Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AlCsIOd0pd.exe

Overview

General Information

Sample name:AlCsIOd0pd.exe
renamed because original name is a hash value
Original sample name:de584dd4970a8099454611ee0c739ea8.exe
Analysis ID:1460268
MD5:de584dd4970a8099454611ee0c739ea8
SHA1:f22fe3bfb22b55d1f0dc2fd802a32d2beb157e0b
SHA256:d0eff53cfd30f061451987b4e98205d81f9495e8f26def46aec15f7a4c171c20
Tags:exeRiseProStealer
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected RisePro Stealer
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject threads in other processes
Found stalling execution ending in API Sleep call
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to evade debugger and weak emulator (self modifying code)
Uses schtasks.exe or at.exe to add and modify task schedules
Contains capabilities to detect virtual machines
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (date check)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • AlCsIOd0pd.exe (PID: 4852 cmdline: "C:\Users\user\Desktop\AlCsIOd0pd.exe" MD5: DE584DD4970A8099454611EE0C739EA8)
    • schtasks.exe (PID: 1900 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 4304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 2004 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • MPGPH131.exe (PID: 5644 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: DE584DD4970A8099454611EE0C739EA8)
  • MPGPH131.exe (PID: 5740 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: DE584DD4970A8099454611EE0C739EA8)
  • RageMP131.exe (PID: 3720 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: DE584DD4970A8099454611EE0C739EA8)
  • RageMP131.exe (PID: 4460 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: DE584DD4970A8099454611EE0C739EA8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: AlCsIOd0pd.exe PID: 4852JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    Process Memory Space: MPGPH131.exe PID: 5644JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      Process Memory Space: MPGPH131.exe PID: 5740JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        Process Memory Space: RageMP131.exe PID: 3720JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
          Process Memory Space: RageMP131.exe PID: 4460JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\AlCsIOd0pd.exe, ProcessId: 4852, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131
            Timestamp:06/20/24-18:18:46.029864
            SID:2046269
            Source Port:49741
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:16:18.111786
            SID:2049060
            Source Port:49731
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:18:43.639253
            SID:2046269
            Source Port:49732
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:18:46.029916
            SID:2046269
            Source Port:49735
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:18:45.967425
            SID:2046269
            Source Port:49731
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:16:22.687972
            SID:2046266
            Source Port:58709
            Destination Port:49732
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:16:40.743118
            SID:2046266
            Source Port:58709
            Destination Port:49741
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:16:18.693887
            SID:2046266
            Source Port:58709
            Destination Port:49731
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:16:22.714525
            SID:2046266
            Source Port:58709
            Destination Port:49733
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:18:43.701803
            SID:2046269
            Source Port:49733
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:16:34.458767
            SID:2046266
            Source Port:58709
            Destination Port:49735
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeReversingLabs: Detection: 63%
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeReversingLabs: Detection: 63%
            Source: AlCsIOd0pd.exeReversingLabs: Detection: 63%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJoe Sandbox ML: detected
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeJoe Sandbox ML: detected
            Source: AlCsIOd0pd.exeJoe Sandbox ML: detected
            Source: AlCsIOd0pd.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00431F9C FindClose,FindFirstFileExW,GetLastError,0_2_00431F9C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00431F9C FindClose,FindFirstFileExW,GetLastError,5_2_00431F9C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00431F9C FindClose,FindFirstFileExW,GetLastError,6_2_00431F9C

            Networking

            barindex
            Source: TrafficSnort IDS: 2049060 ET TROJAN RisePro TCP Heartbeat Packet 192.168.2.4:49731 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49731
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49731 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49732
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49733
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49732 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49733 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49735
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49735 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49741
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49741 -> 77.91.77.66:58709
            Source: global trafficTCP traffic: 77.91.77.66 ports 0,5,7,8,58709,9
            Source: global trafficTCP traffic: 192.168.2.4:49731 -> 77.91.77.66:58709
            Source: Joe Sandbox ViewIP Address: 77.91.77.66 77.91.77.66
            Source: Joe Sandbox ViewASN Name: FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00409280 recv,GetProcAddress,GetModuleHandleA,GetProcAddress,WSASend,0_2_00409280
            Source: AlCsIOd0pd.exe, 00000000.00000003.1748570602.0000000000CD0000.00000004.00001000.00020000.00000000.sdmp, AlCsIOd0pd.exe, 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000003.1783897542.0000000002850000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000003.1784572733.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3251444322.000000000055D000.00000002.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000003.1896625468.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.1976471958.0000000002840000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3251481803.000000000055D000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
            Source: MPGPH131.exeString found in binary or memory: https://ipinfo.io/
            Source: AlCsIOd0pd.exe, 00000000.00000003.1748570602.0000000000CD0000.00000004.00001000.00020000.00000000.sdmp, AlCsIOd0pd.exe, 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000003.1783897542.0000000002850000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000003.1784572733.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3251444322.000000000055D000.00000002.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000003.1896625468.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.1976471958.0000000002840000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3251481803.000000000055D000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
            Source: AlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D1E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3255069543.0000000000CED000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3253912060.0000000000C37000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3253787477.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3253822490.0000000000E38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
            Source: AlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D1E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTB
            Source: RageMP131.exe, 00000007.00000002.3253787477.0000000000D3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTX
            Source: MPGPH131.exe, 00000006.00000002.3253912060.0000000000C37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORToE
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address

            System Summary

            barindex
            Source: AlCsIOd0pd.exeStatic PE information: section name:
            Source: AlCsIOd0pd.exeStatic PE information: section name:
            Source: AlCsIOd0pd.exeStatic PE information: section name:
            Source: AlCsIOd0pd.exeStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_0043C9600_2_0043C960
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_0043A9280_2_0043A928
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_004371A00_2_004371A0
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_0044DA860_2_0044DA86
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_0044036F0_2_0044036F
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00458BB00_2_00458BB0
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_004EFC400_2_004EFC40
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_0042F5800_2_0042F580
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_004526100_2_00452610
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_004F2FD00_2_004F2FD0
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_004547BF0_2_004547BF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_0043C9605_2_0043C960
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_0043A9285_2_0043A928
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_004371A05_2_004371A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_0044DA865_2_0044DA86
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_0044036F5_2_0044036F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00458BB05_2_00458BB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_004EFC405_2_004EFC40
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_0042F5805_2_0042F580
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_004526105_2_00452610
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_004F2FD05_2_004F2FD0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_004547BF5_2_004547BF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0043C9606_2_0043C960
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0043A9286_2_0043A928
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004371A06_2_004371A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0044DA866_2_0044DA86
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0044036F6_2_0044036F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00458BB06_2_00458BB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004EFC406_2_004EFC40
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0042F5806_2_0042F580
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004526106_2_00452610
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004F2FD06_2_004F2FD0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004547BF6_2_004547BF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: String function: 00434380 appears 48 times
            Source: AlCsIOd0pd.exeBinary or memory string: OriginalFilename vs AlCsIOd0pd.exe
            Source: AlCsIOd0pd.exe, 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedotnet.exe6 vs AlCsIOd0pd.exe
            Source: AlCsIOd0pd.exe, 00000000.00000000.1745421628.000000000058A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedotnet.exe6 vs AlCsIOd0pd.exe
            Source: AlCsIOd0pd.exeBinary or memory string: OriginalFilenamedotnet.exe6 vs AlCsIOd0pd.exe
            Source: AlCsIOd0pd.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: AlCsIOd0pd.exeStatic PE information: Section: ZLIB complexity 0.9988486351431981
            Source: AlCsIOd0pd.exeStatic PE information: Section: ZLIB complexity 0.9942874765037594
            Source: AlCsIOd0pd.exeStatic PE information: Section: ZLIB complexity 0.98974609375
            Source: AlCsIOd0pd.exeStatic PE information: Section: .reloc ZLIB complexity 1.5
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9988486351431981
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9942874765037594
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.98974609375
            Source: RageMP131.exe.0.drStatic PE information: Section: .reloc ZLIB complexity 1.5
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9988486351431981
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9942874765037594
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.98974609375
            Source: MPGPH131.exe.0.drStatic PE information: Section: .reloc ZLIB complexity 1.5
            Source: classification engineClassification label: mal100.troj.evad.winEXE@11/5@0/1
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeFile created: C:\Users\user\AppData\Local\RageMP131Jump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4304:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6128:120:WilError_03
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeFile created: C:\Users\user\AppData\Local\Temp\rage131MP.tmpJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: AlCsIOd0pd.exe, 00000000.00000003.1748570602.0000000000CD0000.00000004.00001000.00020000.00000000.sdmp, AlCsIOd0pd.exe, 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000003.1783897542.0000000002850000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000003.1784572733.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3251444322.000000000055D000.00000002.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000003.1896625468.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.1976471958.0000000002840000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3251481803.000000000055D000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: AlCsIOd0pd.exe, 00000000.00000003.1748570602.0000000000CD0000.00000004.00001000.00020000.00000000.sdmp, AlCsIOd0pd.exe, 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000003.1783897542.0000000002850000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000003.1784572733.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3251444322.000000000055D000.00000002.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000003.1896625468.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.1976471958.0000000002840000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3251481803.000000000055D000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: AlCsIOd0pd.exeReversingLabs: Detection: 63%
            Source: AlCsIOd0pd.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeFile read: C:\Users\user\Desktop\AlCsIOd0pd.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\AlCsIOd0pd.exe "C:\Users\user\Desktop\AlCsIOd0pd.exe"
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: AlCsIOd0pd.exeStatic file information: File size 3259920 > 1048576
            Source: AlCsIOd0pd.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x264600
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,0_2_004CF280
            Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
            Source: AlCsIOd0pd.exeStatic PE information: section name:
            Source: AlCsIOd0pd.exeStatic PE information: section name:
            Source: AlCsIOd0pd.exeStatic PE information: section name:
            Source: AlCsIOd0pd.exeStatic PE information: section name:
            Source: AlCsIOd0pd.exeStatic PE information: section name: .themida
            Source: AlCsIOd0pd.exeStatic PE information: section name: .boot
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .themida
            Source: RageMP131.exe.0.drStatic PE information: section name: .boot
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .themida
            Source: MPGPH131.exe.0.drStatic PE information: section name: .boot
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00598B86 push 677583F0h; mov dword ptr [esp], ecx0_2_00873ADB
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00598B86 push edx; mov dword ptr [esp], 7E9A49CCh0_2_00873B0A
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00598B86 push 0EDD01E1h; mov dword ptr [esp], ecx0_2_00873B1D
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00433F59 push ecx; ret 0_2_00433F6C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00598B86 push 677583F0h; mov dword ptr [esp], ecx5_2_00873ADB
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00598B86 push edx; mov dword ptr [esp], 7E9A49CCh5_2_00873B0A
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00598B86 push 0EDD01E1h; mov dword ptr [esp], ecx5_2_00873B1D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00433F59 push ecx; ret 5_2_00433F6C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00598B86 push 677583F0h; mov dword ptr [esp], ecx6_2_00873ADB
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00598B86 push edx; mov dword ptr [esp], 7E9A49CCh6_2_00873B0A
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00598B86 push 0EDD01E1h; mov dword ptr [esp], ecx6_2_00873B1D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00433F59 push ecx; ret 6_2_00433F6C
            Source: AlCsIOd0pd.exeStatic PE information: section name: entropy: 7.980197821543003
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.980197821543003
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.980197821543003
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeFile created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJump to dropped file
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeStalling execution: Execution stalls by calling Sleepgraph_0-13659
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeStalling execution: Execution stalls by calling Sleepgraph_5-13659
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSpecial instruction interceptor: First address: 625E3C instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 625E3C instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 625E3C instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeWindow / User API: threadDelayed 3495Jump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeWindow / User API: threadDelayed 6379Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 9806Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 9807Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 9782Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 9885Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_5-13659
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-13659
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-16262
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_5-16262
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exe TID: 3084Thread sleep count: 3495 > 30Jump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exe TID: 3084Thread sleep time: -352995s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exe TID: 3084Thread sleep count: 6379 > 30Jump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exe TID: 3084Thread sleep time: -644279s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1376Thread sleep count: 78 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1376Thread sleep count: 9806 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1376Thread sleep time: -990406s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5436Thread sleep count: 74 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5436Thread sleep count: 9807 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5436Thread sleep time: -990507s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1896Thread sleep count: 101 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1896Thread sleep count: 9782 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1896Thread sleep time: -987982s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4520Thread sleep count: 9885 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4520Thread sleep time: -998385s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00431F9C FindClose,FindFirstFileExW,GetLastError,0_2_00431F9C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00431F9C FindClose,FindFirstFileExW,GetLastError,5_2_00431F9C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00431F9C FindClose,FindFirstFileExW,GetLastError,6_2_00431F9C
            Source: AlCsIOd0pd.exe, 00000000.00000003.1768008425.0000000000D81000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}|
            Source: AlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D81000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}i
            Source: RageMP131.exe, 0000000B.00000002.3253822490.0000000000E30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
            Source: MPGPH131.exe, 00000006.00000002.3253912060.0000000000C7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllU
            Source: MPGPH131.exe, 00000005.00000002.3255069543.0000000000D3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}@_
            Source: MPGPH131.exe, 00000006.00000002.3253912060.0000000000C7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}M81
            Source: AlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D6A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}-K
            Source: RageMP131.exe, 0000000B.00000003.1988485374.0000000000E97000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: MPGPH131.exe, 00000005.00000002.3255069543.0000000000CED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&m
            Source: AlCsIOd0pd.exe, 00000000.00000003.1768008425.0000000000D81000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}]
            Source: RageMP131.exe, 00000007.00000002.3253787477.0000000000D3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__orpo
            Source: MPGPH131.exe, 00000005.00000002.3255069543.0000000000CED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}t #7NVD slot #7
            Source: AlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D6A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000%
            Source: RageMP131.exe, 00000007.00000002.3253787477.0000000000D8F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll4
            Source: MPGPH131.exe, 00000006.00000002.3253912060.0000000000C56000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}>jD
            Source: RageMP131.exe, 00000007.00000002.3253787477.0000000000D8B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}yj
            Source: AlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D3F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_BEB2C06B
            Source: MPGPH131.exe, 00000005.00000003.1808009410.0000000000D51000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}O
            Source: RageMP131.exe, 0000000B.00000003.1988485374.0000000000E97000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RageMP131.exe, 0000000B.00000002.3253822490.0000000000E7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll=
            Source: AlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D1E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}NVD slot #44NVD slot #44
            Source: AlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D1E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} slot #34
            Source: AlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D6A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3255069543.0000000000D3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00438A64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00438A64
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,0_2_004CF280
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00438A64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00438A64
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_0043451D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0043451D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00438A64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00438A64
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_0043451D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0043451D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00438A64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00438A64
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0043451D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_0043451D

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,0_2_004CF280
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,5_2_004CF280
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,6_2_004CF280
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: GetLocaleInfoW,0_2_004531CA
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: EnumSystemLocalesW,0_2_0044B1B1
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_004532F3
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00452B5A
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: GetLocaleInfoW,0_2_004533F9
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_004534CF
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: GetLocaleInfoW,0_2_00452D5F
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: EnumSystemLocalesW,0_2_00452E51
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: EnumSystemLocalesW,0_2_00452E06
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: EnumSystemLocalesW,0_2_00452EEC
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00452F77
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: GetLocaleInfoW,0_2_0044B734
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,5_2_004531CA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,5_2_0044B1B1
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,5_2_004532F3
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,5_2_00452B5A
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,5_2_004533F9
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,5_2_004534CF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,5_2_00452D5F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,5_2_00452E51
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,5_2_00452E06
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,5_2_00452EEC
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,5_2_00452F77
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,5_2_0044B734
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,6_2_004531CA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,6_2_0044B1B1
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,6_2_004532F3
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,6_2_00452B5A
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,6_2_004533F9
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,6_2_004534CF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,6_2_00452D5F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,6_2_00452E51
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,6_2_00452E06
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,6_2_00452EEC
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,6_2_00452F77
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,6_2_0044B734
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_0043361D GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,0_2_0043361D
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: AlCsIOd0pd.exe PID: 4852, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 5644, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 5740, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 3720, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 4460, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: AlCsIOd0pd.exe PID: 4852, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 5644, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 5740, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 3720, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 4460, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Command and Scripting Interpreter
            1
            Scheduled Task/Job
            11
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Scheduled Task/Job
            1
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            12
            Virtualization/Sandbox Evasion
            LSASS Memory421
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts2
            Native API
            1
            DLL Side-Loading
            1
            Registry Run Keys / Startup Folder
            11
            Process Injection
            Security Account Manager12
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
            Obfuscated Files or Information
            LSA Secrets1
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Software Packing
            Cached Domain Credentials123
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1460268 Sample: AlCsIOd0pd.exe Startdate: 20/06/2024 Architecture: WINDOWS Score: 100 36 Snort IDS alert for network traffic 2->36 38 Multi AV Scanner detection for submitted file 2->38 40 Yara detected RisePro Stealer 2->40 42 4 other signatures 2->42 7 AlCsIOd0pd.exe 1 9 2->7         started        12 MPGPH131.exe 2 2->12         started        14 RageMP131.exe 2 2->14         started        16 2 other processes 2->16 process3 dnsIp4 34 77.91.77.66, 49731, 49732, 49733 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 7->34 26 C:\Users\user\AppData\Local\...\RageMP131.exe, PE32 7->26 dropped 28 C:\ProgramData\MPGPH131\MPGPH131.exe, PE32 7->28 dropped 30 C:\Users\...\RageMP131.exe:Zone.Identifier, ASCII 7->30 dropped 32 C:\...\MPGPH131.exe:Zone.Identifier, ASCII 7->32 dropped 44 Query firmware table information (likely to detect VMs) 7->44 46 Found stalling execution ending in API Sleep call 7->46 48 Contains functionality to inject threads in other processes 7->48 50 Uses schtasks.exe or at.exe to add and modify task schedules 7->50 18 schtasks.exe 1 7->18         started        20 schtasks.exe 1 7->20         started        52 Multi AV Scanner detection for dropped file 12->52 54 Machine Learning detection for dropped file 12->54 56 Tries to evade debugger and weak emulator (self modifying code) 12->56 58 Tries to detect sandboxes / dynamic malware analysis system (registry check) 14->58 file5 signatures6 process7 process8 22 conhost.exe 18->22         started        24 conhost.exe 20->24         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            AlCsIOd0pd.exe63%ReversingLabsWin32.Trojan.RiseProStealer
            AlCsIOd0pd.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe63%ReversingLabsWin32.Trojan.RiseProStealer
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe63%ReversingLabsWin32.Trojan.RiseProStealer
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://ipinfo.io/0%URL Reputationsafe
            https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
            http://www.winimage.com/zLibDll0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORTX0%Avira URL Cloudsafe
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
            https://www.maxmind.com/en/locate-my-ip-address0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORTB0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORToE0%Avira URL Cloudsafe
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllAlCsIOd0pd.exe, 00000000.00000003.1748570602.0000000000CD0000.00000004.00001000.00020000.00000000.sdmp, AlCsIOd0pd.exe, 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000003.1783897542.0000000002850000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000003.1784572733.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3251444322.000000000055D000.00000002.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000003.1896625468.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.1976471958.0000000002840000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3251481803.000000000055D000.00000002.00000001.01000000.00000005.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://t.me/RiseProSUPPORTXRageMP131.exe, 00000007.00000002.3253787477.0000000000D3E000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.winimage.com/zLibDllAlCsIOd0pd.exe, 00000000.00000003.1748570602.0000000000CD0000.00000004.00001000.00020000.00000000.sdmp, AlCsIOd0pd.exe, 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000003.1783897542.0000000002850000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000003.1784572733.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3251444322.000000000055D000.00000002.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000003.1896625468.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.1976471958.0000000002840000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3251481803.000000000055D000.00000002.00000001.01000000.00000005.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://t.me/RiseProSUPPORTAlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D1E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3255069543.0000000000CED000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3253912060.0000000000C37000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3253787477.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3253822490.0000000000E38000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ipinfo.io/MPGPH131.exefalse
            • URL Reputation: safe
            unknown
            https://t.me/RiseProSUPPORTBAlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D1E000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://t.me/RiseProSUPPORToEMPGPH131.exe, 00000006.00000002.3253912060.0000000000C37000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.maxmind.com/en/locate-my-ip-addressMPGPH131.exefalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            77.91.77.66
            unknownRussian Federation
            42861FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRUtrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1460268
            Start date and time:2024-06-20 18:15:16 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 8m 22s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:13
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:AlCsIOd0pd.exe
            renamed because original name is a hash value
            Original Sample Name:de584dd4970a8099454611ee0c739ea8.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@11/5@0/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:Failed
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report creation exceeded maximum time and may have missing disassembly code information.
            • VT rate limit hit for: AlCsIOd0pd.exe
            TimeTypeDescription
            12:16:49API Interceptor331415x Sleep call for process: AlCsIOd0pd.exe modified
            12:16:53API Interceptor593250x Sleep call for process: MPGPH131.exe modified
            12:17:05API Interceptor410683x Sleep call for process: RageMP131.exe modified
            17:16:18Task SchedulerRun new task: MPGPH131 HR path: C:\ProgramData\MPGPH131\MPGPH131.exe
            17:16:18Task SchedulerRun new task: MPGPH131 LG path: C:\ProgramData\MPGPH131\MPGPH131.exe
            17:16:21AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
            17:16:29AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            77.91.77.66setup.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              D44CPdpkNk.exeGet hashmaliciousRisePro StealerBrowse
                WGEfBWbWQI.exeGet hashmaliciousRisePro StealerBrowse
                  2bT2lTwRku.exeGet hashmaliciousRisePro StealerBrowse
                    T17sbXrL3i.exeGet hashmaliciousRisePro StealerBrowse
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRUsetup.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                      • 77.91.77.81
                      setup.exeGet hashmaliciousPython Stealer, Amadey, Monster Stealer, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                      • 77.91.77.81
                      FN MultiHack v2.exeGet hashmaliciousRedLineBrowse
                      • 77.91.77.6
                      D44CPdpkNk.exeGet hashmaliciousRisePro StealerBrowse
                      • 77.91.77.66
                      https://drive.google.com/file/d/1SCCeBL3Md8Sct7wQF5bfbtLysFqXCW6y/view?ts=667387acGet hashmaliciousUnknownBrowse
                      • 77.91.77.5
                      https://drive.google.com/file/d/1SCCeBL3Md8Sct7wQF5bfbtLysFqXCW6y/view?ts=667387acGet hashmaliciousUnknownBrowse
                      • 77.91.77.5
                      WGEfBWbWQI.exeGet hashmaliciousRisePro StealerBrowse
                      • 77.91.77.66
                      2bT2lTwRku.exeGet hashmaliciousRisePro StealerBrowse
                      • 77.91.77.66
                      T17sbXrL3i.exeGet hashmaliciousRisePro StealerBrowse
                      • 77.91.77.66
                      2022and2023TaxDocuments.zipGet hashmaliciousRemcosBrowse
                      • 77.91.77.107
                      No context
                      No context
                      Process:C:\Users\user\Desktop\AlCsIOd0pd.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):3259920
                      Entropy (8bit):7.966792574709497
                      Encrypted:false
                      SSDEEP:98304:t+VDlD+ah2X5f2CiioP8peU/Ju4+iU2lfOZy81+1l:AnZYuTcRxuZiUiW9+1l
                      MD5:DE584DD4970A8099454611EE0C739EA8
                      SHA1:F22FE3BFB22B55D1F0DC2FD802A32D2BEB157E0B
                      SHA-256:D0EFF53CFD30F061451987B4E98205D81F9495E8F26DEF46AEC15F7A4C171C20
                      SHA-512:58470AB84C35022860036CB5DFDCCEC9BB1F1EBEA37E4745EFC70C464E2FFB9B9835A1251CDF76C012F56DD0A72A4D448B0AC298DA02F4676EBCCCC03B2A0B76
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      • Antivirus: ReversingLabs, Detection: 63%
                      Reputation:low
                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L....iLf...............'.....|......X.X...........@..........................`~......W2......................................a..........8....................P~..............................p...............................6..@................... ........................... ..` 2~..........................@..@ 0I...P......................@....rsrc...8...........................@..@ X........r..................@..B.idata.......`.......r..............@....tls.........p.......v...................themida..>..........x..............`....boot....F&...X..F&..x..............`..`.reloc.......P~.......1................@................................................................
                      Process:C:\Users\user\Desktop\AlCsIOd0pd.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview:[ZoneTransfer]....ZoneId=0
                      Process:C:\Users\user\Desktop\AlCsIOd0pd.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):3259920
                      Entropy (8bit):7.966792574709497
                      Encrypted:false
                      SSDEEP:98304:t+VDlD+ah2X5f2CiioP8peU/Ju4+iU2lfOZy81+1l:AnZYuTcRxuZiUiW9+1l
                      MD5:DE584DD4970A8099454611EE0C739EA8
                      SHA1:F22FE3BFB22B55D1F0DC2FD802A32D2BEB157E0B
                      SHA-256:D0EFF53CFD30F061451987B4E98205D81F9495E8F26DEF46AEC15F7A4C171C20
                      SHA-512:58470AB84C35022860036CB5DFDCCEC9BB1F1EBEA37E4745EFC70C464E2FFB9B9835A1251CDF76C012F56DD0A72A4D448B0AC298DA02F4676EBCCCC03B2A0B76
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      • Antivirus: ReversingLabs, Detection: 63%
                      Reputation:low
                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L....iLf...............'.....|......X.X...........@..........................`~......W2......................................a..........8....................P~..............................p...............................6..@................... ........................... ..` 2~..........................@..@ 0I...P......................@....rsrc...8...........................@..@ X........r..................@..B.idata.......`.......r..............@....tls.........p.......v...................themida..>..........x..............`....boot....F&...X..F&..x..............`..`.reloc.......P~.......1................@................................................................
                      Process:C:\Users\user\Desktop\AlCsIOd0pd.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview:[ZoneTransfer]....ZoneId=0
                      Process:C:\Users\user\Desktop\AlCsIOd0pd.exe
                      File Type:ASCII text, with no line terminators
                      Category:modified
                      Size (bytes):13
                      Entropy (8bit):2.8731406795131336
                      Encrypted:false
                      SSDEEP:3:L1VRXxn:TRXxn
                      MD5:2D8F5D015AFD07E66F8F107CA36CCB48
                      SHA1:FD9059874E9195951B8F1BEC90C2006B3263A6C9
                      SHA-256:6C8364F8F9303EAE139976F9FDA7A9231F560D1173BBD4CC8C6A0269CCBB555D
                      SHA-512:EBAE6B06D775C9BC8DFCDA058DE1DD41784C074409D2D17DBB399037E5635F3C7993E8670F64376AA8FCDAF5795FBF152134C3C356FF37E5070C1648306FD722
                      Malicious:false
                      Reputation:low
                      Preview:1718904293224
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.966792574709497
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:AlCsIOd0pd.exe
                      File size:3'259'920 bytes
                      MD5:de584dd4970a8099454611ee0c739ea8
                      SHA1:f22fe3bfb22b55d1f0dc2fd802a32d2beb157e0b
                      SHA256:d0eff53cfd30f061451987b4e98205d81f9495e8f26def46aec15f7a4c171c20
                      SHA512:58470ab84c35022860036cb5dfdccec9bb1f1ebea37e4745efc70c464e2ffb9b9835a1251cdf76c012f56dd0a72a4d448b0ac298da02f4676ebcccc03b2a0b76
                      SSDEEP:98304:t+VDlD+ah2X5f2CiioP8peU/Ju4+iU2lfOZy81+1l:AnZYuTcRxuZiUiW9+1l
                      TLSH:94E533201ED31790C1B713F6AE7B2D1A1B43F26A51B47D20812F7ED9D9AE21C6BD506C
                      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s...../.s
                      Icon Hash:8596a1a0a1a1b171
                      Entrypoint:0x980058
                      Entrypoint Section:.boot
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:TERMINAL_SERVER_AWARE
                      Time Stamp:0x664C6914 [Tue May 21 09:27:48 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:63814aaf116ba6abb6496ce4bcad24c6
                      Instruction
                      call 00007FD0F11318A0h
                      push ebx
                      mov ebx, esp
                      push ebx
                      mov esi, dword ptr [ebx+08h]
                      mov edi, dword ptr [ebx+10h]
                      cld
                      mov dl, 80h
                      mov al, byte ptr [esi]
                      inc esi
                      mov byte ptr [edi], al
                      inc edi
                      mov ebx, 00000002h
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      jnc 00007FD0F113173Ch
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      jnc 00007FD0F11317A3h
                      xor eax, eax
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      jnc 00007FD0F1131837h
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      adc eax, eax
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      adc eax, eax
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      adc eax, eax
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      adc eax, eax
                      je 00007FD0F113175Ah
                      push edi
                      mov eax, eax
                      sub edi, eax
                      mov al, byte ptr [edi]
                      pop edi
                      mov byte ptr [edi], al
                      inc edi
                      mov ebx, 00000002h
                      jmp 00007FD0F11316EBh
                      mov eax, 00000001h
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      adc eax, eax
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      jc 00007FD0F113173Ch
                      sub eax, ebx
                      mov ebx, 00000001h
                      jne 00007FD0F113177Ah
                      mov ecx, 00000001h
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      adc ecx, ecx
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      jc 00007FD0F113173Ch
                      push esi
                      mov esi, edi
                      sub esi, ebp
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x19618b0x184.idata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x18a0000x1638.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e50000x10.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x1970180x18.tls
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x18369c0x40
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      0x10000x15bbc80x9d20072be48f03fa29b125860aa4b7040515fFalse0.9988486351431981data7.980197821543003IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      0x15d0000x27e320x10a00632b628419d20fc973bcfda8cff5f3beFalse0.9942874765037594data7.949044417592158IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      0x1850000x49300x80013c7d36a38dc58d8a970d8d422275803False0.98974609375OpenPGP Public Key7.765144396837099IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x18a0000x16380x1800fe6f3fdb9e7e97cba92d8ce4e4fcc95bFalse0.7220052083333334data6.54017046361188IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      0x18c0000x98580x720096fc680932cb7019c6055702e4e238e3False0.9789953399122807data7.930725168164811IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      .idata0x1960000x10000x4001b20e07443fa333ff9692026d1e6c6c2False0.3984375data3.42439969016873IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .tls0x1970000x10000x20054a50a058e0f3b6aa2fe1b22e2033106False0.056640625data0.18120187678200297IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .themida0x1980000x3e80000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .boot0x5800000x2646000x26460053baa03dffef8344a9262941737c70c7unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .reloc0x7e50000x10000x10f5bc99b71bad9e8a775cc32747e3ca58False1.5GLS_BINARY_LSB_FIRST2.474601752714581IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0x18a4400x1060PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia0.8838263358778626
                      RT_GROUP_ICON0x18b4a00x14dataRussianRussia1.05
                      RT_VERSION0x18a1300x310dataRussianRussia0.45408163265306123
                      RT_MANIFEST0x18b4b80x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                      DLLImport
                      kernel32.dllGetModuleHandleA
                      USER32.dllwsprintfA
                      GDI32.dllCreateCompatibleBitmap
                      ADVAPI32.dllRegQueryValueExA
                      SHELL32.dllShellExecuteA
                      ole32.dllCoInitialize
                      WS2_32.dllWSAStartup
                      CRYPT32.dllCryptUnprotectData
                      SHLWAPI.dllPathFindExtensionA
                      gdiplus.dllGdipGetImageEncoders
                      SETUPAPI.dllSetupDiEnumDeviceInfo
                      ntdll.dllRtlUnicodeStringToAnsiString
                      RstrtMgr.DLLRmStartSession
                      Language of compilation systemCountry where language is spokenMap
                      RussianRussia
                      EnglishUnited States
                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      06/20/24-18:18:46.029864TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4974158709192.168.2.477.91.77.66
                      06/20/24-18:16:18.111786TCP2049060ET TROJAN RisePro TCP Heartbeat Packet4973158709192.168.2.477.91.77.66
                      06/20/24-18:18:43.639253TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973258709192.168.2.477.91.77.66
                      06/20/24-18:18:46.029916TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973558709192.168.2.477.91.77.66
                      06/20/24-18:18:45.967425TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973158709192.168.2.477.91.77.66
                      06/20/24-18:16:22.687972TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094973277.91.77.66192.168.2.4
                      06/20/24-18:16:40.743118TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094974177.91.77.66192.168.2.4
                      06/20/24-18:16:18.693887TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094973177.91.77.66192.168.2.4
                      06/20/24-18:16:22.714525TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094973377.91.77.66192.168.2.4
                      06/20/24-18:18:43.701803TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973358709192.168.2.477.91.77.66
                      06/20/24-18:16:34.458767TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094973577.91.77.66192.168.2.4
                      TimestampSource PortDest PortSource IPDest IP
                      Jun 20, 2024 18:16:18.082406998 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:18.087196112 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:18.087280989 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:18.111785889 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:18.116616964 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:18.693886995 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:18.748128891 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:21.826422930 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:21.849236012 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:22.083770037 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:22.084619045 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:22.088967085 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:22.089078903 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:22.090025902 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:22.090116024 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:22.097835064 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:22.097959995 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:22.102804899 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:22.103224039 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:22.687972069 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:22.714524984 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:22.732546091 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:22.763778925 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:25.810913086 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:25.816184998 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:25.826411963 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:25.831402063 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:33.820631027 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:33.827883959 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:33.827955961 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:33.850049019 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:33.855003119 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:34.458766937 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:34.513776064 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:37.592094898 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:37.597034931 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:40.131934881 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:40.137490034 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:40.137599945 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:40.154479027 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:40.159463882 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:40.743118048 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:40.795069933 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:43.857678890 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:43.862550020 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:53.139162064 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:53.144341946 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:57.092277050 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:57.097079992 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:57.170197964 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:57.175059080 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:08.920384884 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:08.925599098 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:11.936005116 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:11.941045046 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:15.185986042 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:15.190887928 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:15.873939037 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:15.879354954 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:15.967291117 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:15.972165108 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:21.310914993 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:21.316880941 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:24.454423904 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:24.459355116 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:25.279653072 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:25.284882069 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:25.389334917 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:25.394721985 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:27.576925993 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:27.582823038 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:27.702027082 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:27.708401918 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:28.420510054 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:28.425458908 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:28.517594099 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:28.522556067 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:30.736263990 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:30.745033026 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:31.561017036 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:31.566310883 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:31.654854059 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:31.659856081 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:33.858002901 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:33.863140106 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:33.967370033 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:33.973140955 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:34.686566114 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:34.692332029 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:34.780193090 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:34.785100937 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:36.998781919 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:37.003981113 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:37.108062983 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:37.112979889 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:37.826740980 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:37.832756996 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:37.906755924 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:37.911712885 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:40.123719931 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:40.128653049 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:40.248564005 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:40.253926992 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:40.967447042 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:40.972373962 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:41.029810905 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:41.034718037 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:43.264266968 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:43.269362926 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:43.373465061 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:43.376195908 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:43.380398989 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:43.381427050 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:44.092204094 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:44.097125053 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:44.170373917 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:44.175200939 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:46.404901028 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:46.409967899 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:46.498620033 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:46.498620033 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:46.503508091 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:46.503520012 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:47.217345953 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:47.222398043 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:47.295483112 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:47.300584078 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:49.545661926 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:49.550859928 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:49.623709917 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:49.627721071 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:49.628674984 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:49.632498026 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:50.342365980 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:50.347349882 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:50.436182022 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:50.441106081 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:52.670891047 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:52.676013947 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:52.748569965 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:52.748569965 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:52.754863977 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:52.754878044 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:53.467386961 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:53.472249031 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:53.576813936 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:53.581693888 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:55.795363903 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:55.800189018 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:55.889224052 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:55.889260054 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:55.894006014 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:55.894095898 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:56.607949972 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:56.613042116 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:56.717566967 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:56.722527981 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:58.937108994 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:58.942126989 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:59.014260054 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:59.014303923 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:59.020181894 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:59.020253897 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:59.748775959 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:59.753906965 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:59.858185053 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:59.863053083 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:02.061353922 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:02.066590071 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:02.154870987 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:02.154917002 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:02.160830021 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:02.160846949 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:02.889441013 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:02.896599054 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:02.983768940 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:02.991080046 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:05.201714993 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:05.206844091 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:05.295502901 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:05.300564051 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:05.300678968 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:05.305542946 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:06.014344931 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:06.019401073 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:06.108160973 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:06.113195896 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:08.343862057 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:08.348886013 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:08.420466900 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:08.424453020 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:08.425554037 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:08.429310083 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:09.154839993 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:09.160027981 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:09.248553991 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:09.254897118 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:11.483021975 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:11.488552094 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:11.561369896 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:11.561443090 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:11.570662022 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:11.571245909 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:12.279865026 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:12.285075903 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:12.389247894 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:12.394246101 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:14.623620033 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:14.628688097 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:14.686108112 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:14.686141968 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:14.691111088 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:14.691131115 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:15.404898882 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:15.412401915 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:15.514271021 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:15.519392967 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:17.749006987 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:17.753881931 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:17.826817036 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:17.826817036 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:17.834220886 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:17.834240913 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:18.545907021 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:18.550836086 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:18.639486074 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:18.644351959 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:20.874095917 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:20.879035950 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:20.967571974 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:20.967650890 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:20.973581076 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:20.973701000 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:21.670627117 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:21.675652027 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:21.780040979 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:21.785063028 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:24.014272928 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:24.020559072 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:24.108004093 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:24.108004093 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:24.298521996 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:24.298697948 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:24.811269045 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:24.816102982 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:24.905145884 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:24.910788059 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:27.154906034 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:27.159956932 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:27.248706102 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:27.248742104 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:27.254652977 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:27.254673004 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:27.951773882 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:27.956631899 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:28.045533895 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:28.051101923 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:30.295551062 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:30.389306068 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:30.391441107 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:30.493395090 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:30.493438005 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:30.493468046 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:31.092443943 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:31.097237110 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:31.170707941 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:31.175538063 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:33.420533895 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:33.425492048 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:33.514206886 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:33.514251947 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:33.519130945 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:33.519500017 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:34.233072042 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:34.237952948 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:34.311182022 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:34.317667961 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:36.561214924 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:36.566143036 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:36.639219046 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:36.639262915 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:36.645170927 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:36.645188093 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:37.373574972 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:37.378360987 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:37.436151981 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:37.441423893 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:39.686177969 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:39.690995932 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:39.764250994 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:39.764300108 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:39.769045115 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:39.769207954 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:40.514302015 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:40.519665956 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:40.576776028 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:40.581871033 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:42.826821089 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:42.831593990 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:42.905057907 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:42.905111074 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:42.911545992 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:42.911560059 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:43.639252901 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:43.644092083 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:43.701802969 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:43.706597090 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:45.967425108 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:45.972402096 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:46.029864073 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:46.029916048 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:46.035264015 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:46.035303116 CEST587094973577.91.77.66192.168.2.4

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:12:16:14
                      Start date:20/06/2024
                      Path:C:\Users\user\Desktop\AlCsIOd0pd.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\AlCsIOd0pd.exe"
                      Imagebase:0x400000
                      File size:3'259'920 bytes
                      MD5 hash:DE584DD4970A8099454611EE0C739EA8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Target ID:1
                      Start time:12:16:16
                      Start date:20/06/2024
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                      Imagebase:0xb50000
                      File size:187'904 bytes
                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:2
                      Start time:12:16:16
                      Start date:20/06/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:12:16:16
                      Start date:20/06/2024
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                      Imagebase:0xb50000
                      File size:187'904 bytes
                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:4
                      Start time:12:16:16
                      Start date:20/06/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:5
                      Start time:12:16:18
                      Start date:20/06/2024
                      Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                      Wow64 process (32bit):true
                      Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                      Imagebase:0x400000
                      File size:3'259'920 bytes
                      MD5 hash:DE584DD4970A8099454611EE0C739EA8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      • Detection: 63%, ReversingLabs
                      Reputation:low
                      Has exited:false

                      Target ID:6
                      Start time:12:16:18
                      Start date:20/06/2024
                      Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                      Wow64 process (32bit):true
                      Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                      Imagebase:0x400000
                      File size:3'259'920 bytes
                      MD5 hash:DE584DD4970A8099454611EE0C739EA8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Target ID:7
                      Start time:12:16:29
                      Start date:20/06/2024
                      Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                      Imagebase:0x400000
                      File size:3'259'920 bytes
                      MD5 hash:DE584DD4970A8099454611EE0C739EA8
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      • Detection: 63%, ReversingLabs
                      Reputation:low
                      Has exited:false

                      Target ID:11
                      Start time:12:16:37
                      Start date:20/06/2024
                      Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                      Imagebase:0x400000
                      File size:3'259'920 bytes
                      MD5 hash:DE584DD4970A8099454611EE0C739EA8
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Reset < >