Summary | ZeroBOX

svchost.exe

Generic Malware Antivirus PE32 PE File .NET EXE
Category Machine Started Completed
FILE s1_win7_x6401 Oct. 16, 2024, 2:22 p.m. Oct. 16, 2024, 2:26 p.m.
Size 292.0KB
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 254dd83941729a0ee8f38777fc77889c
SHA256 11ae325f101e921cee280a88d8d8b394236f1199817c55953865740354c7a1fc
CRC32 3EF9B71B
ssdeep 6144:zPgcl4RxzJyKCFGZtfEfPHqGAU3qRHeTWvk2ajdU8FQlM5YZ:024RJJyHGzfE3HVAITTf2ajbFn5
Yara
  • PE_Header_Zero - PE File Signature
  • Is_DotNET_EXE - (no description)
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
109.176.30.246 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49165 -> 109.176.30.246:56002 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.101:49165 -> 109.176.30.246:56002 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.101:49164 -> 109.176.30.246:56002 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.101:49165 -> 109.176.30.246:56002 2260002 SURICATA Applayer Detect protocol only one direction Generic Protocol Command Decode
TCP 192.168.56.101:49164 -> 109.176.30.246:56002 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.101:49164 -> 109.176.30.246:56002 2260002 SURICATA Applayer Detect protocol only one direction Generic Protocol Command Decode
TCP 109.176.30.246:56002 -> 192.168.56.101:49164 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 109.176.30.246:56002 -> 192.168.56.101:49164 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 109.176.30.246:56002 -> 192.168.56.101:49164 2035595 ET MALWARE Generic AsyncRAT Style SSL Cert Domain Observed Used for C2 Detected
TCP 109.176.30.246:56002 -> 192.168.56.101:49165 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 109.176.30.246:56002 -> 192.168.56.101:49165 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 109.176.30.246:56002 -> 192.168.56.101:49165 2035595 ET MALWARE Generic AsyncRAT Style SSL Cert Domain Observed Used for C2 Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49165
109.176.30.246:56002
CN=Hfoqppvo CN=Hfoqppvo 21:78:ba:55:44:74:2f:b6:df:5e:ca:2b:c8:5e:52:be:4d:90:f0:65
TLSv1
192.168.56.101:49164
109.176.30.246:56002
CN=Hfoqppvo CN=Hfoqppvo 21:78:ba:55:44:74:2f:b6:df:5e:ca:2b:c8:5e:52:be:4d:90:f0:65

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: Remove-ItemProperty : Property svchost does not exist at path HKEY_CURRENT_USER
console_handle: 0x00000023
1 1 0

WriteConsoleW

buffer: \SOFTWARE\Microsoft\Windows\CurrentVersion\Run.
console_handle: 0x0000002f
1 1 0

WriteConsoleW

buffer: At line:1 char:20
console_handle: 0x0000003b
1 1 0

WriteConsoleW

buffer: + Remove-ItemProperty <<<< -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVers
console_handle: 0x00000047
1 1 0

WriteConsoleW

buffer: ion\Run' -Name 'svchost';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windo
console_handle: 0x00000053
1 1 0

WriteConsoleW

buffer: ws\CurrentVersion\Run' -Name 'svchost' -Value 'C:\Users\test22\AppData\Roaming\
console_handle: 0x0000005f
1 1 0

WriteConsoleW

buffer: svchost.exe' -PropertyType 'String'
console_handle: 0x0000006b
1 1 0

WriteConsoleW

buffer: + CategoryInfo : InvalidArgument: (svchost:String) [Remove-ItemPr
console_handle: 0x00000077
1 1 0

WriteConsoleW

buffer: operty], PSArgumentException
console_handle: 0x00000083
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : System.Management.Automation.PSArgumentException
console_handle: 0x0000008f
1 1 0

WriteConsoleW

buffer: ,Microsoft.PowerShell.Commands.RemoveItemPropertyCommand
console_handle: 0x0000009b
1 1 0

WriteConsoleW

buffer: PSPath : Microsoft.PowerShell.Core\Registry::HKEY_CURRENT_USER\SOFTWARE\M
console_handle: 0x000000b7
1 1 0

WriteConsoleW

buffer: icrosoft\Windows\CurrentVersion\Run
console_handle: 0x000000bb
1 1 0

WriteConsoleW

buffer: PSParentPath : Microsoft.PowerShell.Core\Registry::HKEY_CURRENT_USER\SOFTWARE\M
console_handle: 0x000000bf
1 1 0

WriteConsoleW

buffer: icrosoft\Windows\CurrentVersion
console_handle: 0x000000c3
1 1 0

WriteConsoleW

buffer: PSChildName : Run
console_handle: 0x000000c7
1 1 0

WriteConsoleW

buffer: PSDrive : HKCU
console_handle: 0x000000cb
1 1 0

WriteConsoleW

buffer: PSProvider : Microsoft.PowerShell.Core\Registry
console_handle: 0x000000cf
1 1 0

WriteConsoleW

buffer: svchost : C:\Users\test22\AppData\Roaming\svchost.exe
console_handle: 0x000000d3
1 1 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0058b110
flags: 0
crypto_export_handle: 0x00000000
blob_type: 8
1 1 0

CryptExportKey

buffer: f ‚¹çÕF- à<•¨QÕ×rç=|Ñ¥@†Ã}ТÛw
crypto_handle: 0x0058b110
flags: 0
crypto_export_handle: 0x00000000
blob_type: 8
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4618
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4e58
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4e58
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4e58
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4998
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4998
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4998
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4998
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4998
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4998
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4458
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4458
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4458
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4e58
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4e58
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4e58
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4d18
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4e58
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4e58
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4e58
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4e58
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4e58
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4e58
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4e58
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4598
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4598
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4598
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4598
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4598
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4598
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4598
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4598
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4598
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4598
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4598
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4598
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4598
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d4598
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d5218
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d5218
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d5218
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d5218
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d5218
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d5218
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d5218
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x003d5218
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 1310720
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00670000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00770000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x727a1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x727a2000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 524288
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x004c0000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00500000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003e2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00495000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0049b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00497000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0047c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00740000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00486000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003ea000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0048a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00487000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00741000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00742000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0047d000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 12288
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00743000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00746000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00747000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00748000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 327680
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef50000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef50000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef50000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef58000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef40000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7ef40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x021cf000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x021c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00749000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0074a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0047e000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0074b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x021c1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0074c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0047f000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0074d000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02230000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0074e000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x021c2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02370000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02371000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02231000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02372000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02373000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x021c3000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02374000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02375000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Roaming\svchost.exe
file C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk
cmdline "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'svchost';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'svchost' -Value '"C:\Users\test22\AppData\Roaming\svchost.exe"' -PropertyType 'String'
file C:\Users\test22\AppData\Roaming\svchost.exe
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2744
thread_handle: 0x000002d4
process_identifier: 2740
current_directory: C:\Users\test22\AppData\Local\Temp
filepath:
track: 1
command_line: "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'svchost';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'svchost' -Value '"C:\Users\test22\AppData\Roaming\svchost.exe"' -PropertyType 'String'
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
inherit_handles: 1
process_handle: 0x000002d8
1 1 0
section {u'size_of_data': u'0x00048600', u'virtual_address': u'0x00002000', u'entropy': 7.9962457507797655, u'name': u'.text', u'virtual_size': u'0x00048480'} entropy 7.99624575078 description A section with a high entropy has been found
entropy 0.993138936535 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
host 109.176.30.246
Time & API Arguments Status Return Repeated

NtQuerySystemInformation

information_class: 8 (SystemProcessorPerformanceInformation)
1 0 0
description svchost.exe tried to sleep 455603561 seconds, actually delayed analysis time by 455603561 seconds
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\svchost reg_value C:\Users\test22\AppData\Roaming\svchost.exe
file C:\Users\test22\AppData\Roaming\Electrum\wallets
Time & API Arguments Status Return Repeated

RegSetValueExW

key_handle: 0x000002e4
regkey_r: 7cbac6bda238c28e3fe350088c92ebf1
reg_type: 3 (REG_BINARY)
value: .°]P0øþ?ù Oø‘qø òã¿þ?‚ûg‚XyIݲ¯ÚM ÕîV¿9_ÙªO+êïãÍÖ ê¸3†0-_Zúé/ôæç¾zo» [óG¤‘@egÿc÷I´ÝV¾ð~\çñà[J®Ë˜ ‘›µÚKgãI*__+ƒX -Œ_Íß3òÐ-“ðáÔ Ï»·ÒF«Ü€(À¤Ø$™À$84€¢MADàÿd ݂ÅÄü0Ô¢ü¸t‘XîÁ¡çïœI;ï [0_|é Ÿ'÷‚¾SÀ=ò ‚8ä CÕ àÖîX&Ïò$²H›û`@Ý×ÐÆî‡3&(¯­sÈ€ýu\× º]¤ÃþIœ° Ó±Æà€±±&_À @û³ }O¿À(p°þÜFGQwΨàjÚMÔÎ  2£˜ ,ì]­¸ü3˜°U ¾³#‚Ýõ×ãplŽÀ_ð¿ò`Aõðàíj'³•»£€Nv³‡hnÎJfy?­ ~wtÀM¿|3*¨‡dΞF"ª¼žñN¢QUYAçO5Ê»!óôfW…ê1@(zU Õ Á* :Ha ‡g'*ôఎ’‘®Í#8ù‰œ~UëÆË;๶Ñ›~N‰° qöm†Ét¹—_Äÿ=ì_Ð¾ß ¥[ìžô~Œ«ª„ø•YÓ_ø¢gLɢͼ#0™Ç-y¨oÓ¸™uuEÓÞz|݋N—ˏzTØNX‹Í°û7Jíftg}<1{î“! ç ¾$ˆ>ŸÎ°'»^·Ô6Ô¸¾j5Ì5Ç{r³ëç¡oLNé’-yƒ\_~;ëҊ‚3°ÛgPۉ2×r¦ïäʆ, ˗ú`ÓÔ¥ Ï$÷Lìùã}ªþ“7ê  Ø£ â­¯/”ÐÎr“/‘}G–jGªlß%H­Ä×XûmÓ/(qýNÎщxtU¢» âUëe^È*}éðk`ŠÊ÷´X×Sؼ;ê76Ù[qu“çx˜•¦½õA±äˆµc8<\GV¿(ƒp‚õ??Ï?w°ýÐySËI¨7ÀUªnélÜ}Ò*%ӓ –âi2¬9Á±7¢¨êã%}Ôv°õ4«XñÿŸÇnÛèm`%Æ}“+“=ïô"s-Ä+frdòÄA ÉQ*ÑX2ˆ’~cªnž†öÓGÇ4ÙEç a ϟÉÍͲ ×d‡î:6XÑ%ƒ¾r)üY~ǝ„B¼Êá$Bç^S¢}5¡•]ܝ˜öä ÈD2´òê Üî›ÂÍûûÜ«&ÑÇÀ°$¨E¥)7LØ´OKØìƏg›/Æ)M¾áçUÛ½39jå¼ßz§[ÊЂ_<"ѐàW]ó·­Ëe‡ýӏù\Ô_ öGËÂTUáÎHC#ḕ Žã¾\ˆKòÍÊÃg2ÝDrøWŒjgF©Œ¤+fÞÂñGpc `™mÈļÈiŠ„ºèýV,ThShk¼îNçiVô!ÌsîØg›½®¥óz2 gYŪKzXõ5@–­ÊðÎ|@o°‰/XOXÁ].gu.±ð‡r^TÔÈý›f±ÁÐ?á?Ԉxóò5ȇŠ¿¦NÔ²±…?è’KÉÖ<~A=}žV Ê)j“ ’—#‘éJ‡ uêôûb>ºWcLö.žÈEó7´3ÙÏ9òÍ3rZ·:©úŽÖ“•{Ã-ãŽíf ŦpÑõT9ƒÖ1“d™÷˜T㳉›Ü†Bá æT5ü*P¹\±fÒ¸rnRa•ÜZ\–á7ä¼ÞÒ§©ˆ `Øx«î¡r-§°1’Ï.Âݜ+'™÷=@Ÿ‡)ur§b S+¯Âª›¿ä¬äà9¸ï2;¥9§„šœ)K¬ö˜®mæ»Md­Ï(ç¾¾ªÛ˜žò1 ŠÛ—Ž²bê2}¸áKì×¥¦^ Å&¬ÛP°»ØÜ©K̍Á}ݾØëÀ™oZAÏ{.…sZb+q>c0 ·8t‘¿Ï«\?å§Æõâ€TÐõÞü}›=k«ŽmÈIƒ ½¡ëgåýK‡˜òMÜ\äa ¶ù&Ú嵌ï.=i4yÅT” ¼ª5·%¸’J·I=ýÁá͹ù¸ûQ”]횮”a¼íK} jÝàóÖU˟ë%Ø#²Må‘É–h#*òÂ?Øè_¶˜7'™áÞÓjo«4bè>‡ø= !e›ý6Ð:wà@"¶ÊmJÕ¡hs§«iÆ´eØXßX§%ÃJ xMk(Ⳅ‰m|HEb‘ý–òÉR¶ÕU¯:˜^¿;ÇzÈ¢p”7ƒ,ÇÈz'2ÙíH\½o˜sàRÔdožÞ.&7+©é Öìáªëqp•ç™éAXS(¥ä´akÙÈ®…z.ԇŠiúo?X“ùŠa:rä<¾û§§VýàUÆ÷¯»H˜ž ò?Ӈº2?{!•_ó»“*7ã7cFƒ(Á™Å‡QëôP7ô©eV|S‰zºIT…—¼² ¶}Ù֎ 얒½o¥Ñ!OÊ£¾ˆKCÔúˆ¯°R·BpÈ]—™kìs;Òõ[V‘•]àÛM`þ1ƒàQ¨vÙ^¤x+Š™~h‘ ôiŽ+qü± TlaJ˜±€ÙŒxêÞÇpLÁ6à ǂýsmí"ª?]+ Ît &8êµ1(y[ÃÅi^Ïͽ7²Ÿa·h)ìI©3W¸u>s‚‰Û{‘Ò¿QĖƘ®YëHX|i­”?G֛TÀ9¢9v[ß²vwR³g¦ò;eGé}º_[­Gô/jpÕ͸r-qŒ è‡ +ŠÝÕÄßÇû¦®Î–Ø°¸RCa;ÑQÁ±DÍÍ[; }’ôª¬Â(ܽ<øywçFƃã0Ð ëî2 9ہ”9ÊEÜøŸ*°µ6Nc(Ûyù(­˜+j˜?µ¦×\ŒÆ>¥§£y݅èìX| )ÍМB¤ÏæiêL·•IÒÎE—SÁ2ÈÏ/_)5ÆÅÍâa|iIô¸ÁW_Dš¤˜%š\·øò"Þõø‡u ý h+¹ã‘wÖq€LC󬍖_‹òi½å%'bUÚÔ¢Ë×Ozu.Á%Rixjg892¤åŸJÆBkˆÈQ<ÃC)Ÿ)¡TÃWn*‚òƒ#âV¡švZhuαÚA⧶ÙH¯ï×äåFvEœŠ©xGÌ榠ðHŸ¢i‹'š¯!I¤Â168’ÀOP':­P“sZq[uîJÇu-蓾 çHTV‚€TËÍå{DØþÐfX`£ÊjžÕœE¹¾õ®âÚ`P{Š²¥Ìk1>ñ¨‚Ò°¢t:b°™‹~íÊ^ŽÖFãQÒ¢æP­1XUë?r± .<•'w÷ʖÛ> …ƒYî_…t/ÉäÚWBg¹4(Ã'"y¢’$ÛkW¯4ðclŠRmÎArå®Å×Ôj‹yÎ&ª9RÏE<¯‚°Ì4ÊÐ5 ×884M0n© º!JŸ4T01'êêÇt<Þ¿P…ñ÷ƒ©;¸µ`poíyªÖSöÝÌfýç2ÔàUË'âÇ"' ‡™!m•[¥Œ*Q4•µâóíús8à?îmâ6DöY3'_s••“šŸ‹Ý߆å=_xóõx_«™ÌaJ·YS`ÑLËOg¹ª-¤Á2eÅȬɈïK÷4*'pÔǤÝíe®ZU F­ˆÒ[{WiøIדô­wÃÑ=÷fu›ïéª}™¼ë‹mÐà¸dNêjû<©l«‹2ímˆÑvÅóԙâ‡cÁnwœ‘¡¼Iá­íƪK×Î5‘ªTƒI¨lsË6‚Ôk9ì™.»y;Ýodö•Ê‡*æãyr›¼ÁÑåg¾„™ï&›«#¢'œûîüûþçÜçœëûë®ûï¯å¾ºûzÞ©~µâ*1IdŒ!vk"ÙlöK$ì¨2È]“´ï²Co²d5,†YA’ʝc a‘ !o²f]”8ySíÈEßΰ»co nå{/|Ç{¼—=û”¯×µ÷Áãfúu°Á€Øë2¾ñhùƒ±ÉA·ÏÁؖӚ m]†ãxX@Vûê}«;ɞÁ¹ =W7df²ÈwµßüûWv»6†µœ«…ÓBù7­íŒ!‘óÄSºÆu”S1.N"áKÁ¸è^ŽÛS8ª%Ûkg8LקœØ=Ïx83hè#Մ{ã›NY;ùøël`|x@i3Y -µp$k*”†ÞccÌÿ’A»Ì6{»IÃ42‡oš–¼©ŠA…¾›äcÞÃzÍ@¦IfŽæEŒÅ숊,Ü?^~?GþWŠ6ÀÎÍþVΡ{ðÄM—ô,ЄWüªÛ²´óÆzÒH±HÚB¶Ñ IgM+‚s¯Ã{vэÊ-–ۀüðì€À·vÒ$Z‘V%”€…Š”N_ï-À¶áÕõð«/¹ü:Êu{˜øì }C‡¹œ(©ÞqKG“J¿ª:ëä—‹.ÒzÝ·<P;ð³:åҙ?æÜ Fa>ì *B•Ñz_’¤7ÖöøŽÉÃÈ°Áœ`‰Dóú€ý&’Ê9¯/€jî[=Zù9ƒFùc÷ƶ¦Ã&Ž`J¼š`Û \ó¿ˆLUü¥ïWp_ÚÖšìcÚQüJ¹åÐ ÇGe[%Šªäîý¾ +xgãð~ƒÆ%äAz5èñ:5®²ÄÊ/VedíÚLQePÝï{gõ‚‡z7£Tö5ð 9qm”| ÖÈF ÀŸkH‡Rp/G™Zj{ŽíT,F»—}æ¬|€-Èr'\‹é9O0‹fÖB]»Õ=n,Mí~ë¨\ɱ˜ÿó˜çÕçÆfÄO_†÷ˆã€:hf6íԗú­Zš<³IBôéÐ[³u¥e*£Q8 ZJ MîkÜÇæ»0ó=«—qcÂgûùG¡Ž×ûÅQî`ŒÊ±Ö~lõ˽?šŽ.‡1y֕Úr)Uæ®5ß>NŠ˜ñ²&[pAk?°ÜWÂ@eÙ¾c¤Z9±+¨ìx0ÛôˆFËÌ°$ì"Xô9…uϚ|¡éì¦ô\ÖFJM]*¹N@"5Û?Øp@¶ÏƒÒ@&f5bT?äµà5†wÀðrÅó̼hw#êÏDðÃ7â ¦Ô6ìKÐfððñvRó¾ýÐz€¼œúÓçðÑ%™ò‹Šê•s0µGйº«äÿX7+f ‹ì.ãÅh:eo”ÊÒ®6ذ齡‚ŽÍ WÏ@ÞLŽ-N‡Ë–ù¿õz!Žƒ5<šœyÿ˜pZY櫬x:¼i·4ÿ1œÂ
regkey: HKEY_CURRENT_USER\Software\1FDE2DAF8E72D9C8F9D38AAACA325288\7cbac6bda238c28e3fe350088c92ebf1
1 0 0
file C:\Users\test22\AppData\Roaming\Exodus\exodus.wallet
file C:\Windows\System32\ie4uinit.exe
file C:\Program Files\Windows Sidebar\sidebar.exe
file C:\Windows\System32\WindowsAnytimeUpgradeUI.exe
file C:\Windows\System32\xpsrchvw.exe
file C:\Windows\System32\displayswitch.exe
file C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe
file C:\Windows\System32\mblctr.exe
file C:\Windows\System32\mstsc.exe
file C:\Windows\System32\SnippingTool.exe
file C:\Windows\System32\SoundRecorder.exe
file C:\Windows\System32\dfrgui.exe
file C:\Windows\System32\msinfo32.exe
file C:\Windows\System32\rstrui.exe
file C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe
file C:\Program Files\Windows Journal\Journal.exe
file C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
file C:\Windows\System32\MdSched.exe
file C:\Windows\System32\msconfig.exe
file C:\Windows\System32\recdisc.exe
file C:\Windows\System32\msra.exe
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Crysan.m!c
tehtris Generic.Malware
Skyhigh BehavesLike.Win32.Generic.dc
ALYac Gen:Variant.Lazy.577533
Cylance Unsafe
VIPRE Gen:Variant.Lazy.577533
Sangfor Backdoor.Msil.Lazy.Vms3
CrowdStrike win/malicious_confidence_100% (W)
BitDefender Gen:Variant.Lazy.577533
K7GW Trojan ( 005b82991 )
K7AntiVirus Trojan ( 005b82991 )
Arcabit Trojan.Lazy.D8CFFD
VirIT Trojan.Win32.MSIL_Heur.A
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of MSIL/Kryptik.AMFY
APEX Malicious
Avast Win32:BackdoorX-gen [Trj]
Kaspersky HEUR:Backdoor.MSIL.Crysan.gen
Alibaba Backdoor:MSIL/PureLogStealer.590fd798
NANO-Antivirus Trojan.Win32.Kryptik.kquqex
MicroWorld-eScan Gen:Variant.Lazy.577533
Rising Malware.Obfus/MSIL@AI.92 (RDM.MSIL2:erkSk4ah+vxzNHYJuF9gQw)
Emsisoft Gen:Variant.Lazy.577533 (B)
F-Secure Trojan.TR/Dropper.Gen
DrWeb Trojan.Siggen29.14627
Zillya Trojan.Kryptik.Win32.4850139
TrendMicro TROJ_GEN.R002C0DHC24
McAfeeD Real Protect-LS!254DD8394172
CTX exe.unknown.lazy
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
FireEye Generic.mg.254dd83941729a0e
Google Detected
Avira TR/Dropper.Gen
Kingsoft malware.kb.c.1000
Microsoft Trojan:MSIL/PureLogStealer.RNAA!MTB
ZoneAlarm HEUR:Backdoor.MSIL.Crysan.gen
GData Gen:Variant.Lazy.577533
Varist W32/MSIL_Kryptik.LKA.gen!Eldorado
AhnLab-V3 Trojan/Win.Generic.C5648812
McAfee Artemis!254DD8394172
DeepInstinct MALICIOUS
VBA32 TScope.Trojan.MSIL
Malwarebytes Trojan.Crypt.MSIL.Generic
Ikarus Trojan.MSIL.Crypt
Panda Trj/GdSda.A
TrendMicro-HouseCall TROJ_GEN.R002C0DHC24
Tencent Malware.Win32.Gencirc.141604e0