Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Uhy4TvdjRw.exe

Overview

General Information

Sample Name:Uhy4TvdjRw.exe
Analysis ID:679246
MD5:10135b39a4a6d8717ba8ceec380ef060
SHA1:3669c101670b0b373dea1c7729718340196da4bc
SHA256:45e87ee0b025a7e4a783a6786564982e7735c8c50d0b3d84a3d5dd90ce735cfe
Tags:AsyncRATexeRAT
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: Schedule system process
Antivirus / Scanner detection for submitted sample
System process connects to network (likely due to code injection or exploit)
Yara detected AsyncRAT
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Yara detected Generic Downloader
Machine Learning detection for dropped file
Uses schtasks.exe or at.exe to add and modify task schedules
Drops PE files with benign system names
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • Uhy4TvdjRw.exe (PID: 2508 cmdline: "C:\Users\user\Desktop\Uhy4TvdjRw.exe" MD5: 10135B39A4A6D8717BA8CEEC380EF060)
    • cmd.exe (PID: 5232 cmdline: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 2936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • MpCmdRun.exe (PID: 3572 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: A267555174BFA53844371226F482B86B)
          • conhost.exe (PID: 4412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 4756 cmdline: schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' MD5: 15FF7D8324231381BAD48A052F85DF04)
    • cmd.exe (PID: 5992 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp93E6.tmp.bat"" MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • timeout.exe (PID: 5132 cmdline: timeout 3 MD5: 121A4EDAE60A7AF6F5DFA82F7BB95659)
      • svchost.exe (PID: 4152 cmdline: "C:\Users\user\AppData\Roaming\svchost.exe" MD5: 10135B39A4A6D8717BA8CEEC380EF060)
  • svchost.exe (PID: 5208 cmdline: C:\Users\user\AppData\Roaming\svchost.exe MD5: 10135B39A4A6D8717BA8CEEC380EF060)
  • cleanup
{"Server": "127.0.0.1,61.14.233.88", "Ports": "6606,7707,8808", "Version": "0.5.7B", "Autorun": "true", "Install_Folder": "%AppData%"}
SourceRuleDescriptionAuthorStrings
Uhy4TvdjRw.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    Uhy4TvdjRw.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Uhy4TvdjRw.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xa355:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      SourceRuleDescriptionAuthorStrings
      dump.pcapMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x104bfb:$x1: AsyncRAT
      • 0x104c39:$x1: AsyncRAT
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\svchost.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        C:\Users\user\AppData\Roaming\svchost.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          C:\Users\user\AppData\Roaming\svchost.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
          • 0xa355:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
          SourceRuleDescriptionAuthorStrings
          0000000B.00000002.534018978.0000000005100000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x623f:$x1: AsyncRAT
          • 0x627d:$x1: AsyncRAT
          0000000B.00000003.304436416.00000000051E6000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x9363:$x1: AsyncRAT
          • 0x93a1:$x1: AsyncRAT
          00000000.00000002.280682459.0000000004F88000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x741b:$x1: AsyncRAT
          • 0x7459:$x1: AsyncRAT
          00000000.00000003.269514411.0000000004F88000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x741b:$x1: AsyncRAT
          • 0x7459:$x1: AsyncRAT
          00000000.00000002.278048476.0000000002B00000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            Click to see the 19 entries
            SourceRuleDescriptionAuthorStrings
            0.0.Uhy4TvdjRw.exe.6d0000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
              0.0.Uhy4TvdjRw.exe.6d0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                0.0.Uhy4TvdjRw.exe.6d0000.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
                • 0xa355:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
                0.2.Uhy4TvdjRw.exe.2b00314.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                  0.2.Uhy4TvdjRw.exe.2b00314.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
                  • 0x8555:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
                  Click to see the 3 entries

                  Persistence and Installation Behavior

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\Uhy4TvdjRw.exe" , ParentImage: C:\Users\user\Desktop\Uhy4TvdjRw.exe, ParentProcessId: 2508, ParentProcessName: Uhy4TvdjRw.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, ProcessId: 5232, ProcessName: cmd.exe
                  Timestamp:61.14.233.88192.168.2.37707497392035595 08/05/22-13:07:46.244143
                  SID:2035595
                  Source Port:7707
                  Destination Port:49739
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:61.14.233.88192.168.2.37707497392030673 08/05/22-13:07:46.244143
                  SID:2030673
                  Source Port:7707
                  Destination Port:49739
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Uhy4TvdjRw.exeVirustotal: Detection: 67%Perma Link
                  Source: Uhy4TvdjRw.exeMetadefender: Detection: 57%Perma Link
                  Source: Uhy4TvdjRw.exeReversingLabs: Detection: 96%
                  Source: Uhy4TvdjRw.exeAvira: detected
                  Source: C:\Users\user\AppData\Roaming\svchost.exeAvira: detection malicious, Label: HEUR/AGEN.1202836
                  Source: C:\Users\user\AppData\Roaming\svchost.exeVirustotal: Detection: 67%Perma Link
                  Source: C:\Users\user\AppData\Roaming\svchost.exeMetadefender: Detection: 57%Perma Link
                  Source: C:\Users\user\AppData\Roaming\svchost.exeReversingLabs: Detection: 96%
                  Source: Uhy4TvdjRw.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\svchost.exeJoe Sandbox ML: detected
                  Source: 00000000.00000002.278048476.0000000002B00000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "127.0.0.1,61.14.233.88", "Ports": "6606,7707,8808", "Version": "0.5.7B", "Autorun": "true", "Install_Folder": "%AppData%"}
                  Source: Uhy4TvdjRw.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: Uhy4TvdjRw.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Networking

                  barindex
                  Source: C:\Users\user\AppData\Roaming\svchost.exeNetwork Connect: 61.14.233.88 7707Jump to behavior
                  Source: TrafficSnort IDS: 2035595 ET TROJAN Generic AsyncRAT Style SSL Cert 61.14.233.88:7707 -> 192.168.2.3:49739
                  Source: TrafficSnort IDS: 2030673 ET TROJAN Observed Malicious SSL Cert (AsyncRAT Server) 61.14.233.88:7707 -> 192.168.2.3:49739
                  Source: Yara matchFile source: Uhy4TvdjRw.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Uhy4TvdjRw.exe.6d0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Uhy4TvdjRw.exe.2b00314.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPED
                  Source: Joe Sandbox ViewASN Name: VNPT-AS-VNVNPTCorpVN VNPT-AS-VNVNPTCorpVN
                  Source: global trafficTCP traffic: 192.168.2.3:49739 -> 61.14.233.88:7707
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 61.14.233.88
                  Source: svchost.exe, 0000000B.00000002.534018978.0000000005100000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                  Source: svchost.exe, 0000000B.00000002.534132653.0000000005115000.00000004.00000800.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.11.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                  Source: Uhy4TvdjRw.exe, 00000000.00000002.278002213.0000000002AC7000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.528272233.00000000029A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: Yara matchFile source: Uhy4TvdjRw.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Uhy4TvdjRw.exe.6d0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Uhy4TvdjRw.exe.2b00314.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Uhy4TvdjRw.exe.2b00314.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.278048476.0000000002B00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.257007882.00000000006D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.528272233.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Uhy4TvdjRw.exe PID: 2508, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4152, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPED

                  System Summary

                  barindex
                  Source: Uhy4TvdjRw.exe, type: SAMPLEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: dump.pcap, type: PCAPMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 0.0.Uhy4TvdjRw.exe.6d0000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: 0.2.Uhy4TvdjRw.exe.2b00314.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: 0.2.Uhy4TvdjRw.exe.2b00314.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: 0000000B.00000002.534018978.0000000005100000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 0000000B.00000003.304436416.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 00000000.00000002.280682459.0000000004F88000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 00000000.00000003.269514411.0000000004F88000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 00000000.00000002.278048476.0000000002B00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: 00000000.00000000.257007882.00000000006D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: 0000000B.00000002.526007263.0000000000A3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 00000000.00000002.277813823.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: 00000000.00000002.277813823.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 0000000B.00000003.304383142.00000000051DA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 0000000A.00000002.304518771.0000000001439000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 0000000B.00000002.528272233.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: 0000000B.00000002.528272233.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 0000000A.00000002.305975314.0000000003341000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: Process Memory Space: Uhy4TvdjRw.exe PID: 2508, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: Process Memory Space: Uhy4TvdjRw.exe PID: 2508, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: Process Memory Space: svchost.exe PID: 5208, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: Process Memory Space: svchost.exe PID: 4152, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: Process Memory Space: svchost.exe PID: 4152, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPEDMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: Uhy4TvdjRw.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: Uhy4TvdjRw.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: dump.pcap, type: PCAPMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 0.0.Uhy4TvdjRw.exe.6d0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: 0.2.Uhy4TvdjRw.exe.2b00314.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: 0.2.Uhy4TvdjRw.exe.2b00314.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: 0000000B.00000002.534018978.0000000005100000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 0000000B.00000003.304436416.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 00000000.00000002.280682459.0000000004F88000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 00000000.00000003.269514411.0000000004F88000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 00000000.00000002.278048476.0000000002B00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: 00000000.00000000.257007882.00000000006D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: 0000000B.00000002.526007263.0000000000A3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 00000000.00000002.277813823.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: 00000000.00000002.277813823.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 0000000B.00000003.304383142.00000000051DA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 0000000A.00000002.304518771.0000000001439000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 0000000B.00000002.528272233.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: 0000000B.00000002.528272233.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 0000000A.00000002.305975314.0000000003341000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: Process Memory Space: Uhy4TvdjRw.exe PID: 2508, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: Process Memory Space: Uhy4TvdjRw.exe PID: 2508, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: Process Memory Space: svchost.exe PID: 5208, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: Process Memory Space: svchost.exe PID: 4152, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: Process Memory Space: svchost.exe PID: 4152, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_04EC91C811_2_04EC91C8
                  Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_04EC9EA011_2_04EC9EA0
                  Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_04ECDB4011_2_04ECDB40
                  Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_04ECF7F811_2_04ECF7F8
                  Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_04EC8E8011_2_04EC8E80
                  Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_057D32D811_2_057D32D8
                  Source: Uhy4TvdjRw.exe, 00000000.00000000.257007882.00000000006D2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamej% vs Uhy4TvdjRw.exe
                  Source: Uhy4TvdjRw.exe, 00000000.00000002.278048476.0000000002B00000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamej% vs Uhy4TvdjRw.exe
                  Source: Uhy4TvdjRw.exeBinary or memory string: OriginalFilenamej% vs Uhy4TvdjRw.exe
                  Source: Uhy4TvdjRw.exeVirustotal: Detection: 67%
                  Source: Uhy4TvdjRw.exeMetadefender: Detection: 57%
                  Source: Uhy4TvdjRw.exeReversingLabs: Detection: 96%
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeFile read: C:\Users\user\Desktop\Uhy4TvdjRw.exeJump to behavior
                  Source: Uhy4TvdjRw.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\Uhy4TvdjRw.exe "C:\Users\user\Desktop\Uhy4TvdjRw.exe"
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp93E6.tmp.bat""
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"'
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchost.exe C:\Users\user\AppData\Roaming\svchost.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe"
                  Source: C:\Windows\System32\conhost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exitJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp93E6.tmp.bat""Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3 Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe" Jump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeFile created: C:\Users\user\AppData\Roaming\svchost.exeJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeFile created: C:\Users\user\AppData\Local\Temp\tmp93E6.tmpJump to behavior
                  Source: classification engineClassification label: mal100.troj.evad.winEXE@17/8@0/1
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: 0.0.Uhy4TvdjRw.exe.6d0000.0.unpack, FseaaQyFkS/YIdIJZaYgPiwszp.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: 0.0.Uhy4TvdjRw.exe.6d0000.0.unpack, FseaaQyFkS/YIdIJZaYgPiwszp.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: Uhy4TvdjRw.exe, FseaaQyFkS/YIdIJZaYgPiwszp.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: Uhy4TvdjRw.exe, FseaaQyFkS/YIdIJZaYgPiwszp.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: svchost.exe.0.dr, FseaaQyFkS/YIdIJZaYgPiwszp.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: svchost.exe.0.dr, FseaaQyFkS/YIdIJZaYgPiwszp.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: Uhy4TvdjRw.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: Uhy4TvdjRw.exe, cIBYexWXymf/VsHHNmuqOlgyY.csBase64 encoded string: 'rINKTV8RNDhUVTQ2UlmQxNLvun3m/IVV/oeeLlbJFNbMX3WsIpxtQwHfvqHSrqxB0pirqarn/CtEf7oWrPV+JA==', 'tKCcjiQJt2Hd++hlhtx+0yi/lZ1GNT0yK9NILXOeTmJ/r1zbNRgFr91mQbTrUbi8UZha2aMp3cP4sWtVOYvDXA==', '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', 'THP6gdgqES/ztFSmZNfuuRdaK9OeIa2tFJoxVdMD59uwoLhbiaBcM6BllBjS9lEiw2zMutxeOy1NImtebl7/Wl5tA2U6JjDKHsYN4gUI4qcmB3VJTHZp3A2uoQiwNflyIGzXiNpYW4U3QUsQfHtkP63bDG9GW40EB52CyAZVt8xd9nT4Svjjc9gfIlshrjJPkAYHTjg11RUi0bK8KzN37J7iZzKQNxM3luM3el0PnT6gq4nuHb7elUCFN3s/38aTeL/YEyx7b1PZlxIpKmxZiceXlCBeK16BeLe78NuqFjDqwMF8mlmJ1Ni4DpbcON/LL5CwCsmjxYxlQPYWWl8vC0BdjFfQ6/5xY6RC/UZdBhm/7RrovfU9y23+TQAzIaUafoRiZRMLQv25D6+dV7skJcEKVisSlMsHwCLN0iCzaw++ftJvPwwItCDneHWjx3iR5NeQdYHVXg/aFBe
                  Source: svchost.exe.0.dr, cIBYexWXymf/VsHHNmuqOlgyY.csBase64 encoded string: 'rINKTV8RNDhUVTQ2UlmQxNLvun3m/IVV/oeeLlbJFNbMX3WsIpxtQwHfvqHSrqxB0pirqarn/CtEf7oWrPV+JA==', 'tKCcjiQJt2Hd++hlhtx+0yi/lZ1GNT0yK9NILXOeTmJ/r1zbNRgFr91mQbTrUbi8UZha2aMp3cP4sWtVOYvDXA==', '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', 'THP6gdgqES/ztFSmZNfuuRdaK9OeIa2tFJoxVdMD59uwoLhbiaBcM6BllBjS9lEiw2zMutxeOy1NImtebl7/Wl5tA2U6JjDKHsYN4gUI4qcmB3VJTHZp3A2uoQiwNflyIGzXiNpYW4U3QUsQfHtkP63bDG9GW40EB52CyAZVt8xd9nT4Svjjc9gfIlshrjJPkAYHTjg11RUi0bK8KzN37J7iZzKQNxM3luM3el0PnT6gq4nuHb7elUCFN3s/38aTeL/YEyx7b1PZlxIpKmxZiceXlCBeK16BeLe78NuqFjDqwMF8mlmJ1Ni4DpbcON/LL5CwCsmjxYxlQPYWWl8vC0BdjFfQ6/5xY6RC/UZdBhm/7RrovfU9y23+TQAzIaUafoRiZRMLQv25D6+dV7skJcEKVisSlMsHwCLN0iCzaw++ftJvPwwItCDneHWjx3iR5NeQdYHVXg/aFBe
                  Source: 0.0.Uhy4TvdjRw.exe.6d0000.0.unpack, cIBYexWXymf/VsHHNmuqOlgyY.csBase64 encoded string: 'rINKTV8RNDhUVTQ2UlmQxNLvun3m/IVV/oeeLlbJFNbMX3WsIpxtQwHfvqHSrqxB0pirqarn/CtEf7oWrPV+JA==', 'tKCcjiQJt2Hd++hlhtx+0yi/lZ1GNT0yK9NILXOeTmJ/r1zbNRgFr91mQbTrUbi8UZha2aMp3cP4sWtVOYvDXA==', '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', 'THP6gdgqES/ztFSmZNfuuRdaK9OeIa2tFJoxVdMD59uwoLhbiaBcM6BllBjS9lEiw2zMutxeOy1NImtebl7/Wl5tA2U6JjDKHsYN4gUI4qcmB3VJTHZp3A2uoQiwNflyIGzXiNpYW4U3QUsQfHtkP63bDG9GW40EB52CyAZVt8xd9nT4Svjjc9gfIlshrjJPkAYHTjg11RUi0bK8KzN37J7iZzKQNxM3luM3el0PnT6gq4nuHb7elUCFN3s/38aTeL/YEyx7b1PZlxIpKmxZiceXlCBeK16BeLe78NuqFjDqwMF8mlmJ1Ni4DpbcON/LL5CwCsmjxYxlQPYWWl8vC0BdjFfQ6/5xY6RC/UZdBhm/7RrovfU9y23+TQAzIaUafoRiZRMLQv25D6+dV7skJcEKVisSlMsHwCLN0iCzaw++ftJvPwwItCDneHWjx3iR5NeQdYHVXg/aFBe
                  Source: C:\Users\user\AppData\Roaming\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_6SI8OkPnk
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2936:120:WilError_01
                  Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:4412:120:WilError_01
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6052:120:WilError_01
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp93E6.tmp.bat""
                  Source: C:\Users\user\AppData\Roaming\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: Uhy4TvdjRw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: Uhy4TvdjRw.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Data Obfuscation

                  barindex
                  Source: Uhy4TvdjRw.exe, IbbhSxkMmBWFzaYru/gxvoCtTjVDav.cs.Net Code: FRvoUOlAqvBX System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: svchost.exe.0.dr, IbbhSxkMmBWFzaYru/gxvoCtTjVDav.cs.Net Code: FRvoUOlAqvBX System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 0.0.Uhy4TvdjRw.exe.6d0000.0.unpack, IbbhSxkMmBWFzaYru/gxvoCtTjVDav.cs.Net Code: FRvoUOlAqvBX System.Reflection.Assembly System.AppDomain::Load(System.Byte[])

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeFile created: C:\Users\user\AppData\Roaming\svchost.exeJump to dropped file
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeFile created: C:\Users\user\AppData\Roaming\svchost.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: Yara matchFile source: Uhy4TvdjRw.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Uhy4TvdjRw.exe.6d0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Uhy4TvdjRw.exe.2b00314.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Uhy4TvdjRw.exe.2b00314.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.278048476.0000000002B00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.257007882.00000000006D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.528272233.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Uhy4TvdjRw.exe PID: 2508, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4152, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPED
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"'
                  Source: C:\Users\user\AppData\Roaming\svchost.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Uhy4TvdjRw.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Uhy4TvdjRw.exe.6d0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Uhy4TvdjRw.exe.2b00314.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Uhy4TvdjRw.exe.2b00314.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.278048476.0000000002B00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.257007882.00000000006D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.528272233.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Uhy4TvdjRw.exe PID: 2508, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4152, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPED
                  Source: Uhy4TvdjRw.exe, svchost.exe.0.drBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exe TID: 1112Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exe TID: 5216Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exe TID: 4780Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exe TID: 6064Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exe TID: 6064Thread sleep count: 95 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exe TID: 2244Thread sleep count: 9799 > 30Jump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeWindow / User API: threadDelayed 9799Jump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: svchost.exe.0.drBinary or memory string: vmware
                  Source: svchost.exe, 0000000B.00000003.304436416.00000000051E6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\AppData\Roaming\svchost.exeNetwork Connect: 61.14.233.88 7707Jump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exitJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp93E6.tmp.bat""Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3 Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe" Jump to behavior
                  Source: svchost.exe, 0000000B.00000002.528588986.00000000029FA000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.306525634.0000000005801000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.528776831.0000000002A38000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeQueries volume information: C:\Users\user\Desktop\Uhy4TvdjRw.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Uhy4TvdjRw.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Lowering of HIPS / PFW / Operating System Security Settings

                  barindex
                  Source: Yara matchFile source: Uhy4TvdjRw.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Uhy4TvdjRw.exe.6d0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Uhy4TvdjRw.exe.2b00314.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Uhy4TvdjRw.exe.2b00314.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.278048476.0000000002B00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.257007882.00000000006D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.528272233.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Uhy4TvdjRw.exe PID: 2508, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4152, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPED
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
                  Source: C:\Users\user\AppData\Roaming\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: svchost.exe, 0000000B.00000002.534132653.0000000005115000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts1
                  Windows Management Instrumentation
                  2
                  Scheduled Task/Job
                  112
                  Process Injection
                  11
                  Masquerading
                  OS Credential Dumping1
                  Query Registry
                  Remote Services1
                  Archive Collected Data
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default Accounts2
                  Scheduled Task/Job
                  Boot or Logon Initialization Scripts2
                  Scheduled Task/Job
                  1
                  Disable or Modify Tools
                  LSASS Memory221
                  Security Software Discovery
                  Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                  Non-Standard Port
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain Accounts1
                  Scripting
                  Logon Script (Windows)Logon Script (Windows)21
                  Virtualization/Sandbox Evasion
                  Security Account Manager2
                  Process Discovery
                  SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
                  Process Injection
                  NTDS21
                  Virtualization/Sandbox Evasion
                  Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Scripting
                  LSA Secrets1
                  Application Window Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common11
                  Obfuscated Files or Information
                  Cached Domain Credentials1
                  Remote System Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                  Software Packing
                  DCSync1
                  File and Directory Discovery
                  Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem13
                  System Information Discovery
                  Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 679246 Sample: Uhy4TvdjRw.exe Startdate: 05/08/2022 Architecture: WINDOWS Score: 100 44 Snort IDS alert for network traffic 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 Antivirus / Scanner detection for submitted sample 2->48 50 7 other signatures 2->50 9 Uhy4TvdjRw.exe 7 2->9         started        13 svchost.exe 3 2->13         started        process3 file4 36 C:\Users\user\AppData\Roaming\svchost.exe, PE32 9->36 dropped 38 C:\Users\user\AppData\...\Uhy4TvdjRw.exe.log, ASCII 9->38 dropped 54 Drops PE files with benign system names 9->54 15 cmd.exe 1 9->15         started        17 cmd.exe 1 9->17         started        56 Antivirus detection for dropped file 13->56 58 Multi AV Scanner detection for dropped file 13->58 60 Machine Learning detection for dropped file 13->60 signatures5 process6 signatures7 20 svchost.exe 2 15->20         started        24 conhost.exe 15->24         started        26 timeout.exe 1 15->26         started        42 Uses schtasks.exe or at.exe to add and modify task schedules 17->42 28 conhost.exe 17->28         started        30 schtasks.exe 1 17->30         started        process8 dnsIp9 40 61.14.233.88, 49739, 7707 VNPT-AS-VNVNPTCorpVN Viet Nam 20->40 52 System process connects to network (likely due to code injection or exploit) 20->52 32 MpCmdRun.exe 1 28->32         started        signatures10 process11 process12 34 conhost.exe 32->34         started       

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Uhy4TvdjRw.exe68%VirustotalBrowse
                  Uhy4TvdjRw.exe57%MetadefenderBrowse
                  Uhy4TvdjRw.exe96%ReversingLabsByteCode-MSIL.Backdoor.AsyncRAT
                  Uhy4TvdjRw.exe100%AviraHEUR/AGEN.1202836
                  Uhy4TvdjRw.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\svchost.exe100%AviraHEUR/AGEN.1202836
                  C:\Users\user\AppData\Roaming\svchost.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\svchost.exe68%VirustotalBrowse
                  C:\Users\user\AppData\Roaming\svchost.exe57%MetadefenderBrowse
                  C:\Users\user\AppData\Roaming\svchost.exe96%ReversingLabsByteCode-MSIL.Backdoor.AsyncRAT
                  SourceDetectionScannerLabelLinkDownload
                  0.0.Uhy4TvdjRw.exe.6d0000.0.unpack100%AviraHEUR/AGEN.1202836Download File
                  SourceDetectionScannerLabelLink
                  windowsupdatebg.s.llnwi.net0%VirustotalBrowse
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  windowsupdatebg.s.llnwi.net
                  95.140.230.192
                  truefalseunknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameUhy4TvdjRw.exe, 00000000.00000002.278002213.0000000002AC7000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.528272233.00000000029A4000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    61.14.233.88
                    unknownViet Nam
                    45899VNPT-AS-VNVNPTCorpVNtrue
                    Joe Sandbox Version:35.0.0 Citrine
                    Analysis ID:679246
                    Start date and time: 05/08/202213:06:172022-08-05 13:06:17 +02:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 6m 18s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Sample file name:Uhy4TvdjRw.exe
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:34
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@17/8@0/1
                    EGA Information:
                    • Successful, ratio: 33.3%
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 75
                    • Number of non-executed functions: 2
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Adjust boot time
                    • Enable AMSI
                    • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, svchost.exe, wuapihost.exe
                    • Excluded IPs from analysis (whitelisted): 23.211.6.115, 95.140.230.192, 8.238.189.126, 8.238.190.126, 8.248.141.254, 8.248.117.254, 67.26.139.254
                    • Excluded domains from analysis (whitelisted): www.bing.com, fg.download.windowsupdate.com.c.footprint.net, fs.microsoft.com, client-office365-tas.msedge.net, store-images.s-microsoft.com-c.edgekey.net, ctldl.windowsupdate.com, arc.msn.com, wu-bg-shim.trafficmanager.net, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, config.edge.skype.com
                    • Execution Graph export aborted for target Uhy4TvdjRw.exe, PID 2508 because it is empty
                    • Execution Graph export aborted for target svchost.exe, PID 5208 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    TimeTypeDescription
                    13:07:36Task SchedulerRun new task: svchost path: "C:\Users\user\AppData\Roaming\svchost.exe"
                    13:07:47API Interceptor1x Sleep call for process: svchost.exe modified
                    13:08:49API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    windowsupdatebg.s.llnwi.netStatement of Account.exeGet hashmaliciousBrowse
                    • 41.63.96.128
                    SecuriteInfo.com.W32.AIDetectNet.01.19566.exeGet hashmaliciousBrowse
                    • 95.140.236.128
                    rgvtCFNUvb.exeGet hashmaliciousBrowse
                    • 95.140.230.128
                    MAYBank-Payment-TT-Slip99484939399303003535355555-pdf.exeGet hashmaliciousBrowse
                    • 178.79.225.128
                    #U2022MT103_Payment_slip_for -outstanding.pdf.exeGet hashmaliciousBrowse
                    • 178.79.225.128
                    oRxTjKmJaR.exeGet hashmaliciousBrowse
                    • 95.140.230.192
                    Quote#20220803-83827.pdf.exeGet hashmaliciousBrowse
                    • 95.140.236.128
                    https://www.chockingpilotenergetic.com/Get hashmaliciousBrowse
                    • 95.140.230.128
                    NHPUWUJUFDLFFTSGRWJKA.VBSGet hashmaliciousBrowse
                    • 178.79.225.128
                    CLK3FhB5WQ.exeGet hashmaliciousBrowse
                    • 178.79.225.128
                    triage_dropped_file.exeGet hashmaliciousBrowse
                    • 178.79.242.128
                    https://veronica.craigslistpartner.clubGet hashmaliciousBrowse
                    • 95.140.230.192
                    https://veronica.craigslistpartner.club/Get hashmaliciousBrowse
                    • 95.140.230.128
                    Agent_Install.exeGet hashmaliciousBrowse
                    • 95.140.230.192
                    payment for invoice64249.docxGet hashmaliciousBrowse
                    • 178.79.225.0
                    payment for invoice 64249.docxGet hashmaliciousBrowse
                    • 95.140.230.192
                    ORDER ENQUIRY.exeGet hashmaliciousBrowse
                    • 178.79.242.0
                    PROMORMA INVOICE.exeGet hashmaliciousBrowse
                    • 178.79.242.0
                    JUSTIFICANTE DE PAGO.exeGet hashmaliciousBrowse
                    • 95.140.236.0
                    PO from Proform Technologies Inc 15124.pdf.rar.exeGet hashmaliciousBrowse
                    • 41.63.96.128
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    VNPT-AS-VNVNPTCorpVNGpaw8cp28XGet hashmaliciousBrowse
                    • 113.181.189.131
                    3pqbZUFmS5Get hashmaliciousBrowse
                    • 14.182.99.104
                    N9vBk22I3tGet hashmaliciousBrowse
                    • 14.170.216.171
                    W23578.xlsxGet hashmaliciousBrowse
                    • 103.255.237.74
                    QAF2022-1553 EF.xlsxGet hashmaliciousBrowse
                    • 103.255.237.74
                    SPM Strength_Vessel's Certificate.xlsxGet hashmaliciousBrowse
                    • 103.255.237.74
                    W23578.xlsxGet hashmaliciousBrowse
                    • 103.255.237.74
                    Todz6ncn8nGet hashmaliciousBrowse
                    • 14.175.10.231
                    4mp5IYDycpGet hashmaliciousBrowse
                    • 14.170.198.215
                    payment for invoice 64249.docxGet hashmaliciousBrowse
                    • 103.255.237.74
                    payment for invoice 64249.docxGet hashmaliciousBrowse
                    • 103.255.237.74
                    payment for invoice64249.docxGet hashmaliciousBrowse
                    • 103.255.237.74
                    payment for invoice 64249.docxGet hashmaliciousBrowse
                    • 103.255.237.74
                    Vrd6984wHvGet hashmaliciousBrowse
                    • 123.30.215.208
                    dsUW8nBcj0Get hashmaliciousBrowse
                    • 14.241.252.216
                    FLY PGS SOA.docxGet hashmaliciousBrowse
                    • 103.255.237.74
                    FLY PGS SOA.docxGet hashmaliciousBrowse
                    • 103.255.237.74
                    lUCh7X1XZ5Get hashmaliciousBrowse
                    • 123.29.248.241
                    Justificantepago_ 080622045678345.xlsxGet hashmaliciousBrowse
                    • 103.207.38.192
                    Jul Account.xlsxGet hashmaliciousBrowse
                    • 103.255.237.74
                    No context
                    No context
                    Process:C:\Users\user\AppData\Roaming\svchost.exe
                    File Type:Microsoft Cabinet archive data, 61712 bytes, 1 file
                    Category:dropped
                    Size (bytes):61712
                    Entropy (8bit):7.995044632446497
                    Encrypted:true
                    SSDEEP:1536:gzjJiDImMsrjCtGLaexX/zL09mX/lZHIxs:gPJiDI/sr0Hexv/0S/zx
                    MD5:589C442FC7A0C70DCA927115A700D41E
                    SHA1:66A07DACE3AFBFD1AA07A47E6875BEAB62C4BB31
                    SHA-256:2E5CB72E9EB43BAAFB6C6BFCC573AAC92F49A8064C483F9D378A9E8E781A526A
                    SHA-512:1B5FA79E52BE495C42CF49618441FB7012E28C02E7A08A91DA9213DB3AB810F0E83485BC1DD5F625A47D0BA7CFCDD5EA50ACC9A8DCEBB39F048C40F01E94155B
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:MSCF............,...................I........y.........Tf. .authroot.stl..W.`.4..CK..8U[...q.yL'sf!d.D..."2.2g.<dVI.!.....$).\...!2s..(...[.T7..{}...g....g.....w.km$.&|..qe.n.8+..&...O...`...+..C......`h!0.I.(C..1Q*L.p..".s..B.....H......fUP@..5...(X#.t.2lX.>.y|D.0Z0...M....I(.#.-... ...(.J....2..`.hO..{l+.bd7y.j..u.....3....<......3....s.T...._.'...%{v...s..............KgV.0..X=.A.9w9.Ea.x..........\.=.e.C2......9.......`.o... .......@pm.. a.....-M.....{...s.mW.....;.+...A......0.g..L9#.v.&O>./xSH.S.....GH.6.j...`2.(0g..... Lt........h4.iQ?....[.K.....uI......}.....d....M.....6q.Q~.0.\.'U^)`..u.....-........d..7...2.-.2+3.....A./.%Q...k...Q.,...H.B.%..O..x..5\...Hk.......B.';"Ym.'....X.l.E.6..a8.6..nq..x.r4..1t.....,..u.O..O.L...Uf...X.u.F .(.(.....".q...n{%U.-u....l6!....Z....~o0.}Q'.s.i....7...>4x...A.h.Mk].O.z.].6...53...b^;..>e..x.'1..\p.O.k..B1w..|..K.R.....2.e0..X.^...I...w..!.v5B]x..z.6.G^uF..].b.W...'..I.;..p..@L{.E..@W..3.&...
                    Process:C:\Users\user\AppData\Roaming\svchost.exe
                    File Type:data
                    Category:modified
                    Size (bytes):290
                    Entropy (8bit):2.947388251222562
                    Encrypted:false
                    SSDEEP:6:kKf11+N+SkQlPlEGYRMY9z+4KlDA3RUe/:311NkPlE99SNxAhUe/
                    MD5:AA449CC3E819D614B28CB03C1D01D8BF
                    SHA1:782EF6F88E4BF68E6D5B823AE7DCFA73B3DB4DA5
                    SHA-256:1477C8430F191DAD859F18B5B1511440B7E331BEED1A1BB18B7506A964D8FB76
                    SHA-512:1DC5EC42331021DC9C8F27EE6DE63B1CF83485EDA11F5E46CBC1E64811579E89C518FFBFC05FC6C0CB56497AAD9505962C048A977A67C1D60BBC734E0A6F85AF
                    Malicious:false
                    Preview:p...... ...............(....................................................... .........L.........................h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...
                    Process:C:\Users\user\Desktop\Uhy4TvdjRw.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):522
                    Entropy (8bit):5.348034597186669
                    Encrypted:false
                    SSDEEP:12:Q3La/KDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhat92n4M6:ML9E4Ks2wKDE4KhK3VZ9pKhg84j
                    MD5:07FC10473CB7F0DEC42EE8079EB0DF28
                    SHA1:90FA6D0B604991B3E5E8F6DB041651B10FD4284A
                    SHA-256:A42B61DFB4AF366D05CE1815C88E2392C7C4AA9B6B17604234BEB7A7DADA7E4C
                    SHA-512:D7240EE88D207E631990907AFA96C8384FB51729A16247BD4BDB96CBA3C4CDB9A68ADCD07819B2242A0F395690AD831B1B547EC91E988CBE39398F472055D56F
                    Malicious:true
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                    Process:C:\Users\user\AppData\Roaming\svchost.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):425
                    Entropy (8bit):5.340009400190196
                    Encrypted:false
                    SSDEEP:12:Q3La/KDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhav:ML9E4Ks2wKDE4KhK3VZ9pKhk
                    MD5:CC144808DBAF00E03294347EADC8E779
                    SHA1:A3434FC71BA82B7512C813840427C687ADDB5AEA
                    SHA-256:3FC7B9771439E777A8F8B8579DD499F3EB90859AD30EFD8A765F341403FC7101
                    SHA-512:A4F9EB98200BCAF388F89AABAF7EA57661473687265597B13192C24F06638C6339A3BD581DF4E002F26EE1BA09410F6A2BBDB4DA0CD40B59D63A09BAA1AADD3D
                    Malicious:false
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                    Process:C:\Users\user\Desktop\Uhy4TvdjRw.exe
                    File Type:DOS batch file, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):151
                    Entropy (8bit):5.102625473568323
                    Encrypted:false
                    SSDEEP:3:mKDDCMNqTtvL5oWXp5cViEaKC5ZACSmqRDWXp5cViE2J5xAInTRI2WjVZPy:hWKqTtT6WXp+NaZ5Omq1WXp+N23fTXWq
                    MD5:6D013B1CAFE4160FDC1F7B36C3145E1A
                    SHA1:C80E8E5E33E867683564C8E649DB78ED5ED6A1D2
                    SHA-256:254D27DCF87576D5221575F043F5BB32F4A2E508B4B7A98244AF933C678D7226
                    SHA-512:301C4B0635C31D563B6286239A0711B753A453B02BC4623E21FF6A896186602F147E74956CD7B879EA0ECE8593F6A391C5C0FD87F66DCF98C6CF1988DE2631B4
                    Malicious:false
                    Preview:@echo off..timeout 3 > NUL..START "" "C:\Users\user\AppData\Roaming\svchost.exe"..CD C:\Users\user\AppData\Local\Temp\..DEL "tmp93E6.tmp.bat" /f /q..
                    Process:C:\Users\user\Desktop\Uhy4TvdjRw.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):49152
                    Entropy (8bit):5.575530706715254
                    Encrypted:false
                    SSDEEP:768:wuK49TH4EjZWUR+ejmo2qrw8sJrKKIixPIAoqVcg0b1G24HftYUpG5ilsga8yBDu:wuK49THf52HtuAo9rbMNYUpnfMdh+
                    MD5:10135B39A4A6D8717BA8CEEC380EF060
                    SHA1:3669C101670B0B373DEA1C7729718340196DA4BC
                    SHA-256:45E87EE0B025A7E4A783A6786564982E7735C8C50D0B3D84A3D5DD90CE735CFE
                    SHA-512:71CC73FBB213529A14FB94C56F1A056AE5DB940A7AAC22079AE9A238A9633DDD64B7D8FF9B3A023051C9D6CFBBED48E90F14F2E17A2F6893AE9B3B6F46DD31EE
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: Joe Security
                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: Joe Security
                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: ditekSHen
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Virustotal, Detection: 68%, Browse
                    • Antivirus: Metadefender, Detection: 57%, Browse
                    • Antivirus: ReversingLabs, Detection: 96%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...#..^................................. ........@.. ....................... ............@.................................\...O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........Y..`v.............................................................V..;...$0.xC.=VD..b......9A../.\.....(....*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.~....*.......*.~....*.......*.~....*.......**.(>......*2~.....o?...*.s.........*.()...:(...(*...:....(+...:....('...:....((...9.....(v...*V(....s.... ...o....*n~....9....~....o..........*~~....(....9....(0...9....(@...*Vr.%.p~....(o....#...*.s...
                    Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                    File Type:Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
                    Category:modified
                    Size (bytes):9062
                    Entropy (8bit):3.1650995689703207
                    Encrypted:false
                    SSDEEP:192:cY+38+DJl+ibJ6+ioJJ+i3N+WtT+E9tD+Ett3d+E3zq+F:j+s+v+b+P+m+0+Q+q+5+F
                    MD5:78B72556A96E740F02ADAB636DC17FB1
                    SHA1:5382CFD5A6C1DE0541DE9CC4EE515CC2F63654F4
                    SHA-256:915A96B1B706C95F06CF841A202296F34942DD69E7C7C83EDA9B2A79F93BF435
                    SHA-512:1217A1B06E44EEF2BCC63BDC27C130932FEC307277722FD4E3DCDBA0A225918953BE239BCF19E0C2C35C5CD5B4E004893ACABB96F15A893B4D089DB2E0C5CE77
                    Malicious:false
                    Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.............-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.
                    Process:C:\Windows\SysWOW64\timeout.exe
                    File Type:ASCII text, with CRLF line terminators, with overstriking
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.41440934524794
                    Encrypted:false
                    SSDEEP:3:hYFqdLGAR+mQRKVxLZXt0sn:hYFqGaNZKsn
                    MD5:3DD7DD37C304E70A7316FE43B69F421F
                    SHA1:A3754CFC33E9CA729444A95E95BCB53384CB51E4
                    SHA-256:4FA27CE1D904EA973430ADC99062DCF4BAB386A19AB0F8D9A4185FA99067F3AA
                    SHA-512:713533E973CF0FD359AC7DB22B1399392C86D9FD1E715248F5724AAFBBF0EEB5EAC0289A0E892167EB559BE976C2AD0A0A0D8EFC407FFAF5B3C3A32AA9A0AAA4
                    Malicious:false
                    Preview:..Waiting for 3 seconds, press a key to continue ....2.1.0..
                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):5.575530706715254
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    • Win32 Executable (generic) a (10002005/4) 49.78%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    • DOS Executable Generic (2002/1) 0.01%
                    File name:Uhy4TvdjRw.exe
                    File size:49152
                    MD5:10135b39a4a6d8717ba8ceec380ef060
                    SHA1:3669c101670b0b373dea1c7729718340196da4bc
                    SHA256:45e87ee0b025a7e4a783a6786564982e7735c8c50d0b3d84a3d5dd90ce735cfe
                    SHA512:71cc73fbb213529a14fb94c56f1a056ae5db940a7aac22079ae9a238a9633ddd64b7d8ff9b3a023051c9d6cfbbed48e90f14f2e17a2f6893ae9b3b6f46dd31ee
                    SSDEEP:768:wuK49TH4EjZWUR+ejmo2qrw8sJrKKIixPIAoqVcg0b1G24HftYUpG5ilsga8yBDu:wuK49THf52HtuAo9rbMNYUpnfMdh+
                    TLSH:61233B003BE9822BF2BE4F789DF22145467AB1673607D64E6CC441D75A13FC19A42AFE
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...#..^................................. ........@.. ....................... ............@................................
                    Icon Hash:00828e8e8686b000
                    Entrypoint:0x40d0ae
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x5EB79023 [Sun May 10 05:24:51 2020 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xd05c0x4f.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x8c8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000xb0b40xb200False0.5427273525280899data5.624119295582564IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0xe0000x8c80xa00False0.3765625data5.0748901103993935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x100000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountry
                    RT_VERSION0xe0a00x394data
                    RT_MANIFEST0xe4340x493exported SGML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    61.14.233.88192.168.2.37707497392035595 08/05/22-13:07:46.244143TCP2035595ET TROJAN Generic AsyncRAT Style SSL Cert77074973961.14.233.88192.168.2.3
                    61.14.233.88192.168.2.37707497392030673 08/05/22-13:07:46.244143TCP2030673ET TROJAN Observed Malicious SSL Cert (AsyncRAT Server)77074973961.14.233.88192.168.2.3
                    TimestampSource PortDest PortSource IPDest IP
                    Aug 5, 2022 13:07:45.648207903 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:07:45.930344105 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:07:45.930579901 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:07:45.962605953 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:07:46.244143009 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:07:46.244194984 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:07:46.244291067 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:07:46.248120070 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:07:46.566440105 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:07:46.643579960 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:07:49.418629885 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:07:49.902847052 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:07:49.903542042 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:07:50.386825085 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:01.679904938 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:02.169430017 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:02.169563055 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:02.451380968 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:02.535649061 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:02.816046000 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:02.921156883 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:03.402391911 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:03.402510881 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:03.887619019 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:14.365777969 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:14.855849981 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:14.855950117 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:15.136513948 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:15.177320004 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:15.457210064 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:15.521085024 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:15.538252115 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:15.800976992 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:15.801150084 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:16.029189110 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:16.293257952 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:26.633465052 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:27.121565104 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:27.125171900 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:27.408021927 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:27.506469011 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:27.786192894 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:27.793873072 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:28.277340889 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:28.277441978 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:28.777179003 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:38.933715105 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:39.417967081 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:39.418081045 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:39.699002028 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:39.741934061 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:40.021214962 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:40.026793003 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:40.512087107 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:40.512187958 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:40.998488903 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:45.606575012 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:45.851788044 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:46.131325006 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:46.242445946 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:51.230092049 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:51.714715004 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:51.714873075 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:51.996316910 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:52.055486917 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:52.335429907 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:52.348324060 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:52.839986086 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:08:52.840198040 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:08:53.324326038 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:03.528692961 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:09:04.011859894 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:04.011940002 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:09:04.293437958 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:04.337769985 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:09:04.617676020 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:04.665924072 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:09:04.842731953 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:09:05.324264050 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:05.324431896 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:09:05.808985949 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:15.584073067 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:15.635601044 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:09:15.831409931 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:09:15.914891958 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:15.915205956 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:09:16.194834948 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:16.195557117 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:16.245033026 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:09:16.524821997 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:16.529345989 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:09:17.011609077 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:17.011742115 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:09:17.496249914 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:28.139405012 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:09:28.636779070 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:28.636989117 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:09:28.917084932 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:28.964931011 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:09:29.244489908 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:29.252217054 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:09:29.746784925 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:29.746962070 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:09:30.230319023 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:40.420351028 CEST497397707192.168.2.361.14.233.88
                    Aug 5, 2022 13:09:40.902712107 CEST77074973961.14.233.88192.168.2.3
                    Aug 5, 2022 13:09:40.902875900 CEST497397707192.168.2.361.14.233.88
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Aug 5, 2022 13:07:47.267018080 CEST8.8.8.8192.168.2.30xd471No error (0)windowsupdatebg.s.llnwi.net95.140.230.192A (IP address)IN (0x0001)
                    Aug 5, 2022 13:07:47.267018080 CEST8.8.8.8192.168.2.30xd471No error (0)windowsupdatebg.s.llnwi.net178.79.225.0A (IP address)IN (0x0001)

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:13:07:25
                    Start date:05/08/2022
                    Path:C:\Users\user\Desktop\Uhy4TvdjRw.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\Uhy4TvdjRw.exe"
                    Imagebase:0x6d0000
                    File size:49152 bytes
                    MD5 hash:10135B39A4A6D8717BA8CEEC380EF060
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.280682459.0000000004F88000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000003.269514411.0000000004F88000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.278048476.0000000002B00000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000002.278048476.0000000002B00000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.257007882.00000000006D2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000000.257007882.00000000006D2000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000002.277813823.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.277813823.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:low

                    Target ID:4
                    Start time:13:07:33
                    Start date:05/08/2022
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit
                    Imagebase:0xc20000
                    File size:232960 bytes
                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Target ID:5
                    Start time:13:07:33
                    Start date:05/08/2022
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7c9170000
                    File size:625664 bytes
                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Target ID:6
                    Start time:13:07:34
                    Start date:05/08/2022
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp93E6.tmp.bat""
                    Imagebase:0xc20000
                    File size:232960 bytes
                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Target ID:7
                    Start time:13:07:34
                    Start date:05/08/2022
                    Path:C:\Windows\SysWOW64\schtasks.exe
                    Wow64 process (32bit):true
                    Commandline:schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"'
                    Imagebase:0x9e0000
                    File size:185856 bytes
                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Target ID:8
                    Start time:13:07:35
                    Start date:05/08/2022
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7c9170000
                    File size:625664 bytes
                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Target ID:9
                    Start time:13:07:35
                    Start date:05/08/2022
                    Path:C:\Windows\SysWOW64\timeout.exe
                    Wow64 process (32bit):true
                    Commandline:timeout 3
                    Imagebase:0x80000
                    File size:26112 bytes
                    MD5 hash:121A4EDAE60A7AF6F5DFA82F7BB95659
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Target ID:10
                    Start time:13:07:36
                    Start date:05/08/2022
                    Path:C:\Users\user\AppData\Roaming\svchost.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\svchost.exe
                    Imagebase:0xc00000
                    File size:49152 bytes
                    MD5 hash:10135B39A4A6D8717BA8CEEC380EF060
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000A.00000002.304518771.0000000001439000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000A.00000002.305975314.0000000003341000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: Joe Security
                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: Joe Security
                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: ditekSHen
                    Antivirus matches:
                    • Detection: 100%, Avira
                    • Detection: 100%, Joe Sandbox ML
                    • Detection: 68%, Virustotal, Browse
                    • Detection: 57%, Metadefender, Browse
                    • Detection: 96%, ReversingLabs
                    Reputation:low

                    Target ID:11
                    Start time:13:07:38
                    Start date:05/08/2022
                    Path:C:\Users\user\AppData\Roaming\svchost.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\svchost.exe"
                    Imagebase:0x260000
                    File size:49152 bytes
                    MD5 hash:10135B39A4A6D8717BA8CEEC380EF060
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000B.00000002.534018978.0000000005100000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000B.00000003.304436416.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000B.00000002.526007263.0000000000A3A000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000B.00000003.304383142.00000000051DA000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000000B.00000002.528272233.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 0000000B.00000002.528272233.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000B.00000002.528272233.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:low

                    Target ID:29
                    Start time:13:08:48
                    Start date:05/08/2022
                    Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                    Imagebase:0x7ff7b0320000
                    File size:455656 bytes
                    MD5 hash:A267555174BFA53844371226F482B86B
                    Has elevated privileges:true
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Target ID:30
                    Start time:13:08:49
                    Start date:05/08/2022
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7c9170000
                    File size:625664 bytes
                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                    Has elevated privileges:true
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Reset < >
                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1a3b8d894464968890649e44f93aeac78c33103c5a6e872ed717df71ae5023f2
                      • Instruction ID: 998ad8f16616042e6df3ff49939a76f81e3321fafa2e3e7dd289b679d12605ff
                      • Opcode Fuzzy Hash: 1a3b8d894464968890649e44f93aeac78c33103c5a6e872ed717df71ae5023f2
                      • Instruction Fuzzy Hash: 3AB126747001048FDB54EF78D994AAD77F6EF88318B2544A8E5069B3A1DF35EC42CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b4f306d334e59628f1ffc5ea312fad95223bfe9cd8778078ce59d155c0bc3f4f
                      • Instruction ID: fa509184f5ceb78436e9b2eadcef020c1861afb934eefb8843c7e2563d159dff
                      • Opcode Fuzzy Hash: b4f306d334e59628f1ffc5ea312fad95223bfe9cd8778078ce59d155c0bc3f4f
                      • Instruction Fuzzy Hash: C991D370B101049FCB04EF79C454AAEBBF6AF89704F1480BAE506EB766DF349D068B91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f97a4b58af9c37942408aec6192fb044c81e9a2c1b97e84c0cb856d8e284cffd
                      • Instruction ID: a269c47c1b01906d097200e7af6a857ed892cca3dc0244e992f371537a5e2a87
                      • Opcode Fuzzy Hash: f97a4b58af9c37942408aec6192fb044c81e9a2c1b97e84c0cb856d8e284cffd
                      • Instruction Fuzzy Hash: DC9106747001048FDB54EF78C9A4AAD77F2AF88318B2584A9E506DB3A5DF35EC42CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dc8dc0fef34a7ac8a3a2dc625aa4dfb2848792c08f4694122a8253c97b765410
                      • Instruction ID: 4c1886bf514d5a297a0795906386125333184fca545e890fd9bffcc6ad02af61
                      • Opcode Fuzzy Hash: dc8dc0fef34a7ac8a3a2dc625aa4dfb2848792c08f4694122a8253c97b765410
                      • Instruction Fuzzy Hash: 656135347001048FDB44EF78D9A4AAD77E2EF88308F2444A8E5069B3A6DF75EC42CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 031796c905c93dd587ab4c25a90b4a9e66dbab258323f95ed93e14e250a62c9f
                      • Instruction ID: a047c973c4cba1ca866cd4739318a0fc90120bae638ebbd287fc9bbea835e579
                      • Opcode Fuzzy Hash: 031796c905c93dd587ab4c25a90b4a9e66dbab258323f95ed93e14e250a62c9f
                      • Instruction Fuzzy Hash: DF41CF75B002048FDB14DB78C494BAEBBF2AF89244F1845BAE105EB3A2DB74DC05CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fe0dcb7c3012b59da3f17a8bc85fde39fc386e5a6ca3fb78f04651ea99b61022
                      • Instruction ID: e63df2fd01365af2dac95c3e70262a6c7c2b0b989849875b23a7ccef5a551bd6
                      • Opcode Fuzzy Hash: fe0dcb7c3012b59da3f17a8bc85fde39fc386e5a6ca3fb78f04651ea99b61022
                      • Instruction Fuzzy Hash: EF512638600615CFCB16EF34E9E488977A3FB806893528969C4058B3A8EF35AD17DFC0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 533418252be07141f6aeaa716cff32743fe35983c8e0c634511855381eb35aab
                      • Instruction ID: 6d7443fbabe0ec22780342750863ae9c23e6194f83c3dc13c88aa2b079bf1b29
                      • Opcode Fuzzy Hash: 533418252be07141f6aeaa716cff32743fe35983c8e0c634511855381eb35aab
                      • Instruction Fuzzy Hash: C6511538600615CFCB16FF34E9E485977A2FB816893528969C4058B3A8EF36AD17DFC0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b6dded45bec4a32262e590c7f98b74c4a748b493b5fd3dca726c8645e58c76d9
                      • Instruction ID: c5cb23e9a395f3c611eab01e42ee4c2f90d7654992e55ffc8ffb43745d902670
                      • Opcode Fuzzy Hash: b6dded45bec4a32262e590c7f98b74c4a748b493b5fd3dca726c8645e58c76d9
                      • Instruction Fuzzy Hash: 12416174B101148FC754DF28D598A5EBBF6AF89B10F1580A9E505EF3B5CB70DC018B91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1486fb95769af9ac2b049e6a581a8014c6397b4e0598c873602ff8e088fa8b3d
                      • Instruction ID: feeb165d9723c36204e51fb3e110627b657fb446f51fe1e37c05ef996c44ab36
                      • Opcode Fuzzy Hash: 1486fb95769af9ac2b049e6a581a8014c6397b4e0598c873602ff8e088fa8b3d
                      • Instruction Fuzzy Hash: 7431E470F002558FCB54EB788895ABE7BF2EF89204B1404BEE545EB365EF749C028791
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7957eee15a0dd0d1442ccb39c542c3d1d97ae1e62a4c51862436c3d48c35d867
                      • Instruction ID: a327596f8ff8dcfbf64d56ae5800948867c979cbca4d9f35e7d6ed62b61f0701
                      • Opcode Fuzzy Hash: 7957eee15a0dd0d1442ccb39c542c3d1d97ae1e62a4c51862436c3d48c35d867
                      • Instruction Fuzzy Hash: 2A21BF70B002558FCB54EB79C892ABEBBF2EF88204B1444B9E645DB355EF74DC018B91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4a530b3867e7bce10ce8853b1ea338a2236b952c86e6a47b2e14eda26fef89d7
                      • Instruction ID: f4e6c614de908640fe086b677c92d9acecbf6e4985495344d1c410634f952610
                      • Opcode Fuzzy Hash: 4a530b3867e7bce10ce8853b1ea338a2236b952c86e6a47b2e14eda26fef89d7
                      • Instruction Fuzzy Hash: 4A11D360B101581FCB44ABB9596136FA6DADFC5648F00443EE00AD7B42FF388D0543E2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9a53a2da63a29d77752ef241447cdafeb39bb85631db580a11506588ca248c63
                      • Instruction ID: 5d1db39d448e2805215a9e117f02e1f8152678ae55231f0f94c452a152f733df
                      • Opcode Fuzzy Hash: 9a53a2da63a29d77752ef241447cdafeb39bb85631db580a11506588ca248c63
                      • Instruction Fuzzy Hash: 2E2188B06042818FDBA56B79ADD46BE3BE4AB583497110479FA87E7199EF34C400CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 95ea5feebe8f51a9ac1069b15464ecbd0b8f8a5168aba57b35ee173140f56026
                      • Instruction ID: 91b0d13a95d8bca3a22eb92f41d6a758e248f50d8284ebee53c0d0019b612274
                      • Opcode Fuzzy Hash: 95ea5feebe8f51a9ac1069b15464ecbd0b8f8a5168aba57b35ee173140f56026
                      • Instruction Fuzzy Hash: 502165B06042418FDBA5AB799DD56BE3BE4AB482497600478BE87E7199EF34C400CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 36ca673d53a75f34b1c88ae0a351a4fb30f7f386b116c8195104c008ba62c7eb
                      • Instruction ID: ca5a101c9834d13c33c48881a993edb80d24a6b0b9c182a773b3ae09f77458cf
                      • Opcode Fuzzy Hash: 36ca673d53a75f34b1c88ae0a351a4fb30f7f386b116c8195104c008ba62c7eb
                      • Instruction Fuzzy Hash: BF110E74B00250CFCB50EBB8D8969AE7BF1EF8824471504B8D40ADB350EB359802CB80
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f791519459990f5a5a58a6762a7b683808a71742efc432db659b0bb15ff69900
                      • Instruction ID: a89324f848ac02e2f858359e0c7331a420ff3f29889ef35fa67da3667ae1016f
                      • Opcode Fuzzy Hash: f791519459990f5a5a58a6762a7b683808a71742efc432db659b0bb15ff69900
                      • Instruction Fuzzy Hash: C011AD74B00254CFCB94EBB9D895AAE77E6EF882847150478D40ADB354EB35ED02CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 60870d2a9798c8dbdc8fb293e5fa5163458aac9c61e347864cadde491d9d2bac
                      • Instruction ID: 5fd55d06bedd7c85bf76091d048a2a3885bc366f2d6e144c33af435c9ddc69dd
                      • Opcode Fuzzy Hash: 60870d2a9798c8dbdc8fb293e5fa5163458aac9c61e347864cadde491d9d2bac
                      • Instruction Fuzzy Hash: B9F04C257082900FC315A77964646AE3FE34FCA1A871A00FFD109DF3A3EE148C068752
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0bef57d5e89d589d819d9c11b110c114decfb2761a7980d54d19cc36634f115d
                      • Instruction ID: d603a301bd7a0ad08b4bf65c096f7baa0f716f36824e991d239ac466cc07b4f5
                      • Opcode Fuzzy Hash: 0bef57d5e89d589d819d9c11b110c114decfb2761a7980d54d19cc36634f115d
                      • Instruction Fuzzy Hash: C4E012367002545F87549BBEA88495FB7DEEFCD5B93194079E109C7321DE75DC018B90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a1e99e2752f2a9d7c986cea03e17c20d43b30a7f20618c4202fca312754abff9
                      • Instruction ID: e71676a91fa6fe67f30abf5d840d53fc0908d551c9c298d22adc774b20dd0087
                      • Opcode Fuzzy Hash: a1e99e2752f2a9d7c986cea03e17c20d43b30a7f20618c4202fca312754abff9
                      • Instruction Fuzzy Hash: DAE065302047948BCB35E77490143DE77E25B9131CF040C6EC58A57682CFABA94943A2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d4ead41c49aa9e104abdcf78edb9373a3c5a43f5c780560e0066e36e0c3dfee4
                      • Instruction ID: 1672effe8629c07ca8137677ac3dd1191bcaa9b88467c2b3c0427e28a24132b6
                      • Opcode Fuzzy Hash: d4ead41c49aa9e104abdcf78edb9373a3c5a43f5c780560e0066e36e0c3dfee4
                      • Instruction Fuzzy Hash: A9E08630B941514FC7019BBCE45699D7BF5DF85250B44807EE006DB752DFBD8C064B81
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.277624034.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1040000_Uhy4TvdjRw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f84cd0aa5a29113a47dfd3f18598e2562da5f1d3675e6e755c8e695bfbe3b525
                      • Instruction ID: 8c14cad0190ac22a878136bc507fad585175a6ff2e6851a07aa7d3e3022da7ff
                      • Opcode Fuzzy Hash: f84cd0aa5a29113a47dfd3f18598e2562da5f1d3675e6e755c8e695bfbe3b525
                      • Instruction Fuzzy Hash: 68D0A730B101145B870067BCE01545D37DECF8665478400AAE106DF351DE2EEC0047D5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000A.00000002.310605165.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5860000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1e04682aedbee63fd8da663342d2eb9557c941a27d2e0c73e1be8c3658c4dcb5
                      • Instruction ID: 60e97384a5a66f488b7332fc81d656a90a61f295b0f105799d565b3801396c71
                      • Opcode Fuzzy Hash: 1e04682aedbee63fd8da663342d2eb9557c941a27d2e0c73e1be8c3658c4dcb5
                      • Instruction Fuzzy Hash: AC51B030B105148FCB48DF68D458AAEBBF2AF89704F1581A9E406EF7A1DB74DD428B91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000A.00000002.310605165.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5860000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fe2d6b140203f34db3b9b8783c451d093c7a6eb61e887b6db7f2efc61c20e8e9
                      • Instruction ID: 870c4aec42fbf2e54b8d87ff7084bc347669bfbad5cb8f59de17ccaead5d08da
                      • Opcode Fuzzy Hash: fe2d6b140203f34db3b9b8783c451d093c7a6eb61e887b6db7f2efc61c20e8e9
                      • Instruction Fuzzy Hash: 7F41B1307042048FCB19DF78D458AAEBBF2AF89255F1584A9D405EB3A1DB79DC05CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000A.00000002.310605165.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5860000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 89790809e74cf75be7eae81c8e8a1a305cf0ae44a6307eb39f9054e8d39d1f61
                      • Instruction ID: fbe20123ca49a10e259738e1cd51b61dcceb3dfe6a386278157c8d902d126463
                      • Opcode Fuzzy Hash: 89790809e74cf75be7eae81c8e8a1a305cf0ae44a6307eb39f9054e8d39d1f61
                      • Instruction Fuzzy Hash: 2651A778700205CFC758DF24E4488A9777BFBC9349B6099A9C8158B368EF39AD56CF80
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000A.00000002.310605165.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5860000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2e734ce531d3c4b470d079784ac5514f3ea59140b31ea1762bb2b0e9806dbaeb
                      • Instruction ID: 5c3231810866184ce6a1a440da18a37e6413330aa13c0701b44cdf76775fa922
                      • Opcode Fuzzy Hash: 2e734ce531d3c4b470d079784ac5514f3ea59140b31ea1762bb2b0e9806dbaeb
                      • Instruction Fuzzy Hash: FE41D370F10248AFCB08DFB985546AEFBF6EF85204F1082B9D409D7741EB349E428B91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000A.00000002.310605165.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5860000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c411a8ea8081f73b9cc07d49b8275f1978d47ed7f8868adad9a46b2f65288c0f
                      • Instruction ID: 626249eb89d4e6ee571b7b89e24a25975f21ad6f8f35090617582924adfe5a95
                      • Opcode Fuzzy Hash: c411a8ea8081f73b9cc07d49b8275f1978d47ed7f8868adad9a46b2f65288c0f
                      • Instruction Fuzzy Hash: 1831AD34A00205CFDB14DF68C458AAEBBF2FF88344F1485A9D805EB3A0DB799D05CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000A.00000002.310605165.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5860000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6e4bf065bb2dfeb86ed81896257f5861e9260220e4cc38ff3d77ee412f21e2ee
                      • Instruction ID: a0a674a750a2d661562a7c5c6ee2530a99bfcec30059ba1902603a3c215a5012
                      • Opcode Fuzzy Hash: 6e4bf065bb2dfeb86ed81896257f5861e9260220e4cc38ff3d77ee412f21e2ee
                      • Instruction Fuzzy Hash: EE31CC34B002458FCB58EB788855ABEBBF2AF88208B144079E545DB390EF749D028BA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000A.00000002.304276241.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_11ed000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5145d637461c942aa2a9cc52f5f26e3172fb021657b97d77faf31c1c374f975b
                      • Instruction ID: 746261ec3a6b73766354db6fd8d80a6ab8248974d798f5940815f14bc4ea9aac
                      • Opcode Fuzzy Hash: 5145d637461c942aa2a9cc52f5f26e3172fb021657b97d77faf31c1c374f975b
                      • Instruction Fuzzy Hash: 242128B1504640DFDF09DF94E8C4B96BFB5FB94324F24C569E8050BA06C336E456C7A2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000A.00000002.304276241.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_11ed000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ec3c098b29a91de14e05e107a2de66cea71c9147652adbc6ccfa149b12630491
                      • Instruction ID: f8195a73ee9793eb863f222b2fea7966209b6d95fdc4e573977a307d4e58e673
                      • Opcode Fuzzy Hash: ec3c098b29a91de14e05e107a2de66cea71c9147652adbc6ccfa149b12630491
                      • Instruction Fuzzy Hash: D5210671504640DFDF09DFD4E9C8B56BFB5FB84328F248569E8050B616C336E456CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000A.00000002.310605165.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5860000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 672eaecabcfde47e728c2d36e26519d79e35bd0c8e0a1c342a6f20624de002c5
                      • Instruction ID: 80eb46bced7ce0af5dcef6ef467cc5b55de9f412bec87e8507bcde0cab51a312
                      • Opcode Fuzzy Hash: 672eaecabcfde47e728c2d36e26519d79e35bd0c8e0a1c342a6f20624de002c5
                      • Instruction Fuzzy Hash: F3214130B14306CFDBA89B76E51DA7E3AA6BB88349B40153DAC17D2144EF688D80CF55
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000A.00000002.310605165.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5860000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e21cfb99d49a741e2db69799f2ee1e1dfb3d097e70c3d2abdd883ef96192c77d
                      • Instruction ID: f47170bc0e1e1d7d08818c7bc288f1249a10926265d9b25ce23cb176e233641b
                      • Opcode Fuzzy Hash: e21cfb99d49a741e2db69799f2ee1e1dfb3d097e70c3d2abdd883ef96192c77d
                      • Instruction Fuzzy Hash: F6213030715346CFDBA8ABB6951DA3E3AAABB84349B40143DAC17D2144EF748C408F66
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000A.00000002.304276241.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_11ed000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 11413410431b25643b9e67145488c251c0c75bd4eff5456ff6de99636f3f237f
                      • Instruction ID: ec9af741c255ab99c4e52f99343faa68fb4c81f132c4ead2d93d871b5da4d080
                      • Opcode Fuzzy Hash: 11413410431b25643b9e67145488c251c0c75bd4eff5456ff6de99636f3f237f
                      • Instruction Fuzzy Hash: CD11DF72904280CFCF06CF84D5C4B16BFB1FB84324F2486A9D8054B616C336D45ACBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000A.00000002.304276241.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_11ed000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 11413410431b25643b9e67145488c251c0c75bd4eff5456ff6de99636f3f237f
                      • Instruction ID: 8837bbee908502b2c28b5ee1fc55eaed170766eb1efc99730f04d63c504a62fc
                      • Opcode Fuzzy Hash: 11413410431b25643b9e67145488c251c0c75bd4eff5456ff6de99636f3f237f
                      • Instruction Fuzzy Hash: 2111D376504680CFCF16CF94D5C4B56BFB1FB94324F28C6A9D8450BA16C336E45ACBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000A.00000002.310605165.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5860000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 86fa75a547b9ba6b037c36aa0779c3c145647276d6d07b72915707730f293731
                      • Instruction ID: ec162c8e689a9f6e73c6cf9e72245466a1eb7c220526d46441b15c0e45e21c19
                      • Opcode Fuzzy Hash: 86fa75a547b9ba6b037c36aa0779c3c145647276d6d07b72915707730f293731
                      • Instruction Fuzzy Hash: A6115774B00254CFCB94EB78D4499AEB7FAEF89248B1404B9C80ADB311EB39DD01CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000A.00000002.310605165.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5860000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 25df3f2cdcf4e7e8bbd27409eefe4288a2b48245b3c2578bb8859e122380417f
                      • Instruction ID: bd33a22067db8c8d30ca7ab067138d04af1d28be0282338cc20072c83fd4c3e4
                      • Opcode Fuzzy Hash: 25df3f2cdcf4e7e8bbd27409eefe4288a2b48245b3c2578bb8859e122380417f
                      • Instruction Fuzzy Hash: 4611AD74B00254CFCB94EB79D4559AE77EAEF8824871404B8C80ADB310EF39DD01CB92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000A.00000002.310605165.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5860000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f9e87c7150d9ef178991718e9d5d14154124af7ee3960b1ed1abd2c3fd25930a
                      • Instruction ID: 0f5fc97d8e5e5b25a875210364338bcbdb5627199d105afbe651f1f0083372e6
                      • Opcode Fuzzy Hash: f9e87c7150d9ef178991718e9d5d14154124af7ee3960b1ed1abd2c3fd25930a
                      • Instruction Fuzzy Hash: 8D01A9313083914FC75AA774A4184AD3FE39FCA1A431940BAD149CF762DE298D068752
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000A.00000002.310605165.0000000005860000.00000040.00000800.00020000.00000000.sdmp, Offset: 05860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_5860000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c2448cb3d294529e022779045c571da30565f97bb1b248d863209ee885691adc
                      • Instruction ID: a67e4e7adf446962ba66d3e88daa0663a8e52ca415942dc543473c435847e2af
                      • Opcode Fuzzy Hash: c2448cb3d294529e022779045c571da30565f97bb1b248d863209ee885691adc
                      • Instruction Fuzzy Hash: 72E0EC367002145F87589ABEA88885EB7DAEBC95B53194079E109C7325DE65DC018B90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Execution Graph

                      Execution Coverage:16.4%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:6
                      Total number of Limit Nodes:0
                      execution_graph 15317 4ec4bd0 15318 4ec4bd1 15317->15318 15321 4ec47ac 15318->15321 15320 4ec4c25 15322 4ec66f0 LoadLibraryA 15321->15322 15324 4ec67cc 15322->15324 15324->15324

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1548 57d32d8-57d32fd 1550 57d32ff-57d3324 1548->1550 1551 57d3329-57d332f 1548->1551 1566 57d3f3a-57d3f41 1550->1566 1552 57d3335-57d333b 1551->1552 1553 57d3406-57d340c 1551->1553 1552->1553 1554 57d3341-57d335c 1552->1554 1555 57d3495-57d349b 1553->1555 1556 57d3412-57d3418 1553->1556 1567 57d3401 1554->1567 1568 57d3362-57d33b0 1554->1568 1559 57d349d-57d34a3 1555->1559 1560 57d34f1-57d34f7 1555->1560 1556->1555 1558 57d341a-57d3438 1556->1558 1573 57d343a-57d348e 1558->1573 1574 57d3490 1558->1574 1559->1560 1564 57d34a5-57d34ec 1559->1564 1562 57d34f9-57d34ff 1560->1562 1563 57d352b-57d3531 1560->1563 1562->1563 1569 57d3501-57d3526 1562->1569 1571 57d354b-57d3551 1563->1571 1572 57d3533-57d3546 1563->1572 1564->1566 1567->1566 1656 57d33b8-57d33fb 1568->1656 1569->1566 1576 57d3557-57d355d 1571->1576 1577 57d3f42-57d3f70 1571->1577 1572->1566 1573->1574 1574->1566 1578 57d355f-57d357e 1576->1578 1579 57d3583-57d3589 1576->1579 1605 57d3f78-57d3fb1 1577->1605 1578->1566 1583 57d35af-57d35b5 1579->1583 1584 57d358b-57d35aa 1579->1584 1591 57d35f7-57d35fd 1583->1591 1592 57d35b7-57d35f2 1583->1592 1584->1566 1594 57d35ff-57d3664 1591->1594 1595 57d3669-57d366f 1591->1595 1592->1566 1594->1566 1600 57d36db-57d36e1 1595->1600 1601 57d3671-57d36d6 1595->1601 1600->1605 1606 57d36e7-57d36ed 1600->1606 1601->1566 1672 57d3fb9 1605->1672 1673 57d3fb4-57d3fb8 1605->1673 1606->1605 1612 57d36f3-57d36f9 1606->1612 1612->1605 1618 57d36ff-57d3705 1612->1618 1621 57d3707-57d375d 1618->1621 1622 57d3762-57d3768 1618->1622 1621->1566 1627 57d376a-57d37c0 1622->1627 1628 57d37c5-57d37cb 1622->1628 1627->1566 1632 57d37cd-57d37ff 1628->1632 1633 57d3804-57d380a 1628->1633 1632->1566 1639 57d386c-57d3872 1633->1639 1640 57d380c-57d3867 1633->1640 1644 57d38de-57d38e4 1639->1644 1645 57d3874-57d38d9 1639->1645 1640->1566 1650 57d3944-57d394a 1644->1650 1651 57d38e6-57d393f 1644->1651 1645->1566 1657 57d39fd-57d3a03 1650->1657 1658 57d3950-57d399e 1650->1658 1651->1566 1656->1567 1656->1568 1664 57d3a09-57d3a57 1657->1664 1665 57d3ab6-57d3abc 1657->1665 1763 57d39f8 1658->1763 1764 57d39a0-57d39f6 1658->1764 1768 57d3a59-57d3aaf 1664->1768 1769 57d3ab1 1664->1769 1677 57d3adc-57d3ae2 1665->1677 1678 57d3abe-57d3ad7 1665->1678 1684 57d3fbc 1672->1684 1685 57d3fc1-57d3fd2 1672->1685 1673->1672 1682 57d3ae8-57d3b36 1677->1682 1683 57d3be2-57d3be8 1677->1683 1678->1566 1784 57d3bdd 1682->1784 1785 57d3b3c-57d3bd7 1682->1785 1692 57d3bee-57d3c3c 1683->1692 1693 57d3ce8-57d3cee 1683->1693 1684->1685 1694 57d3fd4-57d3fd9 1685->1694 1695 57d3fe7-57d3fec 1685->1695 1791 57d3ce3 1692->1791 1792 57d3c42-57d3cdd 1692->1792 1705 57d3dee-57d3df4 1693->1705 1706 57d3cf4-57d3d42 1693->1706 1694->1695 1702 57d3fdb-57d3fe2 1694->1702 1703 57d3ffc-57d4001 1695->1703 1704 57d3fee-57d3ffa 1695->1704 1715 57d4078-57d40a9 1702->1715 1717 57d403b-57d4040 1703->1717 1718 57d4003-57d4039 1703->1718 1704->1715 1709 57d3e14-57d3e1a 1705->1709 1710 57d3df6-57d3e0f 1705->1710 1794 57d3de9 1706->1794 1795 57d3d48-57d3de3 1706->1795 1722 57d3e1c-57d3e35 1709->1722 1723 57d3e3a-57d3e40 1709->1723 1710->1566 1717->1715 1720 57d4042-57d4076 1717->1720 1718->1715 1720->1715 1722->1566 1732 57d3e5f-57d3e65 1723->1732 1733 57d3e42-57d3e5a 1723->1733 1744 57d3eab-57d3eb1 1732->1744 1745 57d3e67-57d3ea6 1732->1745 1733->1566 1747 57d3ef4-57d3efa 1744->1747 1748 57d3eb3-57d3ef2 1744->1748 1745->1566 1747->1566 1759 57d3efc-57d3f32 1747->1759 1748->1566 1759->1566 1763->1566 1764->1763 1768->1769 1769->1566 1784->1566 1785->1784 1791->1566 1792->1791 1794->1566 1795->1794
                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ffceb5442bc4a7cf4fd6c9087bedf91083cba015ebcfcede9af2ee4a83a22040
                      • Instruction ID: 9ce0891a4f6af09c7e5d3ec4ddb29fab401f9f71781a814c2473578fcff085fc
                      • Opcode Fuzzy Hash: ffceb5442bc4a7cf4fd6c9087bedf91083cba015ebcfcede9af2ee4a83a22040
                      • Instruction Fuzzy Hash: E4828E307002058FDB14DF65C895B6EB7B3AF84304F54893DE50A8B7A5DF799C0A9BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1856 4ecdb40-4ecdb4a 1857 4ecdb4c 1856->1857 1858 4ecdb51-4ecdb6b 1856->1858 1857->1858 1859 4ecdd9d-4ecddc5 1858->1859 1860 4ecdb71-4ecdb78 1858->1860 1874 4ecddcc-4ecdde6 1859->1874 1861 4ecdb7a-4ecdb83 1860->1861 1862 4ecdb84-4ecdba3 1860->1862 1863 4ecdba9-4ecdbca 1862->1863 1864 4ecdd90-4ecdd9c 1862->1864 1866 4ecdbcc-4ecdbd0 1863->1866 1867 4ecdbd2-4ecdc00 1863->1867 1866->1867 1869 4ecdc02 1866->1869 1871 4ecdc05-4ecdc8b call 4ecccb0 1867->1871 1869->1871 1931 4ecdc8d call 4ecdde8 1871->1931 1932 4ecdc8d call 4ecdb40 1871->1932 1879 4ecdded-4ecded1 1874->1879 1880 4ecdde8-4ecddec 1874->1880 1894 4ecded6-4ecdee4 1879->1894 1880->1879 1887 4ecdc93-4ecdca1 call 4ecd220 1892 4ecdd00-4ecdd04 1887->1892 1893 4ecdca3-4ecdca5 1887->1893 1895 4ecdd06-4ecdd13 1892->1895 1896 4ecdd47-4ecdd4e 1892->1896 1897 4ecdce9-4ecdcf8 1893->1897 1898 4ecdeed-4ecdf38 1894->1898 1899 4ecdee6-4ecdeec 1894->1899 1903 4ecdd15-4ecdd1a 1895->1903 1904 4ecdd27-4ecdd39 1895->1904 1900 4ecdd50-4ecdd57 1896->1900 1901 4ecdd62-4ecdd66 1896->1901 1897->1892 1902 4ecdcfa 1897->1902 1923 4ecdf3a 1898->1923 1924 4ecdf42-4ecdf46 1898->1924 1899->1898 1900->1901 1905 4ecdd59 1900->1905 1908 4ecdd88-4ecdd8d 1901->1908 1909 4ecdd68-4ecdd6f 1901->1909 1906 4ecdcfc-4ecdcfe 1902->1906 1907 4ecdca7-4ecdcb3 1902->1907 1903->1904 1910 4ecdd1c-4ecdd25 1903->1910 1904->1908 1916 4ecdd3b-4ecdd45 1904->1916 1905->1901 1906->1892 1906->1907 1907->1874 1914 4ecdcb9-4ecdce8 1907->1914 1908->1864 1909->1908 1913 4ecdd71-4ecdd87 1909->1913 1910->1908 1914->1897 1916->1908 1923->1924 1925 4ecdf48-4ecdf54 1924->1925 1926 4ecdf62 1924->1926 1928 4ecdf5c 1925->1928 1929 4ecdf56-4ecdf59 1925->1929 1930 4ecdf63 1926->1930 1928->1926 1929->1928 1930->1930 1931->1887 1932->1887
                      Memory Dump Source
                      • Source File: 0000000B.00000002.533757518.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_4ec0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aeb33c3e0817f58222c28136f6ca9367aa5a98a49a6a92c733693e5e043a0b6d
                      • Instruction ID: 1685adbb0baae3f5c13be2ab92544bd3aa8977b318af381987584dc7a87754bc
                      • Opcode Fuzzy Hash: aeb33c3e0817f58222c28136f6ca9367aa5a98a49a6a92c733693e5e043a0b6d
                      • Instruction Fuzzy Hash: 41D16171E002099FCB14DFA8C984AEEFBF2FF48314F15856AE415AB351DB35A946CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2018 4ec91c8-4ec922e 2021 4ec9278-4ec927a 2018->2021 2022 4ec9230-4ec923b 2018->2022 2024 4ec927c-4ec9295 2021->2024 2022->2021 2023 4ec923d-4ec9249 2022->2023 2025 4ec926c-4ec9276 2023->2025 2026 4ec924b-4ec9255 2023->2026 2031 4ec9297-4ec92a3 2024->2031 2032 4ec92e1-4ec92e3 2024->2032 2025->2024 2027 4ec9259-4ec9268 2026->2027 2028 4ec9257 2026->2028 2027->2027 2030 4ec926a 2027->2030 2028->2027 2030->2025 2031->2032 2034 4ec92a5-4ec92b1 2031->2034 2033 4ec92e5-4ec933d 2032->2033 2043 4ec933f-4ec934a 2033->2043 2044 4ec9387-4ec9389 2033->2044 2035 4ec92d4-4ec92df 2034->2035 2036 4ec92b3-4ec92bd 2034->2036 2035->2033 2038 4ec92bf 2036->2038 2039 4ec92c1-4ec92d0 2036->2039 2038->2039 2039->2039 2040 4ec92d2 2039->2040 2040->2035 2043->2044 2046 4ec934c-4ec9358 2043->2046 2045 4ec938b-4ec93a3 2044->2045 2053 4ec93ed-4ec93ef 2045->2053 2054 4ec93a5-4ec93b0 2045->2054 2047 4ec935a-4ec9364 2046->2047 2048 4ec937b-4ec9385 2046->2048 2050 4ec9368-4ec9377 2047->2050 2051 4ec9366 2047->2051 2048->2045 2050->2050 2052 4ec9379 2050->2052 2051->2050 2052->2048 2056 4ec93f1-4ec9442 2053->2056 2054->2053 2055 4ec93b2-4ec93be 2054->2055 2057 4ec93c0-4ec93ca 2055->2057 2058 4ec93e1-4ec93eb 2055->2058 2064 4ec9448-4ec9456 2056->2064 2060 4ec93cc 2057->2060 2061 4ec93ce-4ec93dd 2057->2061 2058->2056 2060->2061 2061->2061 2062 4ec93df 2061->2062 2062->2058 2065 4ec945f-4ec94bf 2064->2065 2066 4ec9458-4ec945e 2064->2066 2073 4ec94cf-4ec94d3 2065->2073 2074 4ec94c1-4ec94c5 2065->2074 2066->2065 2076 4ec94d5-4ec94d9 2073->2076 2077 4ec94e3-4ec94e7 2073->2077 2074->2073 2075 4ec94c7 2074->2075 2075->2073 2076->2077 2080 4ec94db 2076->2080 2078 4ec94e9-4ec94ed 2077->2078 2079 4ec94f7-4ec94fb 2077->2079 2078->2079 2081 4ec94ef 2078->2081 2082 4ec94fd-4ec9501 2079->2082 2083 4ec950b-4ec950f 2079->2083 2080->2077 2081->2079 2082->2083 2084 4ec9503 2082->2084 2085 4ec951f-4ec9523 2083->2085 2086 4ec9511-4ec9515 2083->2086 2084->2083 2088 4ec9525-4ec9529 2085->2088 2089 4ec9533-4ec9537 2085->2089 2086->2085 2087 4ec9517 2086->2087 2087->2085 2088->2089 2092 4ec952b 2088->2092 2090 4ec9539-4ec953d 2089->2090 2091 4ec9547 2089->2091 2090->2091 2093 4ec953f 2090->2093 2094 4ec9548 2091->2094 2092->2089 2093->2091 2094->2094
                      Memory Dump Source
                      • Source File: 0000000B.00000002.533757518.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_4ec0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: db88f73b2fc37231ae78733b32dd42b2f7cb9e64509843b9223a2e8fd4fbb8d8
                      • Instruction ID: 1d16fcac7d9db4111d0d4bc436592f1fa341dd0b0b04e79a41d9f8c5c6c20abc
                      • Opcode Fuzzy Hash: db88f73b2fc37231ae78733b32dd42b2f7cb9e64509843b9223a2e8fd4fbb8d8
                      • Instruction Fuzzy Hash: 19B161B0E002098FDF14CFA8D9857DDBBF2BF88308F14912DD815A7295EB74A846CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2347 4ec9ea0-4ec9f06 2350 4ec9f08-4ec9f13 2347->2350 2351 4ec9f50-4ec9f52 2347->2351 2350->2351 2353 4ec9f15-4ec9f21 2350->2353 2352 4ec9f54-4ec9f6d 2351->2352 2360 4ec9f6f-4ec9f7b 2352->2360 2361 4ec9fb9-4ec9fbb 2352->2361 2354 4ec9f44-4ec9f4e 2353->2354 2355 4ec9f23-4ec9f2d 2353->2355 2354->2352 2357 4ec9f2f 2355->2357 2358 4ec9f31-4ec9f40 2355->2358 2357->2358 2358->2358 2359 4ec9f42 2358->2359 2359->2354 2360->2361 2362 4ec9f7d-4ec9f89 2360->2362 2363 4ec9fbd-4ec9fd5 2361->2363 2364 4ec9fac-4ec9fb7 2362->2364 2365 4ec9f8b-4ec9f95 2362->2365 2369 4eca01f-4eca021 2363->2369 2370 4ec9fd7-4ec9fe2 2363->2370 2364->2363 2367 4ec9f99-4ec9fa8 2365->2367 2368 4ec9f97 2365->2368 2367->2367 2371 4ec9faa 2367->2371 2368->2367 2373 4eca023-4eca03b 2369->2373 2370->2369 2372 4ec9fe4-4ec9ff0 2370->2372 2371->2364 2374 4ec9ff2-4ec9ffc 2372->2374 2375 4eca013-4eca01d 2372->2375 2380 4eca03d-4eca048 2373->2380 2381 4eca085-4eca087 2373->2381 2376 4ec9ffe 2374->2376 2377 4eca000-4eca00f 2374->2377 2375->2373 2376->2377 2377->2377 2379 4eca011 2377->2379 2379->2375 2380->2381 2383 4eca04a-4eca056 2380->2383 2382 4eca089-4eca0fc 2381->2382 2392 4eca102-4eca110 2382->2392 2384 4eca058-4eca062 2383->2384 2385 4eca079-4eca083 2383->2385 2387 4eca064 2384->2387 2388 4eca066-4eca075 2384->2388 2385->2382 2387->2388 2388->2388 2389 4eca077 2388->2389 2389->2385 2393 4eca119-4eca179 2392->2393 2394 4eca112-4eca118 2392->2394 2401 4eca189-4eca18d 2393->2401 2402 4eca17b-4eca17f 2393->2402 2394->2393 2404 4eca19d-4eca1a1 2401->2404 2405 4eca18f-4eca193 2401->2405 2402->2401 2403 4eca181 2402->2403 2403->2401 2407 4eca1b1-4eca1b5 2404->2407 2408 4eca1a3-4eca1a7 2404->2408 2405->2404 2406 4eca195 2405->2406 2406->2404 2410 4eca1c5-4eca1c9 2407->2410 2411 4eca1b7-4eca1bb 2407->2411 2408->2407 2409 4eca1a9 2408->2409 2409->2407 2412 4eca1d9-4eca1dd 2410->2412 2413 4eca1cb-4eca1cf 2410->2413 2411->2410 2414 4eca1bd 2411->2414 2416 4eca1ed 2412->2416 2417 4eca1df-4eca1e3 2412->2417 2413->2412 2415 4eca1d1 2413->2415 2414->2410 2415->2412 2419 4eca1ee 2416->2419 2417->2416 2418 4eca1e5 2417->2418 2418->2416 2419->2419
                      Memory Dump Source
                      • Source File: 0000000B.00000002.533757518.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_4ec0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5aed6f0168a811a5fe56802375351b9c573af080cf8f4e86f6a2d1a96a0633f9
                      • Instruction ID: 80fd9122f208641566a9e1b16641e4819de38fec2ba26632a3237fc6eb5bc8e3
                      • Opcode Fuzzy Hash: 5aed6f0168a811a5fe56802375351b9c573af080cf8f4e86f6a2d1a96a0633f9
                      • Instruction Fuzzy Hash: 16B151B0E00209CFDB14CFA9D9817EDBBF2AF48358F14952DE415E7254EB74A886CB81
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 156 4ec66e4-4ec66e6 157 4ec66ed-4ec66ee 156->157 158 4ec66e8-4ec66ea 156->158 161 4ec66f5-4ec670b 157->161 162 4ec66f0 157->162 159 4ec66ec 158->159 160 4ec66f1-4ec66f4 158->160 159->157 163 4ec670d-4ec6747 159->163 160->161 161->163 162->160 164 4ec6749-4ec6753 163->164 165 4ec6780-4ec67ca LoadLibraryA 163->165 164->165 166 4ec6755-4ec6757 164->166 170 4ec67cc-4ec67d2 165->170 171 4ec67d3-4ec6804 165->171 167 4ec6759-4ec6763 166->167 168 4ec677a-4ec677d 166->168 172 4ec6765 167->172 173 4ec6767-4ec6776 167->173 168->165 170->171 177 4ec6814 171->177 178 4ec6806-4ec680a 171->178 172->173 173->173 175 4ec6778 173->175 175->168 180 4ec6815 177->180 178->177 179 4ec680c 178->179 179->177 180->180
                      APIs
                      • LoadLibraryA.KERNELBASE(?), ref: 04EC67BA
                      Memory Dump Source
                      • Source File: 0000000B.00000002.533757518.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_4ec0000_svchost.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 6e42b50cff099ec96c59328ba7a00950f1d1a9de05eb7f7256f2cf0f43aa74aa
                      • Instruction ID: b5f2735ca0eb9872b3cd3002604a20a6e530288d2b30038c8da802f1ca4bb157
                      • Opcode Fuzzy Hash: 6e42b50cff099ec96c59328ba7a00950f1d1a9de05eb7f7256f2cf0f43aa74aa
                      • Instruction Fuzzy Hash: BD4123B1D002899FDB14CFA8CA857DEBBB1EF08318F14992DE815A7240D774A486CF96
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 181 4ec47ac-4ec6747 186 4ec6749-4ec6753 181->186 187 4ec6780-4ec67ca LoadLibraryA 181->187 186->187 188 4ec6755-4ec6757 186->188 192 4ec67cc-4ec67d2 187->192 193 4ec67d3-4ec6804 187->193 189 4ec6759-4ec6763 188->189 190 4ec677a-4ec677d 188->190 194 4ec6765 189->194 195 4ec6767-4ec6776 189->195 190->187 192->193 199 4ec6814 193->199 200 4ec6806-4ec680a 193->200 194->195 195->195 197 4ec6778 195->197 197->190 202 4ec6815 199->202 200->199 201 4ec680c 200->201 201->199 202->202
                      APIs
                      • LoadLibraryA.KERNELBASE(?), ref: 04EC67BA
                      Memory Dump Source
                      • Source File: 0000000B.00000002.533757518.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_4ec0000_svchost.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 85ca257474745d9dbed20b19677531738a3c0ba49db1731877e213a784e679a3
                      • Instruction ID: 97d1051b86f74c79f055d071e909617ec6f5167673d9f91a5c1c9015cb19200f
                      • Opcode Fuzzy Hash: 85ca257474745d9dbed20b19677531738a3c0ba49db1731877e213a784e679a3
                      • Instruction Fuzzy Hash: 4D3106B1D002599FDB14CFA9C98579EBBF1EF08318F14892DE815A7240D778A446CF95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2420 57d2d30-57d2da9 call 57d3100 2430 57d2daf-57d2dbe 2420->2430 2431 57d30f3-57d30fa 2420->2431 2433 57d2def-57d2e94 call 57d1eb8 call 57d24d8 2430->2433 2434 57d2dc0-57d2dcf 2430->2434 2475 57d2e99-57d2ea1 2433->2475 2437 57d2dd5-57d2de4 2434->2437 2438 57d2ea6-57d2ec7 2434->2438 2442 57d2f9e-57d3025 2437->2442 2443 57d2dea 2437->2443 2449 57d2ecd-57d2f70 call 57d1eb8 call 57d24d8 2438->2449 2450 57d2f75-57d2f7d 2438->2450 2472 57d30b9-57d30ce 2442->2472 2473 57d302b-57d3043 2442->2473 2443->2431 2457 57d30d1 2449->2457 2450->2457 2457->2431 2472->2457 2478 57d304d-57d3057 2473->2478 2479 57d3045-57d304b 2473->2479 2475->2431 2481 57d3059-57d306c 2478->2481 2479->2481 2486 57d306e-57d3074 2481->2486 2487 57d3076-57d307b 2481->2487 2488 57d3080-57d308b 2486->2488 2487->2488 2492 57d308d-57d309d 2488->2492 2493 57d30a4-57d30b3 2488->2493 2492->2493 2493->2472 2493->2473
                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: caeafb181ded681a9072855dc8deffb8b481280f2a0b99db914c278d67b11e64
                      • Instruction ID: 00a5573af4228f7081c2594dbd1b9d13b84fac978edfdf006860658b8844a443
                      • Opcode Fuzzy Hash: caeafb181ded681a9072855dc8deffb8b481280f2a0b99db914c278d67b11e64
                      • Instruction Fuzzy Hash: 85A19E30B046448FCB04EF34E49566EBBB3AF85218B10896DD8069F396EF74AC06DBD1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ce01ed29025958401e5c42bc42b8ca8ec67b084264e5516212659c08a7a006e1
                      • Instruction ID: 8e09e5dc89324222a223998cd1c7f8ebd91f950cc6bfaae4136628e99a1d88e2
                      • Opcode Fuzzy Hash: ce01ed29025958401e5c42bc42b8ca8ec67b084264e5516212659c08a7a006e1
                      • Instruction Fuzzy Hash: 9D914979B042988FD725CF19EC84B55B7B7B744358F04422EC8158F2E2DBB4A846EBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b5ee003b7dea7f579576e7b04703996bfd6319c976cfb30fe3c78d55e85b055c
                      • Instruction ID: 3cbc85534b723883a585fcdcc6ef8dc58ff70b706ee97833931915682f1745a2
                      • Opcode Fuzzy Hash: b5ee003b7dea7f579576e7b04703996bfd6319c976cfb30fe3c78d55e85b055c
                      • Instruction Fuzzy Hash: 1B51AF74B406049FD715DF29C895F69BBB2FF88714F104268E506AB7A2CB71AC42DBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b8f3e519c8d1cf8f44c1dd455612e770bd3b9f00e81f20b7ddeae71aad7c7cb0
                      • Instruction ID: 4eb133c1f8f43dfe65b923e465b91925a83ea75d45d15f3e1042ca8f5cdcab24
                      • Opcode Fuzzy Hash: b8f3e519c8d1cf8f44c1dd455612e770bd3b9f00e81f20b7ddeae71aad7c7cb0
                      • Instruction Fuzzy Hash: F9414C74604105DFCB04DFA4C984EAEFBB2FF45304B1284A5E815AB762DB31ED06DBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1f5a19db39d62bcab310c2ff2a41349dedccb8f0c7590de611f54b82fb936ef6
                      • Instruction ID: 1f00232479ca40970ef4618f6ef4e92dab27b236d0cb27b3836dd4b78ca2f0db
                      • Opcode Fuzzy Hash: 1f5a19db39d62bcab310c2ff2a41349dedccb8f0c7590de611f54b82fb936ef6
                      • Instruction Fuzzy Hash: F0417A38328151CFC70A9B59951982DFB33BB81341724C195E1068B662DF369D03EBB2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5a6aadd967fed114dcbcb7a978d195863ec24c0c9bf659c6bf828be802d326a1
                      • Instruction ID: 994d9c02083f24ba9266a0deb12bf69985125e6e97ee13713a9ebdcf6b801ed6
                      • Opcode Fuzzy Hash: 5a6aadd967fed114dcbcb7a978d195863ec24c0c9bf659c6bf828be802d326a1
                      • Instruction Fuzzy Hash: 87414738328411CB87099B59D55992DFB77FF84381B24C168E1068B762DF36AD13EBB2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 61b81c1696ed8015ebce064cb000c13607dce9a8b998b3de8985fcfc92e20f91
                      • Instruction ID: e1682ba1281ed0747b06ef5513fb46e3f25104931d65ab869fe09d851a015083
                      • Opcode Fuzzy Hash: 61b81c1696ed8015ebce064cb000c13607dce9a8b998b3de8985fcfc92e20f91
                      • Instruction Fuzzy Hash: 4D31D3707142508FCB15CB68C845B6ABBF7AF89215F1481ADE406DB3A2DF749C01D7A1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 97a4628a76334ce1e9d9215e62c259d49ef4ae2629e24e221de636fee779c78a
                      • Instruction ID: f9556b2d8804c29dbda623b5833e8d20b8fb18d8fcbd86ac345265f6003c551c
                      • Opcode Fuzzy Hash: 97a4628a76334ce1e9d9215e62c259d49ef4ae2629e24e221de636fee779c78a
                      • Instruction Fuzzy Hash: 2621A3307006448FDB15FB74C959AADBBB2BF89218F54442CD402AB355EF35AD41D7A1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.527810658.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_fdd000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 908180555ad8e21bbdfc418503fc316ff2ccdd28fd8655c85759c422b80be378
                      • Instruction ID: 02d6c7a53987d3fe29b7339921c43166d08c45cc5aa797b38cd999aa0805eda5
                      • Opcode Fuzzy Hash: 908180555ad8e21bbdfc418503fc316ff2ccdd28fd8655c85759c422b80be378
                      • Instruction Fuzzy Hash: FB212872900240DFCB01DF14D8C0B56BB66FB84324F28C56AE8050B746C336E856E7A2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.527810658.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_fdd000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b066592b3c813b8f3162f3d122e52f4d4e80a3465c2f168faddcdd579f15d67f
                      • Instruction ID: 02def31f4d2a72fb407e501a9540ff11e5a8f002c3f57968ba6b1262a71eb08c
                      • Opcode Fuzzy Hash: b066592b3c813b8f3162f3d122e52f4d4e80a3465c2f168faddcdd579f15d67f
                      • Instruction Fuzzy Hash: EA212872904240DFDB11DF14E9C0B16BF66FB84328F38856AD8050B716C336E856EBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a361756122c74582d18c87bfbdf271a3ece6faeb0f46b00520f8f1eea4e04fc8
                      • Instruction ID: 2f917e73d450b4bb84b2201ee4df1ae520b06dcf12cedb666a7652144bb54595
                      • Opcode Fuzzy Hash: a361756122c74582d18c87bfbdf271a3ece6faeb0f46b00520f8f1eea4e04fc8
                      • Instruction Fuzzy Hash: 221189357052580B8F15AB34E9A25BE77ABAF81218700457ACD068B34AFF70EC0353E2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c31324d6e27636288e09ddb3408c4052b9a6d28b1e18c9cd605160c942875b88
                      • Instruction ID: 2355ee2d16bde80a5a07fc6518db4a301b5a31c1d2f6a2768743a5fd91b94ebb
                      • Opcode Fuzzy Hash: c31324d6e27636288e09ddb3408c4052b9a6d28b1e18c9cd605160c942875b88
                      • Instruction Fuzzy Hash: E721AC75A041159FCB05EF98D984E6AFB72FF44305B1280A4E815AB697C730FC02DBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2999947d7926e9084355b6f4b147d0cf8e107f0c2829b7a23e80baafd6a56fe0
                      • Instruction ID: e4eeb2458895c1012ab65c3280db5b17f5e5e0c9af8f8ba02046263ce3b6e142
                      • Opcode Fuzzy Hash: 2999947d7926e9084355b6f4b147d0cf8e107f0c2829b7a23e80baafd6a56fe0
                      • Instruction Fuzzy Hash: DF215030700204CFDB14FB74C9556AEB7B2AF89218F54582CD502AB364EF39AD42DBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 483153849256388cd755686feb7d8f31fdb147ec741cb7036a5c6d8fdb9158a7
                      • Instruction ID: a104cbca92bcd81a60e49ac802ecd6aac660f9d08cc065eaab7379a7d64de214
                      • Opcode Fuzzy Hash: 483153849256388cd755686feb7d8f31fdb147ec741cb7036a5c6d8fdb9158a7
                      • Instruction Fuzzy Hash: AE218C707101148FCB14DB68C959BAEB7F6AF89710F244169E506EB3A1DF748C05DBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4fd323e75bd36c4be58d97b665494f89bc3a8b7378167c0daabf82a37953e3b9
                      • Instruction ID: d5d4145c8ae33664e031c33db03ad3906cb1fb3d480a9e746f7136d3511cd9b8
                      • Opcode Fuzzy Hash: 4fd323e75bd36c4be58d97b665494f89bc3a8b7378167c0daabf82a37953e3b9
                      • Instruction Fuzzy Hash: B8112772B003105FC700AB68D891BEE7BA7EFD9258F54456EE105CB3A2EE74EC0593A5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aa4f76891d12cc9f6dcda126c258c3e82eb726373a2de2c26de5dd02cda298b8
                      • Instruction ID: 00a15055c3d7b758888220c9625da887bec04cf5a8e1cfb672cc8feb46ebef11
                      • Opcode Fuzzy Hash: aa4f76891d12cc9f6dcda126c258c3e82eb726373a2de2c26de5dd02cda298b8
                      • Instruction Fuzzy Hash: B01124307002098FCB40EF30D8059AEBBB2AF81258B544A6DC105CF382EB35A91ACBE1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 46f483bf1d3175b60c1dcbdee04b8933866f6fecd6cd9219e78be5be7406fa7c
                      • Instruction ID: de2d752ceae5e6f9347b8bce00f33a9d0e4727d5edb29bd3ff5bb4ceda34f2d7
                      • Opcode Fuzzy Hash: 46f483bf1d3175b60c1dcbdee04b8933866f6fecd6cd9219e78be5be7406fa7c
                      • Instruction Fuzzy Hash: B311E3307105059FDB159B54CC19BADBBF6AF8D710F204469E502EB3A1CFB19C06ABE2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5d83d08b94b4cc2e53715692d2d19c022c5b6505048a6826f8047b5aaa4da0a7
                      • Instruction ID: 01e166dba6fe1a614789830e6a401cd5873e92fc43bb85a448a5e2743307c3c8
                      • Opcode Fuzzy Hash: 5d83d08b94b4cc2e53715692d2d19c022c5b6505048a6826f8047b5aaa4da0a7
                      • Instruction Fuzzy Hash: BD11B174B501048FCB148B68C855BBDBBB6AF88714F144069E506AF3B2DF709C42DBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 16525dd3a026ccbb5b3b3e8fb471f7305687d859446aed908daaf8e11ee1e443
                      • Instruction ID: 1bb66e74656e722b24d9f8cb278ec9ba7db54d92ff6303b4cd64b2acaec6b396
                      • Opcode Fuzzy Hash: 16525dd3a026ccbb5b3b3e8fb471f7305687d859446aed908daaf8e11ee1e443
                      • Instruction Fuzzy Hash: 5F1102327003009FC7009B28D895E6E7BBBEFC9214B04416AE605CB3A2DE70EC05D7A1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7e13895bddaf7ed0ce768f49fb27dc1b46bf04899a81e628737807b0f0d059f8
                      • Instruction ID: 49e3dfff66695b6624a02eede5976b66f4d7c5054310dbf6a2ad5ab439648847
                      • Opcode Fuzzy Hash: 7e13895bddaf7ed0ce768f49fb27dc1b46bf04899a81e628737807b0f0d059f8
                      • Instruction Fuzzy Hash: 5111B2307501048FCB149B69C895BAEBBF6AF88714F144069E506EF3A1DF709C42CBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.527810658.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_fdd000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 11413410431b25643b9e67145488c251c0c75bd4eff5456ff6de99636f3f237f
                      • Instruction ID: b98ed46aea8bc7f28aac376b20533e378d939f9a8f16b8b41bc2842f3fbcb8d3
                      • Opcode Fuzzy Hash: 11413410431b25643b9e67145488c251c0c75bd4eff5456ff6de99636f3f237f
                      • Instruction Fuzzy Hash: 2911D376904280DFCB12CF10D5C4B16BF72FB95324F28C6AAD8450B756C336E85ADBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.527810658.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_fdd000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 11413410431b25643b9e67145488c251c0c75bd4eff5456ff6de99636f3f237f
                      • Instruction ID: f339dc320010e9b46c041140aee8a82e9b2cb7bfbc419123945fa19a6546e70b
                      • Opcode Fuzzy Hash: 11413410431b25643b9e67145488c251c0c75bd4eff5456ff6de99636f3f237f
                      • Instruction Fuzzy Hash: 7C11B176904280DFCB12CF14D9C4B16BF72FB84324F28C6AAD8050B616C336D85ADBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 774be92919fd80f5f6e426b717e2b0967ed884b677041a9ff54545b1d6f078b5
                      • Instruction ID: d2f5218cad90d97ce87456b9dad1cf50691138bab4ecadb14b640f3910b7fa28
                      • Opcode Fuzzy Hash: 774be92919fd80f5f6e426b717e2b0967ed884b677041a9ff54545b1d6f078b5
                      • Instruction Fuzzy Hash: 050100327002109FC700AB68D894BAE7BBBEFD96A4B40452EE205CB362DF70EC05D795
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9b177a6bee412c6ee680ae61a4709019893752250a5af93c8db40f383c48b9da
                      • Instruction ID: 1aeefc718f06f8f218abbe18a1e016d61acda6ccfc1e90b3c5bc7f092ac689c3
                      • Opcode Fuzzy Hash: 9b177a6bee412c6ee680ae61a4709019893752250a5af93c8db40f383c48b9da
                      • Instruction Fuzzy Hash: 5E119170B002098FCB40FF74D84559EBBB2AF85258B544B6DC1058B385EF75AA1ACBE5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1d4c822b215dc93ca74a4d936c999aa3fadb51ffa9b10d8d9ef2b3a2eb8bb568
                      • Instruction ID: 836349a990a198dc99a2575b7bbf2d9b18c4a48eadb7e1e81c706f668d0f6294
                      • Opcode Fuzzy Hash: 1d4c822b215dc93ca74a4d936c999aa3fadb51ffa9b10d8d9ef2b3a2eb8bb568
                      • Instruction Fuzzy Hash: 6C1100B5D002498FCB10DF99D585BDEBBF4EB48224F14851AD419A7750D374A984CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1f1a3580d0fb449ccc865ae56b89c633ff2d2797937b0203b796d99e74bf0b40
                      • Instruction ID: afad092f81bd5853aa9f701dfc6307c943824e306c6a49dde29a8f5146bfd507
                      • Opcode Fuzzy Hash: 1f1a3580d0fb449ccc865ae56b89c633ff2d2797937b0203b796d99e74bf0b40
                      • Instruction Fuzzy Hash: E501A271B001049FCB40FBB4D809BBEB6B6EF45600F544569E506DB251FA619901D7E1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 841199e3ae1ad054bcd09a69220372cc493311f735f95ea0883bbcec0becf05f
                      • Instruction ID: 62e7fc8b867d77cf83744648b0e469f84a114a246d91b027854dce2b27d0e605
                      • Opcode Fuzzy Hash: 841199e3ae1ad054bcd09a69220372cc493311f735f95ea0883bbcec0becf05f
                      • Instruction Fuzzy Hash: FA110DB5D002488FCB20DF9AC588BDEFBF4EB48324F108429D81AA7750D374A984CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6e4dd7a4e7f17a6e11a24a2829dc4703175c910a94fae5d0a11b3db94c558e8a
                      • Instruction ID: cf8792bbf0ebd8f502c6450659e41d1dd58f8409524583c3d64def58cc1663c3
                      • Opcode Fuzzy Hash: 6e4dd7a4e7f17a6e11a24a2829dc4703175c910a94fae5d0a11b3db94c558e8a
                      • Instruction Fuzzy Hash: C201D670B001059FCB40EBB8D805AAEB3B2FF45650F108169E509DB250EB719E01C7E1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6bbca6a689bb4f9babe30251d0daf9b524acd23d50ed8d5293a79e961a7e82ec
                      • Instruction ID: e0ea1604c44dca55dc34759f34020faf7713eb7acdffe251787c60a73bac7694
                      • Opcode Fuzzy Hash: 6bbca6a689bb4f9babe30251d0daf9b524acd23d50ed8d5293a79e961a7e82ec
                      • Instruction Fuzzy Hash: E1F027A5D043069ACB51DB74C405AAEFFF06704324F200A6AC060EA243F7796203BBB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0a6b1c58c6af902fd8848d2c31a8eba88a15b43cc952ec163954e8d805f6e5f5
                      • Instruction ID: 0ee4103a3d8afb676f0f3dab309e247422147b2cdd8ccefb1262c05f1497e49f
                      • Opcode Fuzzy Hash: 0a6b1c58c6af902fd8848d2c31a8eba88a15b43cc952ec163954e8d805f6e5f5
                      • Instruction Fuzzy Hash: 2CE0C231B144906BCB016BB8E4066AD3B9BCF87764F98006AE106DF366DE2EDD0093D5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b5a181283bfb5ee947c4141b91f396ee2394c8c911a021b7ee2d79389a5dbe9a
                      • Instruction ID: 4b8b919270b697f48e8d6a69cd97de76c6c44ba0f026b1519bbf660ec19cbab1
                      • Opcode Fuzzy Hash: b5a181283bfb5ee947c4141b91f396ee2394c8c911a021b7ee2d79389a5dbe9a
                      • Instruction Fuzzy Hash: C5E04F31B00B544BD738CF6B800062BFAE76FC4619F44C42EC48E42A11DAB5A4408795
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 669c5c7421cb743c98ad7b870e72765b7411c2e661d5b1430ea1c50815056b9a
                      • Instruction ID: af75d9b4d50f88d9dead31d27bbd0a54dd791c1efdf9020d888128bab9396275
                      • Opcode Fuzzy Hash: 669c5c7421cb743c98ad7b870e72765b7411c2e661d5b1430ea1c50815056b9a
                      • Instruction Fuzzy Hash: B2D0A730B101145B870067BCE41545D37DECF86654784006AE106DF351DE2EEC0047D5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.534802419.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_57d0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2972ec3bc9f8fb012a2f0b903a85e11b3f7aee68392f05ea1a9284fefe78f548
                      • Instruction ID: 5e20c83f4bd68de874f3609d61d5b937d42238c8503bab125aac090a8d91b53f
                      • Opcode Fuzzy Hash: 2972ec3bc9f8fb012a2f0b903a85e11b3f7aee68392f05ea1a9284fefe78f548
                      • Instruction Fuzzy Hash: BED067B4D4430AEEDB40EFB9890979EFFF4AB08340F50496AC425F7241E7B84605AFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.533757518.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_4ec0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ef2686382941dbcfc4959155c7ce4c17ea3c1d23c963fbf8a39d7831d138c118
                      • Instruction ID: 5d6ed3e1d0865be08bd9f204ad5c20fc98d4056335dbd13131b4797245902b8f
                      • Opcode Fuzzy Hash: ef2686382941dbcfc4959155c7ce4c17ea3c1d23c963fbf8a39d7831d138c118
                      • Instruction Fuzzy Hash: 3E81A231B142188BCB08EF7598556BEBBB7AFC8704B04C82DE447D7389EF3498169B91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 0000000B.00000002.533757518.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_4ec0000_svchost.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b16c68e7c37febfefd170461f374e85b8d248a6973ced65f08415bab8abafa16
                      • Instruction ID: 44d972aae8eb456b0f1f0cad57f966381a31c022d7c3863828d5b04aafc6449f
                      • Opcode Fuzzy Hash: b16c68e7c37febfefd170461f374e85b8d248a6973ced65f08415bab8abafa16
                      • Instruction Fuzzy Hash: CF915D70E002499FDF10DFA8CA867DEBBF2BF48318F149129E405A7354DB74A986CB91
                      Uniqueness

                      Uniqueness Score: -1.00%