Click to jump to signature section
Source: 4mDVpaKpPG.exe | Virustotal: Detection: 50% | Perma Link |
Source: 4mDVpaKpPG.exe | ReversingLabs: Detection: 59% |
Source: 4mDVpaKpPG.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE |
Source: | Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: 4mDVpaKpPG.exe |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2BB110 SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,WaitForInputIdle,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, | 0_2_00007FF6EC2BB110 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2A407C FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, | 0_2_00007FF6EC2A407C |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2CFC20 FindFirstFileExA, | 0_2_00007FF6EC2CFC20 |
Source: Joe Sandbox View | IP Address: 239.255.255.250 239.255.255.250 |
Source: Joe Sandbox View | IP Address: 149.154.167.99 149.154.167.99 |
Source: Joe Sandbox View | IP Address: 149.154.167.99 149.154.167.99 |
Source: unknown | TCP traffic detected without corresponding DNS query: 173.222.162.32 |
Source: unknown | TCP traffic detected without corresponding DNS query: 199.232.214.172 |
Source: unknown | TCP traffic detected without corresponding DNS query: 199.232.214.172 |
Source: unknown | TCP traffic detected without corresponding DNS query: 199.232.214.172 |
Source: unknown | TCP traffic detected without corresponding DNS query: 199.232.214.172 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | HTTP traffic detected: GET /setlanguage/abcxyz HTTP/1.1Host: t.meConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /css/font-roboto.css?1 HTTP/1.1Host: telegram.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: styleReferer: https://t.me/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /css/bootstrap.min.css?3 HTTP/1.1Host: telegram.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: styleReferer: https://t.me/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /css/telegram.css?244 HTTP/1.1Host: telegram.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: styleReferer: https://t.me/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /js/tgwallpaper.min.js?3 HTTP/1.1Host: telegram.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://t.me/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /js/tgwallpaper.min.js?3 HTTP/1.1Host: telegram.orgConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /img/tgme/pattern.svg?1 HTTP/1.1Host: telegram.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://telegram.org/css/telegram.css?244Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /fonts/Roboto/KFOlCnqEu92Fr1MmWUlfBBc4AMP6lQ.woff2 HTTP/1.1Host: telegram.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://t.mesec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: fontReferer: https://telegram.org/css/font-roboto.css?1Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /fonts/Roboto/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2 HTTP/1.1Host: telegram.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://t.mesec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: fontReferer: https://telegram.org/css/font-roboto.css?1Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /img/tgme/pattern.svg?1 HTTP/1.1Host: telegram.orgConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | DNS traffic detected: DNS query: t.me |
Source: global traffic | DNS traffic detected: DNS query: telegram.org |
Source: global traffic | DNS traffic detected: DNS query: www.google.com |
Source: chromecache_49.3.dr | String found in binary or memory: http://getbootstrap.com) |
Source: chromecache_49.3.dr | String found in binary or memory: http://getbootstrap.com/customize/?id=92d2ac1b31978642b6b6) |
Source: chromecache_49.3.dr | String found in binary or memory: https://gist.github.com/92d2ac1b31978642b6b6 |
Source: chromecache_49.3.dr | String found in binary or memory: https://github.com/twbs/bootstrap/blob/master/LICENSE) |
Source: chromecache_52.3.dr | String found in binary or memory: https://osx.telegram.org/updates/site/artboard.png) |
Source: chromecache_52.3.dr | String found in binary or memory: https://osx.telegram.org/updates/site/artboard_2x.png); |
Source: 4mDVpaKpPG.exe | String found in binary or memory: https://t.me/setlanguage/abcxyz |
Source: 4mDVpaKpPG.exe, 00000000.00000002.2923792190.0000017A66FE6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/setlanguage/abcxyz$d |
Source: 4mDVpaKpPG.exe, 00000000.00000002.2923792190.0000017A66FE6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/setlanguage/abcxyz0f) |
Source: 4mDVpaKpPG.exe, 00000000.00000002.2923792190.0000017A6701C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/setlanguage/abcxyz4 |
Source: 4mDVpaKpPG.exe, 00000000.00000002.2923792190.0000017A6701C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/setlanguage/abcxyz= |
Source: 4mDVpaKpPG.exe, 00000000.00000002.2923792190.0000017A6701C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/setlanguage/abcxyzX |
Source: 4mDVpaKpPG.exe, 00000000.00000002.2923792190.0000017A66FDB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/setlanguage/abcxyzeha |
Source: 4mDVpaKpPG.exe, 00000000.00000002.2923792190.0000017A6701C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/setlanguage/abcxyzl |
Source: 4mDVpaKpPG.exe, 00000000.00000002.2923792190.0000017A66FE6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/setlanguage/abcxyzrosoft |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49744 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49743 |
Source: unknown | Network traffic detected: HTTP traffic on port 49731 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49741 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49740 |
Source: unknown | Network traffic detected: HTTP traffic on port 49741 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49748 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49743 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49746 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49745 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49739 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49738 |
Source: unknown | Network traffic detected: HTTP traffic on port 49738 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49675 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49731 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49792 |
Source: unknown | Network traffic detected: HTTP traffic on port 49740 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49749 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49744 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49749 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49748 |
Source: unknown | Network traffic detected: HTTP traffic on port 49792 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49746 |
Source: unknown | Network traffic detected: HTTP traffic on port 49739 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49745 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC29C300: CreateFileW,CloseHandle,wcscpy,wcscpy,wcscpy,wcscpy,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, | 0_2_00007FF6EC29C300 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC295E2C | 0_2_00007FF6EC295E2C |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2BCE08 | 0_2_00007FF6EC2BCE08 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2BB110 | 0_2_00007FF6EC2BB110 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2C06D4 | 0_2_00007FF6EC2C06D4 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2AA46C | 0_2_00007FF6EC2AA46C |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2C06D4 | 0_2_00007FF6EC2C06D4 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2B8D74 | 0_2_00007FF6EC2B8D74 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2B1EA0 | 0_2_00007FF6EC2B1EA0 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2AAED4 | 0_2_00007FF6EC2AAED4 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2D2000 | 0_2_00007FF6EC2D2000 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2AF100 | 0_2_00007FF6EC2AF100 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC29F940 | 0_2_00007FF6EC29F940 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2B2A30 | 0_2_00007FF6EC2B2A30 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2CFA14 | 0_2_00007FF6EC2CFA14 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2A1A00 | 0_2_00007FF6EC2A1A00 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC291AA4 | 0_2_00007FF6EC291AA4 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2D5A78 | 0_2_00007FF6EC2D5A78 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2A5B20 | 0_2_00007FF6EC2A5B20 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2B4B18 | 0_2_00007FF6EC2B4B18 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2ABB4C | 0_2_00007FF6EC2ABB4C |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2C8B9C | 0_2_00007FF6EC2C8B9C |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2B2CD8 | 0_2_00007FF6EC2B2CD8 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC29A664 | 0_2_00007FF6EC29A664 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2976C0 | 0_2_00007FF6EC2976C0 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2CC7B8 | 0_2_00007FF6EC2CC7B8 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC294840 | 0_2_00007FF6EC294840 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2A48E8 | 0_2_00007FF6EC2A48E8 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2B38E4 | 0_2_00007FF6EC2B38E4 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2AC928 | 0_2_00007FF6EC2AC928 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2C8920 | 0_2_00007FF6EC2C8920 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2B2150 | 0_2_00007FF6EC2B2150 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2A1224 | 0_2_00007FF6EC2A1224 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC297288 | 0_2_00007FF6EC297288 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC29C300 | 0_2_00007FF6EC29C300 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC29A2FC | 0_2_00007FF6EC29A2FC |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2B5370 | 0_2_00007FF6EC2B5370 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2B3404 | 0_2_00007FF6EC2B3404 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2AB4F0 | 0_2_00007FF6EC2AB4F0 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2D24D0 | 0_2_00007FF6EC2D24D0 |
Source: classification engine | Classification label: mal48.winEXE@17/16@8/6 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC29B6E8 GetLastError,FormatMessageW,LocalFree, | 0_2_00007FF6EC29B6E8 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2B85A4 FindResourceExW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipAlloc,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree, | 0_2_00007FF6EC2B85A4 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | File created: C:\Users\user\Desktop\__tmp_rar_sfx_access_check_4542921 | Jump to behavior |
Source: 4mDVpaKpPG.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | File read: C:\Windows\win.ini | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: 4mDVpaKpPG.exe | Virustotal: Detection: 50% |
Source: 4mDVpaKpPG.exe | ReversingLabs: Detection: 59% |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | File read: C:\Users\user\Desktop\4mDVpaKpPG.exe | Jump to behavior |
Source: unknown | Process created: C:\Users\user\Desktop\4mDVpaKpPG.exe "C:\Users\user\Desktop\4mDVpaKpPG.exe" | |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://t.me/setlanguage/abcxyz | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1924,i,16418043321853965406,12002353379592528226,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 | |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://t.me/setlanguage/abcxyz | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1924,i,16418043321853965406,12002353379592528226,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: dxgidebug.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: riched20.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: msls31.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: windows.shell.servicehostbuilder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: ieframe.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: mlang.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32 | Jump to behavior |
Source: Window Recorder | Window detected: More than 3 window changes detected |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\16.0\Access\Capabilities\UrlAssociations | Jump to behavior |
Source: 4mDVpaKpPG.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: 4mDVpaKpPG.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT |
Source: 4mDVpaKpPG.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE |
Source: 4mDVpaKpPG.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC |
Source: 4mDVpaKpPG.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: 4mDVpaKpPG.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG |
Source: 4mDVpaKpPG.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT |
Source: 4mDVpaKpPG.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE |
Source: 4mDVpaKpPG.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: | Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: 4mDVpaKpPG.exe |
Source: 4mDVpaKpPG.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: 4mDVpaKpPG.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: 4mDVpaKpPG.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: 4mDVpaKpPG.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: 4mDVpaKpPG.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | File created: C:\Users\user\Desktop\__tmp_rar_sfx_access_check_4542921 | Jump to behavior |
Source: 4mDVpaKpPG.exe | Static PE information: section name: .didat |
Source: 4mDVpaKpPG.exe | Static PE information: section name: _RDATA |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2BB110 SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,WaitForInputIdle,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, | 0_2_00007FF6EC2BB110 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2A407C FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, | 0_2_00007FF6EC2A407C |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2CFC20 FindFirstFileExA, | 0_2_00007FF6EC2CFC20 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2C1624 VirtualQuery,GetSystemInfo, | 0_2_00007FF6EC2C1624 |
Source: 4mDVpaKpPG.exe, 00000000.00000002.2923792190.0000017A6701C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}o |
Source: 4mDVpaKpPG.exe, 00000000.00000002.2923792190.0000017A6701C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\ |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2C30F0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00007FF6EC2C30F0 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2D0CA0 GetProcessHeap, | 0_2_00007FF6EC2D0CA0 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2C30F0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00007FF6EC2C30F0 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2C7658 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00007FF6EC2C7658 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2C32D4 SetUnhandledExceptionFilter, | 0_2_00007FF6EC2C32D4 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2C2490 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 0_2_00007FF6EC2C2490 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2BB110 SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,WaitForInputIdle,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, | 0_2_00007FF6EC2BB110 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://t.me/setlanguage/abcxyz | Jump to behavior |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2ADBEC cpuid | 0_2_00007FF6EC2ADBEC |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: GetLocaleInfoW,GetNumberFormatW, | 0_2_00007FF6EC2BA24C |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2C06D4 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, | 0_2_00007FF6EC2C06D4 |
Source: C:\Users\user\Desktop\4mDVpaKpPG.exe | Code function: 0_2_00007FF6EC2A4E70 GetVersionExW, | 0_2_00007FF6EC2A4E70 |