigh entropy of concatenated method names: 'mo5BLVBKsmpMh2rONYS0984TkvIxqr6MQ94KO1XDxdKnGP0IlwX8oB95', 'XQ1Xbhj7R0RDD5Y49fCQ96ILXAuyG4J9UkxeJHAthyhsS58RnyM0a1zi', 'Pz48E8fEpoACFKMzDU3EVSdPSXhkoSLWNV41zgyWhzQGtSJRis5xoWwj', '_8aNzHK2u4ZzdqyiQHFmMhDt4huw5ZJtjjM3I5ws2iahzVWvm1bMkuLApU0QC9o7f43vIvJo2CJhXZ2oSz6k', 'aHRhYay7ZJ5VSmcjpN6kAd4hnWwAaKQWqlBwWsI8XThKrFNYG63xv05sEn9yuPX6mpB4U6eJgOELpGVXm9f', '_8Lz6ogy6PqvIXQoUtoppb5Fakig4ptMSTQco8mqmpfu5JStKh1PgW2SkK8zFpz668f5rUZsINaJBtj131Ak', '_7Lgr4Nc7ft7R1Xspn1K8lRVcExAB18Q9l0SJIW754zl3RDptkZnqgigilZsrb3UXPstAUuv9ARUbvZkV6PB', 'HhbhJmlA3L5rKQPwf5flCy4lOdAmYWxHjTOLTAlqU6h87BkJteYSn1k8vRmf7N3OZNAsOcKWPGCmEAKg42G', 'YtFJcDGZ20M54Sr5BQh0aFwUmbIpgeiNdUs6w8n2oT5HrXzFgeUKtg8kxddBeftm8QPkWjufaDA0PhFwvsV', '_5t2ihwXfAxCGfRmkGWkfrt1mKFWQ47Hq4NTBvprp8sZEF8ZJRYoJsmQ0mmQQiCipf0opI6ChB1l1xtBqkWX'
              Source: SystemBootComponent.exe.0.dr, JXkizmRngv50etlHAeIOHrbgu8AM0.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'Tt5C8HXVlF5d1Kbv', 'V1YbTlMA4HAFBrI7', 'xLwVHbaVcMA4QZrg', 'lcYhqdSpIPPdVJ3Q'
              Source: SystemBootComponent.exe.0.dr, VpmzBc3f598aquFiwXNhIxTBuX6LJzZNksXSMNQ3LBdweOxeqNii6Hm95bmJF4R6EIPriZQM1vB41ORiCblxI5Wp1MeuHnrv.csHigh entropy of concatenated method names: 'CvR9P5lAIclf2oGb1YdMctJLenwO42L6ZUbjbo4ixPd9Twzv96tYe440LuqMhqkAkBv4ELNDsOlnarjqnfCddzWDj7IEXtGn', 'ZFdvpob5Y2vLfICQbAp', '_8f5fegXfVsd2dCItAWb', 'BdZT9yM28P4Q10wjF7z', 'QOxSw019TQQHFVLco8N'
              Source: SystemBootComponent.exe.0.dr, iOYSc1YnPaSxZX.csHigh entropy of concatenated method names: 'pgeqosPsoRKuOy', 'S7O9v0Wbys2XuU', 'ks6Ym1jt88jDRl', 'F9jBk8meRXehJh', 'LdKmwi0kPIyb4rlr', 'wcIKSu5e793IJX9R', 'BcOjWVU9EXrDDYf1', '_6BW3hutaedNqdDMe', 'MCbx3ZVtslDC0OoC', 'hZbXDSafbk8DNJeo'
              Source: SystemBootComponent.exe.0.dr, ZOdQlYmq59O21neTylhk7EoGC92YlEK3g7xAHmmlcaE3hjA1lzMOE08xwo0wFz9fMiiWPuuH1sCsDIl.csHigh entropy of concatenated method names: '_77vZspajKG4MXnstLSkix7k55gIld4cV3fFsLoa25Fv0uxfusVC6i5IMnIZJqY1MERf6dujTqbmiFW4', '_7Xfuj2grk5ViS4utjwlw65hmfgOi7J1o1WvwJDHrjlsNtdpJuoAyNZTUgFdakbciAxN0dhY8QDTiVEh', 'LmARPzCmtdhthclG0qwBlPVYNmN0PpKUAsiFQpY0ncwfJJby3ftBqgOHZSSFahCG', '_4uQFJWi48147Fktt3okMwdxCBlkk9gRKVLIk59g34XLaxRY71ytyd18PBCTeCUyH', 'YH2iCsxPOE14jkcSgJDQD4mMrJobpxpFhDIpr1W3LdwLt3KSBVaiOM1MiLLtZXXx', '_1lFTVul5ygYE7tSuEVJo1vy03xwbC3Tyj7eyIqWbQO7uUUARMEQlZLxKnujRSz38', 'ULnqhtulRJGPqKGrPrQWnI0xBtN1xuVi0KUt4aX7WY08NDRaCNGCrQP4cMGL0SoH', 'XwQu23QjD4y2N2HJmttlFwA0wLnNxaMf5zZdaSOVwDEimbXPyzNM41kPISCQ0qbp', 'aHJQwDQ58gUTWzeLirtXVclOWTvXWQTG3Jf3YbHByBtb7H6C8ARTMJy9KngddhZy', '_396kMFMRAjwTTJH9tmYDOF89sUX27RzXIQiyanyHwMbMpcygx9PZrVySHsSIt4mU'
              Source: SystemBootComponent.exe.0.dr, pFJU8PVl0OMHVTXOMKghPYws.csHigh entropy of concatenated method names: 'duKd51dyVhRJbCXh5M8wNsTd', '_0rDo9wucrOUIJ9TIYixqtaZl', 'F3qmsInRxwSf494bI0U9fkv4', 'onYpxJeDXBxNGc7PFu91cU5y', 'Ew15iN7ag49yMK6HadKdCEb6', 'V9ZG59lIVH0F5UDTxMarEyZ6', 'Q6o3F9brlMmtc0d3HNdTYlV6', 'ylXVxyBriCeesyZbVDMwkGQi', 'wZrQ3VOvb76xdIVrlklnxYM5', 'fNqMuvpw0E9QTBPBQsT9QmG9'
              Source: SystemBootComponent.exe.0.dr, UytzpvvfhgdodWuM1KZ7aZTAPVSQEtXSdsOGaz2e9C21jVxQ3nbdZxqQpNN4nQBhEe0PcRdS6U3mwtTdmWxuuTrZVixA3A6L.csHigh entropy of concatenated method names: 'mPoxmxnEaOCFM4FngcgX4ZW5Riw7RaPfsj6BlWekcyyN9bDcWDQKMTuSwosZcXgXqsLYurU8AHNcl6QZrFHaPkFUb2l5ju30', 'YKMP4UTFLhYwMAmh8dqi04tykZJx37SmD4UfPyuLjqZIa0UlzOqKImejHESMgiunqv8Rdk03jbT0eYPj1W', 'XM4nYoTQJzx56ZHfQlTgnP6S6PFzSGaJR59ONBCXLB8c62mZdqwTK1ZS784Aei5EX5MXUNODKS3Vrhi2Ml', 'sjAbjOE0f1n8E7jRSvbKJGangE81gCgoVpGBswvIJbIzAVlsvCvKQ86Sd0newKUQdoTJawvRQmKTEj3Ssb', 'dT0wADgG7q6vvxNwBFMuVZ9brjbZgQ9wNz2Dmde8x77gFpgN2FQad97vlZpZGlBm1Rxv2n6B4lvMFhUBrn', '_6e6kh99vJlznoNBWfUB9AeUiQoSjKrL7pSRHLW9K0ceSBt2mC22PSV4aJIFFH3LROyw0tKj3BB1DGQ0NWO', 'c5ctS7kBTSbR6KmDNp0cVrBvcYL7kceVTc6bNTOrK7sd2dGi41OV5P5J29jYY9njVTHvsX5aW0i3a5nKPJ', 'lZX6C2p0SpEY2HELb4gaPIBcTR0DQJUKQqf345wMgT7eKYr8vcts6rfMqfKxODgg07byJOjQxtHII313hF', '_7y8tbnPvRPICJ0zJNVrU7dPvJhZrKy2MZ8Aj41QbyBiidK3nfw5ybTARxgHasFWEHLohZFdF5Zc9lALMAC', 'bfuvvKGkPfldi9lLEqOR5FtfP2zeSUatWqUb64YarUHJvSlLa07PpLGb2vgQALqLHS1IANEwIXOP9rMblS'
              Source: SystemBootComponent.exe.0.dr, 4mqXBzlFteZTbYmXywgrmwgY6theYoKVNbvtVSjLucwWfRste8BLoH7qiaUn7z8hTKI0R2sNFUjkhgUgcbU30rPHKVxzg2sY.csHigh entropy of concatenated method names: '_0d7XLkLfb51c0DlKNz4piTLVG0jMCQn6MM568KcAn5uSRhBna6KVBPxdeQloQZhXEIX3qOvEMH7PE6B2PrsOOPnI0r8YrLSE', 'mPXrozmuf0Ep2R91l7igqphUryt0cdOrxOqduna739uCrRYae80zTVx1X1PhFrvTKT10Z0GbOxcyGOr4BbWnfeDNhmYk71W5', 'vBMgtLWrGgaojoCiplOV42qpEWgiTIss56UrETzlZ393wfa7e27rq3ebKeDtA9WXvhocfgcUm5xDDUfNIrP1xMUg2PnvKRtr', 'mD5kAVWHwxX4PvNKxJK', '_6cEKQ1E5GTiVwfzoPCx', 'Ziu8lcgrnG4lBdhS89v', 'byobc78NZzKNJyUh4nU', 'MinIft9cR3e6F44oDnz', 'T3XbsVKbkslmdX4P8Tl', 'drL7bhwkUlqbt6HwSqz'
              Source: SystemBootComponent.exe.0.dr, l3FDt0SSWoF5yrP2FocxyGUC.csHigh entropy of concatenated method names: 'yhxDH3tHEmGEgAdkClAhRNLr', '_67Lund9yrSYGUCIbivekypOy', '_2rKXAAyov6HwiAHsyLNwAN2M', 'Kw7sZCUuK0vpMwZsMe70c4xE', 'DeNdHVAqrZnNB4O3lvW', 'OBGL9QPHXcAxFmb4on6', 'AYReesvbQZwwVAbVKmp', 'Tdh96rJsN66ngRJC0w6', 'yv4iNm33ZmRTdWV9Di4', 'FbgEfMQhgVWQDmFAH6g'
              Source: SystemBootComponent.exe.0.dr, 2zpWi5nbN4skGn.csHigh entropy of concatenated method names: 'lIXPxIW7Sa7S0cdlY3bJ1fO64BjDmaazwavFTgV91jIFkZ', 'iWuM6kr6Sb2RoYVv5eTaxPSZPCjvxLCTtVhF5nDwlS31gm', 'O4LbHkrXqGjSRSr7sYtuIIIWFtbcHU7duJt7Nq0jH1iDJc', '_1NhVAqBV8PQ2mstxFrG4wsuRmgOlMLGFU9zc3ryelldbYw', 'FYITLHmzZVVyREUG97e88echKY7YjidaEBsaO68lq3Zp77', 'UenQD4pgQvrmBF8w4FpTd6xJuMmGKFlHUOeA0k1ohjRN0r', 'cv76Wbq1Sojn9quMosvpbHlnRaDI5XjyF89AbirkEaafeo', 'qlvrFjaupdlSBcLdduIzIEGwvJMUQUQ5BaPXuAWJch5dwi', 'ggJMZNJ3E4Ejb9PWkO3su4Qgpwx2RNtKyqijG10XidMkiR', 'OSTx9wrJVu7iMwRofMFMrmKJhGD9O0W2ncmAEDfjz4L58A'
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeFile created: C:\Users\user\AppData\Local\Temp\SystemBootComponent.exeJump to dropped file
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SystemBootComponent.lnkJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SystemBootComponent.lnkJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeMemory allocated: 26E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeMemory allocated: 1A8B0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeWindow / User API: threadDelayed 7768Jump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeWindow / User API: threadDelayed 2089Jump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exe TID: 2420Thread sleep time: -1844674407370954s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: Amcache.hve.9.drBinary or memory string: VMware
              Source: Amcache.hve.9.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.9.drBinary or memory string: VMware, Inc.
              Source: Amcache.hve.9.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.9.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.9.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.9.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.9.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
              Source: Amcache.hve.9.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Scvi1cE64H.exe, 00000000.00000002.3017551517.0000000000A59000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWm.%SystemRoot%\system32\mswsock.dll=neutral, PublicKeyToken=b77a5c561934e089
              Source: Amcache.hve.9.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: Amcache.hve.9.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.9.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.9.drBinary or memory string: vmci.sys
              Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin`
              Source: Amcache.hve.9.drBinary or memory string: \driver\vmci,\driver\pci
              Source: Amcache.hve.9.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.9.drBinary or memory string: VMware20,1
              Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.9.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.9.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.9.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.9.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.9.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: Amcache.hve.9.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.9.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.9.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: Amcache.hve.9.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeQueries volume information: C:\Users\user\Desktop\Scvi1cE64H.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.9.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
              Source: Amcache.hve.9.drBinary or memory string: MsMpEng.exe
              Source: C:\Users\user\Desktop\Scvi1cE64H.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: Scvi1cE64H.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.Scvi1cE64H.exe.5e0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.2106877000.00000000005E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.3018554385.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Scvi1cE64H.exe PID: 5016, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\SystemBootComponent.exe, type: DROPPED

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: Scvi1cE64H.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.Scvi1cE64H.exe.5e0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.2106877000.00000000005E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.3018554385.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Scvi1cE64H.exe PID: 5016, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\SystemBootComponent.exe, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
              Windows Management Instrumentation
              2
              Registry Run Keys / Startup Folder
              1
              Process Injection
              1
              Masquerading
              OS Credential Dumping231
              Security Software Discovery
              Remote Services11
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              2
              Registry Run Keys / Startup Folder
              1
              Disable or Modify Tools
              LSASS Memory1
              Process Discovery
              Remote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              141
              Virtualization/Sandbox Evasion
              Security Account Manager141
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets1
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Obfuscated Files or Information
              Cached Domain Credentials13
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
              Software Packing
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Scvi1cE64H.exe82%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
              Scvi1cE64H.exe100%AviraTR/Spy.Gen
              Scvi1cE64H.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\SystemBootComponent.exe100%AviraTR/Spy.Gen
              C:\Users\user\AppData\Local\Temp\SystemBootComponent.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\SystemBootComponent.exe82%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              81.161.238.2490%Avira URL Cloudsafe
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              81.161.238.249true
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://upx.sf.netAmcache.hve.9.drfalse
                high
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameScvi1cE64H.exe, 00000000.00000002.3018554385.00000000028B1000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  81.161.238.249
                  unknownGermany
                  207146NETIKOM-ASITtrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1561586
                  Start date and time:2024-11-23 21:01:07 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 4m 21s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:10
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Critical Process Termination
                  Sample name:Scvi1cE64H.exe
                  renamed because original name is a hash value
                  Original Sample Name:638a8fcaec15d795231c5267c9649453ba4b85d0ea09a4455b2f20ea12be39a5.exe
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@2/8@0/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 98%
                  • Number of executed functions: 13
                  • Number of non-executed functions: 4
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtSetInformationFile calls found.
                  • VT rate limit hit for: Scvi1cE64H.exe
                  TimeTypeDescription
                  15:02:00API Interceptor1287596x Sleep call for process: Scvi1cE64H.exe modified
                  21:02:01AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SystemBootComponent.lnk
                  No context
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  NETIKOM-ASITn5QCsKJ0CP.exeGet hashmaliciousRedLineBrowse
                  • 81.161.238.38
                  wyOEIjmWs8.exeGet hashmaliciousRemcosBrowse
                  • 81.161.238.174
                  17308799445bb8287de7df48f59c1bda103369e3b3f101fa2921985dedc6b2bd9077b91ee0277.dat-decoded.exeGet hashmaliciousAsyncRAT, XWormBrowse
                  • 81.161.238.107
                  https://81.161.238.66Get hashmaliciousXmrigBrowse
                  • 81.161.238.66
                  KMqGoudziq.elfGet hashmaliciousUnknownBrowse
                  • 81.161.235.176
                  No context
                  No context
                  Process:C:\Windows\System32\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):1.2897149520801492
                  Encrypted:false
                  SSDEEP:192:w46pbV3081iHxaWz8iygInlWaPzuiFoZ24lO8/4m:wbpbVE81iRa48iaWKzuiFoY4lO8/5
                  MD5:C9A1906F3568A3948DAC9B8D2A4228E9
                  SHA1:6939C46D36EB0C202D82612DB3D518C9260E13DE
                  SHA-256:5FC70C28720B3001B82F4910A684AC2D249A2BF8DFFBA40254D21C1EDDCF8E59
                  SHA-512:9E650BE4170B89EB2DB808D6EC12C8C10C9482D26D52647E46823079E27684FAC57B3CD402CA247705E1B072F8E158EF3C13FFF90711F096BBA91FF03740CA2B
                  Malicious:true
                  Reputation:low
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.r.i.t.i.c.a.l.P.r.o.c.e.s.s.F.a.u.l.t.2.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.6.8.6.5.8.0.1.4.1.1.2.4.8.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.8.7.c.2.2.5.9.-.0.9.a.0.-.4.6.2.d.-.a.0.b.2.-.1.5.f.e.b.9.8.8.b.2.3.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.2.4.c.3.e.4.0.-.e.d.a.f.-.4.3.7.e.-.a.a.0.1.-.4.4.b.5.2.c.8.1.2.2.d.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.S.c.v.i.1.c.E.6.4.H...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.S.y.s.t.e.m.B.o.o.t.C.o.m.p.o.n.e.n.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.9.8.-.0.0.0.1.-.0.0.1.5.-.8.f.9.1.-.3.1.8.c.e.2.3.d.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.d.5.0.8.7.f.c.a.5.9.4.5.1.2.f.b.9.9.a.9.3.4.2.1.4.4.c.d.c.a.2.0.0.0.0.0.0.0.0.!.0.0.0.0.c.3.1.e.6.1.1.3.8.c.6.c.7.f.9.a.e.6.4.d.a.8.6.4.2.0.e.b.4.7.4.c.a.8.8.f.7.3.4.f.!.S.c.v.i.1.c.E.6.4.H...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1./.
                  Process:C:\Windows\System32\WerFault.exe
                  File Type:Mini DuMP crash report, 16 streams, Sat Nov 23 20:03:21 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):626827
                  Entropy (8bit):2.972974230942374
                  Encrypted:false
                  SSDEEP:6144:OJoS8VS0aS+C5QcSqz+3Qi619H6hUXbA0qFnDCScJTT8Dje:G0T4qz+Qv8UXbA9W
                  MD5:D233787F955C544D6A1EC9DB24FC3D2B
                  SHA1:3928371F4EF778F04D318ACCE419A86F8A0F0338
                  SHA-256:E7A9F21F2471FC61C943DF85CB0A4DE715486F3ADED08258E71C67BA29A276FE
                  SHA-512:1E771399A51E4E377C2EB07CBEE7F907B3A7AC7A350C48D5BEDB449EDC1E96F7D80F4FD864CEB925FA32BA267D21911992CF70EB7A27C4CEE8323660664B1F11
                  Malicious:false
                  Reputation:low
                  Preview:MDMP..a..... ........5Bg............$............ ..D.......$...0,..........T,.......E.............l.......8...........T............L...D...........=...........>..............................................................................eJ.......?......Lw......................T............4Bg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\System32\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):9282
                  Entropy (8bit):3.701792490287835
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJBAinM6Y2D3GRPgmfk4j94t8XKprL89beMjPnPPafPKm:R6lXJGp6YaGRPgmfkU4t6egPnPPafT
                  MD5:96CA39DCDD24FA115DFC4ADA2A4E20F6
                  SHA1:947D5CE71AC74DCA0D4F3BCE5435569A942B53FE
                  SHA-256:B4CA98F44CD496075404E2FBBD2618513D673E82B766C23D59F9816BAFFF2C79
                  SHA-512:385E58E3821AE2824324CB92906EED3B2DE68B1AC03E1DF5555EB6DB4603C6A1F7102462CD83C5F342DC3A73A1AD33F401E20C0C2516851FC56BD0B7FB0EC51C
                  Malicious:false
                  Reputation:low
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.0.1.6.<./.P.i.
                  Process:C:\Windows\System32\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4937
                  Entropy (8bit):4.4720668343824
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zs4Jg771I955kNlWpW8VYoYm8M4JqlOSFtyq8vRCOa1FNAit4d:uIjf+I7qkG7VkJovWQz1FNbt4d
                  MD5:9861895A9E904369B63C81D7EDE77FD1
                  SHA1:CDF6662FDC6C816DBE368497CCB06886CD2D08BC
                  SHA-256:DDB61DC06C0AD7AEF816A6F9FA440B020894763A4B8D95073C582BE3A82E9B03
                  SHA-512:29FD4D77D26A3CDC3D38604E589521E8191FB500BF3DB0D65A3D58CB88CF4F928C128345B686BA9A41557CBA6A1478E1442B18FA5547FA499C27F25DE34BF153
                  Malicious:false
                  Reputation:low
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="601146" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Users\user\Desktop\Scvi1cE64H.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):29
                  Entropy (8bit):3.598349098128234
                  Encrypted:false
                  SSDEEP:3:rRSFYJKXzovNsra:EFYJKDoWra
                  MD5:2C11513C4FAB02AEDEE23EC05A2EB3CC
                  SHA1:59177C177B2546FBD8EC7688BAD19D08D32640DE
                  SHA-256:BCF3676333E528171EEE1055302F3863A0C89D9FFE7017EA31CF264E13C8A699
                  SHA-512:08196AFA62650F1808704DCAD9918DA11175CD8792878F63E35F517B4D6CF407AC9E281D9B71A76E4CC1486CAD7079C56B74ECBEDB0A0F0DD4170FB0D30D2BAD
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview:....### explorer ###..[WIN]r
                  Process:C:\Users\user\Desktop\Scvi1cE64H.exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):71680
                  Entropy (8bit):6.045020716272887
                  Encrypted:false
                  SSDEEP:1536:k+pH/PHZR+AcBTug2A4fsifZpbLyV+b9rYCYhd0ijWg9plObRIFnPJ9:pHMPhaJnby+b9NuWaplObREh9
                  MD5:07C09B14A7719A820968AD2222428B87
                  SHA1:C31E61138C6C7F9AE64DA86420EB474CA88F734F
                  SHA-256:638A8FCAEC15D795231C5267C9649453BA4B85D0EA09A4455B2F20EA12BE39A5
                  SHA-512:CE0F12A050F97434156D6872E30D722CE7EC72C1133A5581D12561095156E8F0357EAEB3BB622BBEFDB2EA1CBC3DEB81D96EEB1386379996B446D2D9CC53D8C6
                  Malicious:true
                  Yara Hits:
                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\SystemBootComponent.exe, Author: Joe Security
                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\SystemBootComponent.exe, Author: ditekSHen
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 82%
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...|.Ag............................^,... ...@....@.. ....................................@..................................,..O....@.......................`....................................................... ............... ..H............text...d.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................@,......H........h..........&.....................................................(....*.r...p*. ...*..(....*.rU..p*. Q.x.*.s.........s.........s.........s.........*.rw..p*. .(T.*.r...p*. !.+.*.r...p*. .g..*.r...p*. #...*.r...p*. ..e.*..((...*.r...p*. *p{.*.r9..p*. ....*"(....+.*&(....&+.*.+5sJ... .... .'..oK...(,...~....-.(D...(6...~....oL...&.-.*.r...p*. .&..*.r...p*.r+..p*. ~.H.*.rM..p*. r.d.*.ro..p*. E/..*..............j..................sM..............~.........*"(F...+.*:.t..
                  Process:C:\Users\user\Desktop\Scvi1cE64H.exe
                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Nov 23 19:02:00 2024, mtime=Sat Nov 23 19:02:00 2024, atime=Sat Nov 23 19:02:00 2024, length=71680, window=hide
                  Category:dropped
                  Size (bytes):1117
                  Entropy (8bit):4.962962667875026
                  Encrypted:false
                  SSDEEP:24:8i8cDllX7bX2RPgKJqTUWm8AKa8AW/7Zh+Z2qygm:8i8cDllLbGRQ36/8X/9EZzyg
                  MD5:2E062721E18F87596B2E655DD4BA59C3
                  SHA1:1071172A6389775265FDB49203DCBF6AF6D221A3
                  SHA-256:11E35951EB499CB32E3EC059A796496AE4265F1A0EF66B77FEFD4D2C50E81AAA
                  SHA-512:601CA5AE3D3AF988D9213FC701BD6CDC7BC74ADA78EB497D61E397F892E2AC223DA9A849DF6A1AF52E6EB30744AC29A72E47EE920A66A1B25604EAAB717B6ACF
                  Malicious:false
                  Reputation:low
                  Preview:L..................F.... .......=......=......=............................:..DG..Yr?.D..U..k0.&...&.......$..S....(..=..C...=......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2wY;............................^.A.p.p.D.a.t.a...B.P.1.....wY9...Local.<......EW<2wY;.....[.......................[.L.o.c.a.l.....N.1.....wY;...Temp..:......EW<2wY;.....^.....................dke.T.e.m.p.....|.2.....wYA. .SYSTEM~1.EXE..`......wYA.wYA...........................j...S.y.s.t.e.m.B.o.o.t.C.o.m.p.o.n.e.n.t...e.x.e.......k...............-.......j...........*>x......C:\Users\user\AppData\Local\Temp\SystemBootComponent.exe..4.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.S.y.s.t.e.m.B.o.o.t.C.o.m.p.o.n.e.n.t...e.x.e.............:...........|....I.J.H..K..:...`.......X.......226533...........hT..CrF.f4... .....Jc...-...-$..hT..CrF.f4... .....Jc...-...-$.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.
                  Process:C:\Windows\System32\WerFault.exe
                  File Type:MS Windows registry file, NT/2000 or above
                  Category:dropped
                  Size (bytes):1835008
                  Entropy (8bit):4.468808504291235
                  Encrypted:false
                  SSDEEP:6144:fzZfpi6ceLPx9skLmb0f5ZWSP3aJG8nAgeiJRMMhA2zX4WABluuNXjDH5S2:LZHt5ZWOKnMM6bFphj42
                  MD5:293F71EA928BA7403723334F3E791BD4
                  SHA1:7A921EFAB9288230123FA72B167085E7976F4756
                  SHA-256:376E9AB3CD75D8FB897CF20E99A5A80DC3B7116C1CC1DA0B5CAF77D96F888F62
                  SHA-512:F56EDCE2E3D48E99B48A5B86B443C90E93B702BED237AA73B22BAE451A8B22BA2C6E53A1EE1973A3B2043AE6EE30274512E8502CC3665C6C1883E8D4459FE3F1
                  Malicious:false
                  Reputation:low
                  Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....=.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):6.045020716272887
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  • Win32 Executable (generic) a (10002005/4) 49.75%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Windows Screen Saver (13104/52) 0.07%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  File name:Scvi1cE64H.exe
                  File size:71'680 bytes
                  MD5:07c09b14a7719a820968ad2222428b87
                  SHA1:c31e61138c6c7f9ae64da86420eb474ca88f734f
                  SHA256:638a8fcaec15d795231c5267c9649453ba4b85d0ea09a4455b2f20ea12be39a5
                  SHA512:ce0f12a050f97434156d6872e30d722ce7ec72c1133a5581d12561095156e8f0357eaeb3bb622bbefdb2ea1cbc3deb81d96eeb1386379996b446d2d9cc53d8c6
                  SSDEEP:1536:k+pH/PHZR+AcBTug2A4fsifZpbLyV+b9rYCYhd0ijWg9plObRIFnPJ9:pHMPhaJnby+b9NuWaplObREh9
                  TLSH:64639DAC77E98515E0FFABB019B67312C779F6235803D36F64D5028B2723A888D506E7
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...|.Ag............................^,... ...@....@.. ....................................@................................
                  Icon Hash:00928e8e8686b000
                  Entrypoint:0x412c5e
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0x6741ED7C [Sat Nov 23 14:58:04 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x12c0c0x4f.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000x4fe.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x160000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000x10c640x10e0097a0662a4bc4ceb53d437480ba2acc47False0.5909143518518518data6.121319493977618IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rsrc0x140000x4fe0x600babc890730caf3a578b757e481efcb5eFalse0.3821614583333333data3.799849732302214IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x160000xc0x20017523650017922a00ddc8c385bd6d22aFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_VERSION0x140a00x274data0.4554140127388535
                  RT_MANIFEST0x143140x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                  DLLImport
                  mscoree.dll_CorExeMain
                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                  2024-11-23T21:02:07.465700+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes181.161.238.2497000192.168.2.649707TCP
                  2024-11-23T21:02:07.465700+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2181.161.238.2497000192.168.2.649707TCP
                  2024-11-23T21:02:12.893886+01002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.64970781.161.238.2497000TCP
                  2024-11-23T21:02:13.400101+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes181.161.238.2497000192.168.2.649707TCP
                  2024-11-23T21:02:13.402157+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970781.161.238.2497000TCP
                  2024-11-23T21:02:23.557552+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes181.161.238.2497000192.168.2.649707TCP
                  2024-11-23T21:02:23.559692+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970781.161.238.2497000TCP
                  2024-11-23T21:02:33.751740+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes181.161.238.2497000192.168.2.649707TCP
                  2024-11-23T21:02:33.755268+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970781.161.238.2497000TCP
                  2024-11-23T21:02:37.469899+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes181.161.238.2497000192.168.2.649707TCP
                  2024-11-23T21:02:37.469899+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2181.161.238.2497000192.168.2.649707TCP
                  2024-11-23T21:02:44.031724+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes181.161.238.2497000192.168.2.649707TCP
                  2024-11-23T21:02:44.052119+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970781.161.238.2497000TCP
                  2024-11-23T21:02:54.258816+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes181.161.238.2497000192.168.2.649707TCP
                  2024-11-23T21:02:54.261219+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970781.161.238.2497000TCP
                  2024-11-23T21:03:04.530376+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes181.161.238.2497000192.168.2.649707TCP
                  2024-11-23T21:03:04.533275+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970781.161.238.2497000TCP
                  2024-11-23T21:03:07.459544+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes181.161.238.2497000192.168.2.649707TCP
                  2024-11-23T21:03:07.459544+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2181.161.238.2497000192.168.2.649707TCP
                  2024-11-23T21:03:14.808213+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes181.161.238.2497000192.168.2.649707TCP
                  2024-11-23T21:03:14.821165+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970781.161.238.2497000TCP
                  2024-11-23T21:03:15.682718+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes181.161.238.2497000192.168.2.649707TCP
                  2024-11-23T21:03:15.684773+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970781.161.238.2497000TCP
                  2024-11-23T21:03:17.594967+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes181.161.238.2497000192.168.2.649707TCP
                  2024-11-23T21:03:17.598172+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970781.161.238.2497000TCP
                  2024-11-23T21:03:17.878758+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes181.161.238.2497000192.168.2.649707TCP
                  2024-11-23T21:03:17.881558+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64970781.161.238.2497000TCP
                  TimestampSource PortDest PortSource IPDest IP
                  Nov 23, 2024 21:02:02.356544018 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:02:02.482356071 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:02:02.482443094 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:02:02.646759033 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:02:02.766391993 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:02:07.465699911 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:02:07.513564110 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:02:12.893886089 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:02:13.115262032 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:02:13.400100946 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:02:13.402157068 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:02:13.531665087 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:02:23.107894897 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:02:23.254400015 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:02:23.557552099 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:02:23.559691906 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:02:23.679270983 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:02:33.347804070 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:02:33.470540047 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:02:33.751739979 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:02:33.755268097 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:02:33.876441002 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:02:37.469898939 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:02:37.513649940 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:02:43.628516912 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:02:43.748806953 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:02:44.031723976 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:02:44.052119017 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:02:44.178438902 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:02:53.857846022 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:02:53.977392912 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:02:54.258816004 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:02:54.261219025 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:02:54.387671947 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:03:04.092130899 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:03:04.214582920 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:03:04.530375957 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:03:04.533274889 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:03:04.652961016 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:03:07.459543943 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:03:07.513756037 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:03:14.326922894 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:03:14.452683926 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:03:14.808212996 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:03:14.821165085 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:03:14.940881968 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:03:15.202112913 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:03:15.395648003 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:03:15.682718039 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:03:15.684772968 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:03:15.811028004 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:03:17.123946905 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:03:17.247952938 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:03:17.436378956 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:03:17.555944920 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:03:17.594966888 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:03:17.598171949 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:03:17.719238043 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:03:17.878757954 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:03:17.881557941 CET497077000192.168.2.681.161.238.249
                  Nov 23, 2024 21:03:18.018441916 CET70004970781.161.238.249192.168.2.6
                  Nov 23, 2024 21:03:28.619045973 CET497077000192.168.2.681.161.238.249

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:15:01:56
                  Start date:23/11/2024
                  Path:C:\Users\user\Desktop\Scvi1cE64H.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Users\user\Desktop\Scvi1cE64H.exe"
                  Imagebase:0x5e0000
                  File size:71'680 bytes
                  MD5 hash:07C09B14A7719A820968AD2222428B87
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.2106877000.00000000005E2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.2106877000.00000000005E2000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.3018554385.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:low
                  Has exited:true

                  Target ID:9
                  Start time:15:03:21
                  Start date:23/11/2024
                  Path:C:\Windows\System32\WerFault.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\WerFault.exe -u -p 5016 -s 1936
                  Imagebase:0x7ff793110000
                  File size:570'736 bytes
                  MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:16.1%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:6
                    Total number of Limit Nodes:0
                    execution_graph 8560 7ffd348b4a38 8561 7ffd348b4a41 SetWindowsHookExW 8560->8561 8563 7ffd348b4b11 8561->8563 8564 7ffd348b40e1 8565 7ffd348b40eb RtlSetProcessIsCritical 8564->8565 8567 7ffd348b41d2 8565->8567

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 7ffd348b398a-7ffd348b39a1 1 7ffd348b39a7-7ffd348b39ad 0->1 2 7ffd348b3376-7ffd348b3383 0->2 3 7ffd348b39af-7ffd348b39c6 1->3 4 7ffd348b3a01-7ffd348b3a41 1->4 5 7ffd348b2c87 2->5 6 7ffd348b3389-7ffd348b347f 2->6 7 7ffd348b39cc-7ffd348b39d3 3->7 8 7ffd348b2919-7ffd348b2926 3->8 11 7ffd348b2c8c-7ffd348b2cc0 5->11 64 7ffd348b3485-7ffd348b34e8 6->64 65 7ffd348b3afb-7ffd348b3b36 6->65 13 7ffd348b39dd-7ffd348b39e4 7->13 8->5 9 7ffd348b292c-7ffd348b296a 8->9 9->1 20 7ffd348b2970-7ffd348b298d call 7ffd348b1cb8 9->20 17 7ffd348b2cc7-7ffd348b2d09 11->17 18 7ffd348b39f5 13->18 19 7ffd348b39e6-7ffd348b39f0 call 7ffd348b0378 13->19 34 7ffd348b2d0b-7ffd348b2d2c 17->34 35 7ffd348b2d2e-7ffd348b2d62 17->35 18->4 19->18 20->1 28 7ffd348b2993-7ffd348b29cd 20->28 38 7ffd348b2a2c-7ffd348b2a54 28->38 39 7ffd348b29cf-7ffd348b2a22 28->39 42 7ffd348b2d69-7ffd348b2dab 34->42 35->42 47 7ffd348b3348-7ffd348b3370 38->47 48 7ffd348b2a5a-7ffd348b2a67 38->48 39->38 62 7ffd348b2dd0-7ffd348b2e04 42->62 63 7ffd348b2dad-7ffd348b2dce 42->63 47->1 47->2 48->5 51 7ffd348b2a6d-7ffd348b2b5f 48->51 101 7ffd348b331f-7ffd348b3325 51->101 115 7ffd348b2b65-7ffd348b2c62 call 7ffd348b0358 51->115 70 7ffd348b2e0b-7ffd348b2eaa 62->70 63->70 83 7ffd348b3b3b-7ffd348b3b76 64->83 84 7ffd348b34ee-7ffd348b3551 64->84 70->101 93 7ffd348b3b7b-7ffd348b3baf 83->93 84->93 105 7ffd348b3557-7ffd348b362a 84->105 97 7ffd348b3bb6 93->97 97->97 101->4 104 7ffd348b332b-7ffd348b3342 101->104 104->47 104->48 115->11 136 7ffd348b2c64-7ffd348b2c85 115->136 136->17
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3021829979.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd348b0000_Scvi1cE64H.jbxd
                    Similarity
                    • API ID:
                    • String ID: >$B$CAM_^
                    • API String ID: 0-705359111
                    • Opcode ID: a34ca490aa63e77422c3c01f45fd21ff90605106f60cd8cbcf4475ceb1a5b158
                    • Instruction ID: bdd1d91064ae9f67be3b2c1a69c7816c7fd93829f68a675f476f922cb6227c8f
                    • Opcode Fuzzy Hash: a34ca490aa63e77422c3c01f45fd21ff90605106f60cd8cbcf4475ceb1a5b158
                    • Instruction Fuzzy Hash: 4C915470B18A094FE758DB68C4B57A9B7E2FF99304F14417DD40DD32D2DE7868819B41

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 138 7ffd348b2819-7ffd348b28bc call 7ffd348b23d0 call 7ffd348b1c88 call 7ffd348b1c98 150 7ffd348b28f0-7ffd348b2913 138->150 151 7ffd348b28be-7ffd348b28eb call 7ffd348b1ca8 138->151 155 7ffd348b39cc-7ffd348b39d3 150->155 156 7ffd348b2919-7ffd348b2926 150->156 151->150 159 7ffd348b39dd-7ffd348b39e4 155->159 157 7ffd348b2c87 156->157 158 7ffd348b292c-7ffd348b296a 156->158 161 7ffd348b2c8c-7ffd348b2cc0 157->161 164 7ffd348b39a7-7ffd348b39ad 158->164 165 7ffd348b2970-7ffd348b298d call 7ffd348b1cb8 158->165 162 7ffd348b39f5 159->162 163 7ffd348b39e6-7ffd348b39f0 call 7ffd348b0378 159->163 170 7ffd348b2cc7-7ffd348b2d09 161->170 167 7ffd348b3a01-7ffd348b3a41 162->167 163->162 164->167 169 7ffd348b39af-7ffd348b39c6 164->169 165->164 174 7ffd348b2993-7ffd348b29cd 165->174 169->155 169->156 183 7ffd348b2d0b-7ffd348b2d2c 170->183 184 7ffd348b2d2e-7ffd348b2d62 170->184 181 7ffd348b2a2c-7ffd348b2a54 174->181 182 7ffd348b29cf-7ffd348b2a22 174->182 189 7ffd348b3348-7ffd348b3370 181->189 190 7ffd348b2a5a-7ffd348b2a67 181->190 182->181 188 7ffd348b2d69-7ffd348b2dab 183->188 184->188 207 7ffd348b2dd0-7ffd348b2e04 188->207 208 7ffd348b2dad-7ffd348b2dce 188->208 189->164 196 7ffd348b3376-7ffd348b3383 189->196 190->157 193 7ffd348b2a6d-7ffd348b2b5f 190->193 239 7ffd348b331f-7ffd348b3325 193->239 252 7ffd348b2b65-7ffd348b2c62 call 7ffd348b0358 193->252 196->157 199 7ffd348b3389-7ffd348b347f 196->199 240 7ffd348b3485-7ffd348b34e8 199->240 241 7ffd348b3afb-7ffd348b3b36 199->241 212 7ffd348b2e0b-7ffd348b2eaa 207->212 208->212 212->239 239->167 242 7ffd348b332b-7ffd348b3342 239->242 254 7ffd348b3b3b-7ffd348b3b76 240->254 255 7ffd348b34ee-7ffd348b3551 240->255 242->189 242->190 252->161 287 7ffd348b2c64-7ffd348b2c85 252->287 263 7ffd348b3b7b-7ffd348b3baf 254->263 255->263 271 7ffd348b3557-7ffd348b362a 255->271 267 7ffd348b3bb6 263->267 267->267 287->170
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3021829979.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd348b0000_Scvi1cE64H.jbxd
                    Similarity
                    • API ID:
                    • String ID: B$CAM_^
                    • API String ID: 0-2030590545
                    • Opcode ID: b0b883a5d46ddf97c3768950734f86ff072ba1f08ad1c8c8963bef71759fd5b1
                    • Instruction ID: 67641243f5658737414e5b2131a3174accc349a5fd8598cba7dc920ce41d2de7
                    • Opcode Fuzzy Hash: b0b883a5d46ddf97c3768950734f86ff072ba1f08ad1c8c8963bef71759fd5b1
                    • Instruction Fuzzy Hash: 9762A070B18A098FEB94EF68C4A57A9B7E2FF99304F14457DD44DD3292DF38A8818B41

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 292 7ffd348b0ffa-7ffd348b1026 296 7ffd348b1028 292->296 297 7ffd348b102d-7ffd348b102e 292->297 296->297 298 7ffd348b1030 297->298 299 7ffd348b1034-7ffd348b1036 297->299 298->299 300 7ffd348b1038 299->300 301 7ffd348b103b-7ffd348b103e 299->301 300->301 302 7ffd348b1040 301->302 303 7ffd348b1042-7ffd348b1046 301->303 302->303 304 7ffd348b1048 303->304 305 7ffd348b1049 303->305 304->305 306 7ffd348b104b-7ffd348b105a 305->306 307 7ffd348b107f-7ffd348b1081 305->307 311 7ffd348b105c 306->311 312 7ffd348b0fe0-7ffd348b0ff1 306->312 308 7ffd348b1092-7ffd348b1096 307->308 311->308 313 7ffd348b105e-7ffd348b107e 311->313 313->307
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3021829979.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd348b0000_Scvi1cE64H.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4M_^$CAM_^
                    • API String ID: 0-707661190
                    • Opcode ID: b4a2b8523e1e42777f1af802a7cb9e1062045e1734c3bb55baba64bd1e54f688
                    • Instruction ID: 1ed3b0ad144babbed5cb3e6db2a95553646a5a6ee3fe0e0894b7c6ac16962619
                    • Opcode Fuzzy Hash: b4a2b8523e1e42777f1af802a7cb9e1062045e1734c3bb55baba64bd1e54f688
                    • Instruction Fuzzy Hash: 2F12E121B1CA460FE7A4B7BC94B52B977D2EF8A350B444179E44EDB2D3DE7C78418281

                    Control-flow Graph

                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3021829979.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd348b0000_Scvi1cE64H.jbxd
                    Similarity
                    • API ID:
                    • String ID: 3M_^$CAM_^
                    • API String ID: 0-1465715678
                    • Opcode ID: 5beed0d7b1f6ac5807b3ae6c433f8e6e29875dfa6b7f57cd77d6e2d92a517f2b
                    • Instruction ID: 19b475498864de4307a4386a196dbee9ad231b056051e20d13c63b36d4a24994
                    • Opcode Fuzzy Hash: 5beed0d7b1f6ac5807b3ae6c433f8e6e29875dfa6b7f57cd77d6e2d92a517f2b
                    • Instruction Fuzzy Hash: 7202D261B18A0A4FE794EB6C84B92B977D2FF8A340F444579E44ED72D3DE7CA8019381

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 435 7ffd348baae6-7ffd348baaf3 436 7ffd348baaf5-7ffd348baafd 435->436 437 7ffd348baafe-7ffd348babc7 435->437 436->437 441 7ffd348babc9-7ffd348babd2 437->441 442 7ffd348bac33 437->442 441->442 443 7ffd348babd4-7ffd348babe0 441->443 444 7ffd348bac35-7ffd348bac5a 442->444 445 7ffd348bac19-7ffd348bac31 443->445 446 7ffd348babe2-7ffd348babf4 443->446 451 7ffd348bacc6 444->451 452 7ffd348bac5c-7ffd348bac65 444->452 445->444 447 7ffd348babf8-7ffd348bac0b 446->447 448 7ffd348babf6 446->448 447->447 450 7ffd348bac0d-7ffd348bac15 447->450 448->447 450->445 454 7ffd348bacc8-7ffd348bad70 451->454 452->451 453 7ffd348bac67-7ffd348bac73 452->453 455 7ffd348bac75-7ffd348bac87 453->455 456 7ffd348bacac-7ffd348bacc4 453->456 465 7ffd348badde 454->465 466 7ffd348bad72-7ffd348bad7c 454->466 457 7ffd348bac8b-7ffd348bac9e 455->457 458 7ffd348bac89 455->458 456->454 457->457 460 7ffd348baca0-7ffd348baca8 457->460 458->457 460->456 468 7ffd348bade0-7ffd348bae09 465->468 466->465 467 7ffd348bad7e-7ffd348bad8b 466->467 469 7ffd348bad8d-7ffd348bad9f 467->469 470 7ffd348badc4-7ffd348baddc 467->470 475 7ffd348bae0b-7ffd348bae16 468->475 476 7ffd348bae73 468->476 471 7ffd348bada3-7ffd348badb6 469->471 472 7ffd348bada1 469->472 470->468 471->471 474 7ffd348badb8-7ffd348badc0 471->474 472->471 474->470 475->476 478 7ffd348bae18-7ffd348bae26 475->478 477 7ffd348bae75-7ffd348baf06 476->477 486 7ffd348baf0c-7ffd348baf1b 477->486 479 7ffd348bae28-7ffd348bae3a 478->479 480 7ffd348bae5f-7ffd348bae71 478->480 482 7ffd348bae3c 479->482 483 7ffd348bae3e-7ffd348bae51 479->483 480->477 482->483 483->483 484 7ffd348bae53-7ffd348bae5b 483->484 484->480 487 7ffd348baf1d 486->487 488 7ffd348baf23-7ffd348baf88 call 7ffd348bafa4 486->488 487->488 495 7ffd348baf8a 488->495 496 7ffd348baf8f-7ffd348bafa3 488->496 495->496
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3021829979.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd348b0000_Scvi1cE64H.jbxd
                    Similarity
                    • API ID:
                    • String ID: #[lO$#[lO
                    • API String ID: 0-774237087
                    • Opcode ID: d7c763848fb3091c1a071b4ecc9dca8421726ff1f91bc17fa7928bfe445b2849
                    • Instruction ID: 402dfef21b8028db0af9d63293aabe78373feb4e9ba51ca00305180085c358b8
                    • Opcode Fuzzy Hash: d7c763848fb3091c1a071b4ecc9dca8421726ff1f91bc17fa7928bfe445b2849
                    • Instruction Fuzzy Hash: BBF1A930A08A4D4FEBA9DF28C8657E97BD1FF55310F04426EE84DC7291DF78A9458B81

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 497 7ffd348bb892-7ffd348bb89f 498 7ffd348bb8aa-7ffd348bb977 497->498 499 7ffd348bb8a1-7ffd348bb8a9 497->499 502 7ffd348bb979-7ffd348bb982 498->502 503 7ffd348bb9e3 498->503 499->498 502->503 504 7ffd348bb984-7ffd348bb990 502->504 505 7ffd348bb9e5-7ffd348bba0a 503->505 506 7ffd348bb9c9-7ffd348bb9e1 504->506 507 7ffd348bb992-7ffd348bb9a4 504->507 512 7ffd348bba76 505->512 513 7ffd348bba0c-7ffd348bba15 505->513 506->505 508 7ffd348bb9a8-7ffd348bb9bb 507->508 509 7ffd348bb9a6 507->509 508->508 511 7ffd348bb9bd-7ffd348bb9c5 508->511 509->508 511->506 514 7ffd348bba78-7ffd348bba9d 512->514 513->512 515 7ffd348bba17-7ffd348bba23 513->515 522 7ffd348bbb0b 514->522 523 7ffd348bba9f-7ffd348bbaa9 514->523 516 7ffd348bba25-7ffd348bba37 515->516 517 7ffd348bba5c-7ffd348bba74 515->517 519 7ffd348bba3b-7ffd348bba4e 516->519 520 7ffd348bba39 516->520 517->514 519->519 521 7ffd348bba50-7ffd348bba58 519->521 520->519 521->517 525 7ffd348bbb0d-7ffd348bbb3b 522->525 523->522 524 7ffd348bbaab-7ffd348bbab8 523->524 526 7ffd348bbaba-7ffd348bbacc 524->526 527 7ffd348bbaf1-7ffd348bbb09 524->527 531 7ffd348bbbab 525->531 532 7ffd348bbb3d-7ffd348bbb48 525->532 529 7ffd348bbad0-7ffd348bbae3 526->529 530 7ffd348bbace 526->530 527->525 529->529 533 7ffd348bbae5-7ffd348bbaed 529->533 530->529 535 7ffd348bbbad-7ffd348bbc85 531->535 532->531 534 7ffd348bbb4a-7ffd348bbb58 532->534 533->527 536 7ffd348bbb5a-7ffd348bbb6c 534->536 537 7ffd348bbb91-7ffd348bbba9 534->537 545 7ffd348bbc8b-7ffd348bbc9a 535->545 538 7ffd348bbb70-7ffd348bbb83 536->538 539 7ffd348bbb6e 536->539 537->535 538->538 541 7ffd348bbb85-7ffd348bbb8d 538->541 539->538 541->537 546 7ffd348bbc9c 545->546 547 7ffd348bbca2-7ffd348bbd04 call 7ffd348bbd20 545->547 546->547 554 7ffd348bbd06 547->554 555 7ffd348bbd0b-7ffd348bbd1f 547->555 554->555
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3021829979.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd348b0000_Scvi1cE64H.jbxd
                    Similarity
                    • API ID:
                    • String ID: #[lO$#[lO
                    • API String ID: 0-774237087
                    • Opcode ID: 1c505f9d3ace189089230383e4d5aa86c8b6116d4a28e8814b85faf07bd1d4e3
                    • Instruction ID: 57abf2784959fb8f0f986282db1f1326f360dc9be3cd7a971f052f976c2ac88c
                    • Opcode Fuzzy Hash: 1c505f9d3ace189089230383e4d5aa86c8b6116d4a28e8814b85faf07bd1d4e3
                    • Instruction Fuzzy Hash: F6E1C430A08A8D8FEBA8DF28C8A57E977D1FF55310F04426ED84DC7695DE78A9448BC1

                    Control-flow Graph

                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3021829979.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd348b0000_Scvi1cE64H.jbxd
                    Similarity
                    • API ID:
                    • String ID: CAM_^
                    • API String ID: 0-3136481660
                    • Opcode ID: 155f0d125be47f01b6af1edda383951df3ea2f36d6b93d8ae360fba19a0bdbf1
                    • Instruction ID: 13ed14a3872ddde152d62d96612fab8df0404826da9271dd34ca4d32990b65e9
                    • Opcode Fuzzy Hash: 155f0d125be47f01b6af1edda383951df3ea2f36d6b93d8ae360fba19a0bdbf1
                    • Instruction Fuzzy Hash: 2A02D261B18A0A0FE794E7BC84B92B977D2EF8A350F444579E44ED72D3DE7CA8019381

                    Control-flow Graph

                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3021829979.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd348b0000_Scvi1cE64H.jbxd
                    Similarity
                    • API ID:
                    • String ID: CAM_^
                    • API String ID: 0-3136481660
                    • Opcode ID: 77e0d87b0f52ea5e55e94f79a8189260dce08011402be2b3b6e241a97fad3190
                    • Instruction ID: 62fefcf4339206fb77a586d3c277695cbdb9b50b884579793bc08da088a3e87f
                    • Opcode Fuzzy Hash: 77e0d87b0f52ea5e55e94f79a8189260dce08011402be2b3b6e241a97fad3190
                    • Instruction Fuzzy Hash: 89E1C561B1CA4A0FEB94EB6884B927976D2FF8A340F44457DE44ED72D2DE7CAC019381
                    Memory Dump Source
                    • Source File: 00000000.00000002.3021829979.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd348b0000_Scvi1cE64H.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 81f6d899c7f02dfb7ad3cd60214258a08257b3659e8603f089fdf9d1022a3f87
                    • Instruction ID: 2ac850e70aab254430f6851c2b3f1c353f0ef37ef5cf9182468fd95cc6de2494
                    • Opcode Fuzzy Hash: 81f6d899c7f02dfb7ad3cd60214258a08257b3659e8603f089fdf9d1022a3f87
                    • Instruction Fuzzy Hash: 20F1C161B18A094FE794EBB884B92B97BD2FF89350F44057DE44ED72D2DE38A8018781
                    Memory Dump Source
                    • Source File: 00000000.00000002.3021829979.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd348b0000_Scvi1cE64H.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ea34c660e7a2da50e2be26709c57c8e17b4b9920948cd05debc19a91ef2f9162
                    • Instruction ID: b79c0644d62986fd9ad0f289f676962eb4ce6b1fb36c27d78f53178a0d2105d1
                    • Opcode Fuzzy Hash: ea34c660e7a2da50e2be26709c57c8e17b4b9920948cd05debc19a91ef2f9162
                    • Instruction Fuzzy Hash: DDD1E431F1C90A4FF799EB6898A52B9B7E1FF4A311F0405BAD40DC3192DE6CA84697C1
                    Memory Dump Source
                    • Source File: 00000000.00000002.3021829979.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd348b0000_Scvi1cE64H.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2e8232e9dee8b392166a224c4251ef09c98b4447ab70d7916ad789632494caf0
                    • Instruction ID: 2000e3dfbd565713c704a18b76fdacf807e479097229302b4c00b994f0216d27
                    • Opcode Fuzzy Hash: 2e8232e9dee8b392166a224c4251ef09c98b4447ab70d7916ad789632494caf0
                    • Instruction Fuzzy Hash: A6B12C12B0DA961EEB216BBC68B61FA3B90DF87331B08017BD64CD60E3DD5C640A52D3

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1117 7ffd348b40e1-7ffd348b41d0 RtlSetProcessIsCritical 1123 7ffd348b41d8-7ffd348b420d 1117->1123 1124 7ffd348b41d2 1117->1124 1124->1123
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.3021829979.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd348b0000_Scvi1cE64H.jbxd
                    Similarity
                    • API ID: CriticalProcess
                    • String ID:
                    • API String ID: 2695349919-0
                    • Opcode ID: 0e671ab067cd6af72a50fd34d606cff898905e323c355c08731f5c88cbf0a7c2
                    • Instruction ID: 45ec78b052ee7bc9d8daba759ec82477af70e753be244a4a298642917f32329b
                    • Opcode Fuzzy Hash: 0e671ab067cd6af72a50fd34d606cff898905e323c355c08731f5c88cbf0a7c2
                    • Instruction Fuzzy Hash: 1841133190C6988FDB29DBA888556E9BBF0EF56310F08416FD08AC3592CB2868468B91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1126 7ffd348b4a38-7ffd348b4a3f 1127 7ffd348b4a4a-7ffd348b4abd 1126->1127 1128 7ffd348b4a41-7ffd348b4a49 1126->1128 1131 7ffd348b4b49-7ffd348b4b4d 1127->1131 1132 7ffd348b4ac3-7ffd348b4ad0 1127->1132 1128->1127 1133 7ffd348b4ad2-7ffd348b4b0f SetWindowsHookExW 1131->1133 1132->1133 1135 7ffd348b4b17-7ffd348b4b48 1133->1135 1136 7ffd348b4b11 1133->1136 1136->1135
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.3021829979.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd348b0000_Scvi1cE64H.jbxd
                    Similarity
                    • API ID: HookWindows
                    • String ID:
                    • API String ID: 2559412058-0
                    • Opcode ID: 68be66e61b1e0f11dcff833f215826248f1535eb646cc994dd7d2de471af9bf3
                    • Instruction ID: a9e26fa6c9404e9ec6ebb5b9aaf2707c64f1c611695908f9e4d1ae2671846153
                    • Opcode Fuzzy Hash: 68be66e61b1e0f11dcff833f215826248f1535eb646cc994dd7d2de471af9bf3
                    • Instruction Fuzzy Hash: 62410830A1CA4D8FDB18DFACD8566F9BBE5EB59321F00427ED049D3292CE74A81287C1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3021829979.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd348b0000_Scvi1cE64H.jbxd
                    Similarity
                    • API ID:
                    • String ID: $8`z4
                    • API String ID: 0-184767478
                    • Opcode ID: 6fcdd090213989a48b98be7dbcc3d611e6784a114ffc2ff3b1334f4128bce974
                    • Instruction ID: ffbd0ad76cfccc0f78bb80fe3a0732f753b460b8f8088c4e1307db7b36a95c4f
                    • Opcode Fuzzy Hash: 6fcdd090213989a48b98be7dbcc3d611e6784a114ffc2ff3b1334f4128bce974
                    • Instruction Fuzzy Hash: 0D724D30F1891A4FEBA8EB7884E567D73D6EF9A300B544578D50ED32C2DE6CE8529780
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3021829979.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd348b0000_Scvi1cE64H.jbxd
                    Similarity
                    • API ID:
                    • String ID: %$/
                    • API String ID: 0-2617147878
                    • Opcode ID: d7ebd3a49d2e72f03bc7884204a0eaac9fecaf83a45d04fdded572d3b421de29
                    • Instruction ID: 4fc780a2ed788623999069450b93f284e3e589bc56d319557a99768da5eb0e66
                    • Opcode Fuzzy Hash: d7ebd3a49d2e72f03bc7884204a0eaac9fecaf83a45d04fdded572d3b421de29
                    • Instruction Fuzzy Hash: 6EC18470B18A094FEB58EF68C8A9769BBE2FF98304F14457DD44DD3291DF78A8818B41
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3021829979.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd348b0000_Scvi1cE64H.jbxd
                    Similarity
                    • API ID:
                    • String ID: 5M_^$CAM_^
                    • API String ID: 0-4156085251
                    • Opcode ID: c51c8fc3d2e948562449d012a091e6ebca8484e342648345be309575a8198407
                    • Instruction ID: 8b3ea860cbbf9fed41e3a5b333609b93ae04b8680db3bb14a6259c1ff1d458d3
                    • Opcode Fuzzy Hash: c51c8fc3d2e948562449d012a091e6ebca8484e342648345be309575a8198407
                    • Instruction Fuzzy Hash: 8141D613F0D1A66AD22177FC75751EE7B689F42378B0C52B7D18C9B093ACAC348682D5
                    Memory Dump Source
                    • Source File: 00000000.00000002.3021829979.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd348b0000_Scvi1cE64H.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 51d7eda2f88e897c1a16e16736ca80b0bc9a09a49aab79868a4ab157b49f749c
                    • Instruction ID: 8826b1df2b45bc317c8e88a492932ac6ba0146a77b540c98f8f69ea9dd8a775c
                    • Opcode Fuzzy Hash: 51d7eda2f88e897c1a16e16736ca80b0bc9a09a49aab79868a4ab157b49f749c
                    • Instruction Fuzzy Hash: 3071EA2064F7C54FE743937898A9AE57F91AF83325F0D41FAE188CE4A3DAD95806C742