Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
qUG1ZROxLJ.exe

Overview

General Information

Sample name:qUG1ZROxLJ.exe
renamed because original name is a hash value
Original sample name:5e013ceed78a1934a9b2cb464c372b4b9c89e0228344d19c8d0132355d015c36.exe
Analysis ID:1631810
MD5:9994ce2c42925fa3ba3a03ac57e9f9db
SHA1:4cba142aed0bc5019485e58d90dd50f4ca97de34
SHA256:5e013ceed78a1934a9b2cb464c372b4b9c89e0228344d19c8d0132355d015c36
Tags:exeMassLoggeruser-adrian__luca
Infos:

Detection

MSIL Logger, MassLogger RAT
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected MSIL Logger
Yara detected MassLogger RAT
Yara detected Telegram RAT
.NET source code references suspicious native API functions
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • qUG1ZROxLJ.exe (PID: 6900 cmdline: "C:\Users\user\Desktop\qUG1ZROxLJ.exe" MD5: 9994CE2C42925FA3BA3A03AC57E9F9DB)
    • RegSvcs.exe (PID: 6924 cmdline: "C:\Users\user\Desktop\qUG1ZROxLJ.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"EXfil Mode": "SMTP", "From": "securityz@grupomaya.mx", "Password": "    54460hetteXzeLJ  Z+l!UyU_nadu     \u2605\u0b9c\u0b9c", "Server": "mail.grupomaya.mx", "Port": 587}
SourceRuleDescriptionAuthorStrings
00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
        00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0xf1b7:$a1: get_encryptedPassword
          • 0xf4df:$a2: get_encryptedUsername
          • 0xef52:$a3: get_timePasswordChanged
          • 0xf073:$a4: get_passwordField
          • 0xf1cd:$a5: set_encryptedPassword
          • 0x10b29:$a7: get_logins
          • 0x107da:$a8: GetOutlookPasswords
          • 0x105cc:$a9: StartKeylogger
          • 0x10a79:$a10: KeyLoggerEventArgs
          • 0x10629:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 18 entries
          SourceRuleDescriptionAuthorStrings
          0.2.qUG1ZROxLJ.exe.1da0000.1.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            0.2.qUG1ZROxLJ.exe.1da0000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.qUG1ZROxLJ.exe.1da0000.1.unpackJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
                0.2.qUG1ZROxLJ.exe.1da0000.1.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  0.2.qUG1ZROxLJ.exe.1da0000.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                  • 0xd3b7:$a1: get_encryptedPassword
                  • 0xd6df:$a2: get_encryptedUsername
                  • 0xd152:$a3: get_timePasswordChanged
                  • 0xd273:$a4: get_passwordField
                  • 0xd3cd:$a5: set_encryptedPassword
                  • 0xed29:$a7: get_logins
                  • 0xe9da:$a8: GetOutlookPasswords
                  • 0xe7cc:$a9: StartKeylogger
                  • 0xec79:$a10: KeyLoggerEventArgs
                  • 0xe829:$a11: KeyLoggerEventArgsEventHandler
                  Click to see the 13 entries

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: frack113: Data: DesusertionIp: 198.59.144.139, DesusertionIsIpv6: false, DesusertionPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 6924, Protocol: tcp, SourceIp: 192.168.2.9, SourceIsIpv6: false, SourcePort: 49685
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-07T16:17:40.163515+010028032742Potentially Bad Traffic192.168.2.949683132.226.247.7380TCP
                  2025-03-07T16:17:49.788507+010028032742Potentially Bad Traffic192.168.2.949683132.226.247.7380TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: qUG1ZROxLJ.exeAvira: detected
                  Source: 1.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "securityz@grupomaya.mx", "Password": " 54460hetteXzeLJ Z+l!UyU_nadu \u2605\u0b9c\u0b9c", "Server": "mail.grupomaya.mx", "Port": 587}
                  Source: qUG1ZROxLJ.exeVirustotal: Detection: 61%Perma Link
                  Source: qUG1ZROxLJ.exeReversingLabs: Detection: 55%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: qUG1ZROxLJ.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.9:49684 version: TLS 1.0
                  Source: Binary string: wntdll.pdbUGP source: qUG1ZROxLJ.exe, 00000000.00000003.950042839.0000000003970000.00000004.00001000.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.948863939.0000000003B10000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: qUG1ZROxLJ.exe, 00000000.00000003.950042839.0000000003970000.00000004.00001000.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.948863939.0000000003B10000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_0060445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0060445A
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_0060C6D1 FindFirstFileW,FindClose,0_2_0060C6D1
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_0060C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0060C75C
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_0060F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0060F3F3
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_006037EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006037EF
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_00603B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00603B12
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02EF9731h1_2_02EF9480
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02EF9E5Ah1_2_02EF9A40
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02EF9E5Ah1_2_02EF9A30
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02EF9E5Ah1_2_02EF9D87
                  Source: global trafficTCP traffic: 192.168.2.9:49685 -> 198.59.144.139:587
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
                  Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
                  Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
                  Source: Joe Sandbox ViewASN Name: HYPEENT-SJUS HYPEENT-SJUS
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49683 -> 132.226.247.73:80
                  Source: global trafficTCP traffic: 192.168.2.9:49685 -> 198.59.144.139:587
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.9:49684 version: TLS 1.0
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_006122EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_006122EE
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: global trafficDNS traffic detected: DNS query: mail.grupomaya.mx
                  Source: RegSvcs.exe, 00000001.00000002.2218019806.0000000002F90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: RegSvcs.exe, 00000001.00000002.2218019806.0000000002F90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                  Source: RegSvcs.exe, 00000001.00000002.2218019806.0000000002F7E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000002F90000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: RegSvcs.exe, 00000001.00000002.2218019806.0000000002F11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: RegSvcs.exe, 00000001.00000002.2218019806.0000000002F90000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                  Source: qUG1ZROxLJ.exe, 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: RegSvcs.exe, 00000001.00000002.2218019806.0000000002F90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                  Source: RegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://grupomaya.mx
                  Source: RegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://grupomaya.mxd
                  Source: RegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.grupomaya.mx
                  Source: RegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.grupomaya.mxd
                  Source: RegSvcs.exe, 00000001.00000002.2219867814.0000000006748000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2217094924.00000000014A6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.org/0
                  Source: RegSvcs.exe, 00000001.00000002.2219867814.0000000006748000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2217094924.00000000014A6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org0#
                  Source: RegSvcs.exe, 00000001.00000002.2218019806.0000000002FAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                  Source: RegSvcs.exe, 00000001.00000002.2218019806.0000000002FAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                  Source: RegSvcs.exe, 00000001.00000002.2218019806.0000000002F11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: RegSvcs.exe, 00000001.00000002.2219867814.0000000006748000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2217094924.00000000014A6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                  Source: RegSvcs.exe, 00000001.00000002.2219867814.0000000006748000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2217094924.00000000014A6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                  Source: RegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: qUG1ZROxLJ.exe, 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                  Source: RegSvcs.exe, 00000001.00000002.2218019806.0000000002F90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: qUG1ZROxLJ.exe, 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000002F90000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: RegSvcs.exe, 00000001.00000002.2218019806.0000000002F90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
                  Source: RegSvcs.exe, 00000001.00000002.2218019806.0000000002F90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49684
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49684 -> 443

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.qUG1ZROxLJ.exe.1da0000.1.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_0060001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0060001C
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_0062CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0062CABC

                  System Summary

                  barindex
                  Source: 0.2.qUG1ZROxLJ.exe.1da0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.qUG1ZROxLJ.exe.1da0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.qUG1ZROxLJ.exe.1da0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.qUG1ZROxLJ.exe.1da0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: qUG1ZROxLJ.exe PID: 6900, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: RegSvcs.exe PID: 6924, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: This is a third-party compiled AutoIt script.0_2_005A3B3A
                  Source: qUG1ZROxLJ.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: qUG1ZROxLJ.exe, 00000000.00000000.935310703.0000000000654000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f653c9aa-1
                  Source: qUG1ZROxLJ.exe, 00000000.00000000.935310703.0000000000654000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_cabe127a-a
                  Source: qUG1ZROxLJ.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d2d86b76-b
                  Source: qUG1ZROxLJ.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_7bb0ec77-5
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_00603D61: CreateFileW,DeviceIoControl,CloseHandle,0_2_00603D61
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005F8310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_005F8310
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_006051BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_006051BD
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005AE6A00_2_005AE6A0
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005CD9750_2_005CD975
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005C21C50_2_005C21C5
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005D62D20_2_005D62D2
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005D242E0_2_005D242E
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005C25FA0_2_005C25FA
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005FE6160_2_005FE616
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005B66E10_2_005B66E1
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005D878F0_2_005D878F
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005D68440_2_005D6844
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_006208570_2_00620857
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005B88080_2_005B8808
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_006088890_2_00608889
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005CCB210_2_005CCB21
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005D6DB60_2_005D6DB6
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005B6F9E0_2_005B6F9E
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005B30300_2_005B3030
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005CF1D90_2_005CF1D9
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005C31870_2_005C3187
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005A12870_2_005A1287
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005C14840_2_005C1484
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005B55200_2_005B5520
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005C76960_2_005C7696
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005B57600_2_005B5760
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005C19780_2_005C1978
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005D9AB50_2_005D9AB5
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005AFCE00_2_005AFCE0
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_00627DDB0_2_00627DDB
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005C1D900_2_005C1D90
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005CBDA60_2_005CBDA6
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005ADF000_2_005ADF00
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005B3FE00_2_005B3FE0
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_01D936200_2_01D93620
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02EFC5301_2_02EFC530
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02EF94801_2_02EF9480
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02EFC5211_2_02EFC521
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02EF2DD11_2_02EF2DD1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02EF946F1_2_02EF946F
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: String function: 005A7DE1 appears 36 times
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: String function: 005C0AE3 appears 70 times
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: String function: 005C8900 appears 36 times
                  Source: qUG1ZROxLJ.exe, 00000000.00000003.949385413.0000000003C3D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs qUG1ZROxLJ.exe
                  Source: qUG1ZROxLJ.exe, 00000000.00000003.948727458.0000000003A93000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs qUG1ZROxLJ.exe
                  Source: qUG1ZROxLJ.exe, 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs qUG1ZROxLJ.exe
                  Source: qUG1ZROxLJ.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 0.2.qUG1ZROxLJ.exe.1da0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.qUG1ZROxLJ.exe.1da0000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.qUG1ZROxLJ.exe.1da0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.qUG1ZROxLJ.exe.1da0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: qUG1ZROxLJ.exe PID: 6900, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: RegSvcs.exe PID: 6924, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.qUG1ZROxLJ.exe.1da0000.1.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.qUG1ZROxLJ.exe.1da0000.1.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@3/3
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_0060A06A GetLastError,FormatMessageW,0_2_0060A06A
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005F81CB AdjustTokenPrivileges,CloseHandle,0_2_005F81CB
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005F87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_005F87E1
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_0060B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0060B333
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_0061EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0061EE0D
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_006183BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_006183BB
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005A4E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_005A4E89
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeFile created: C:\Users\user\AppData\Local\Temp\autF0EC.tmpJump to behavior
                  Source: qUG1ZROxLJ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegSvcs.exe, 00000001.00000002.2218019806.0000000003000000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218722752.0000000003F3D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.000000000300E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000003030000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000003023000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: qUG1ZROxLJ.exeVirustotal: Detection: 61%
                  Source: qUG1ZROxLJ.exeReversingLabs: Detection: 55%
                  Source: unknownProcess created: C:\Users\user\Desktop\qUG1ZROxLJ.exe "C:\Users\user\Desktop\qUG1ZROxLJ.exe"
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\qUG1ZROxLJ.exe"
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\qUG1ZROxLJ.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: qUG1ZROxLJ.exeStatic file information: File size 80740352 > 1048576
                  Source: qUG1ZROxLJ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: qUG1ZROxLJ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: qUG1ZROxLJ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: qUG1ZROxLJ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: qUG1ZROxLJ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: qUG1ZROxLJ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: qUG1ZROxLJ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: qUG1ZROxLJ.exe, 00000000.00000003.950042839.0000000003970000.00000004.00001000.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.948863939.0000000003B10000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: qUG1ZROxLJ.exe, 00000000.00000003.950042839.0000000003970000.00000004.00001000.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.948863939.0000000003B10000.00000004.00001000.00020000.00000000.sdmp
                  Source: qUG1ZROxLJ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: qUG1ZROxLJ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: qUG1ZROxLJ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: qUG1ZROxLJ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: qUG1ZROxLJ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005A4B37 LoadLibraryA,GetProcAddress,0_2_005A4B37
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005AC4C6 push A3005ABAh; retn 005Ah0_2_005AC50D
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_0060848F push FFFFFF8Bh; iretd 0_2_00608491
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005C8945 push ecx; ret 0_2_005C8958
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_00625376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00625376
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005C3187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_005C3187
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeAPI/Special instruction interceptor: Address: 1D93244
                  Source: qUG1ZROxLJ.exe, 00000000.00000002.967013382.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.955802734.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.938174183.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.936559811.00000000011A0000.00000004.00000020.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.937632121.00000000011AF000.00000004.00000020.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.935933262.00000000011CB000.00000004.00000020.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.935884431.00000000011AE000.00000004.00000020.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.938073201.00000000011AF000.00000004.00000020.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.936611732.00000000011AF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXEORM
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 4759Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 820Jump to behavior
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-100338
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeAPI coverage: 5.1 %
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_0060445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0060445A
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_0060C6D1 FindFirstFileW,FindClose,0_2_0060C6D1
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_0060C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0060C75C
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_0060F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0060F3F3
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_006037EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006037EF
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_00603B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00603B12
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005A49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005A49A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99891Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99781Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99672Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99563Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99453Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99343Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99234Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99125Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99016Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98906Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98797Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98687Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98578Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98468Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98359Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98250Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98141Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98031Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97922Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97813Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97594Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97484Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97266Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97156Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: RegSvcs.exe, 00000001.00000002.2217094924.00000000014A6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllP
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeAPI call chain: ExitProcess graph end nodegraph_0-98993
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_00613F09 BlockInput,0_2_00613F09
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005A3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_005A3B3A
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005D5A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_005D5A7C
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005A4B37 LoadLibraryA,GetProcAddress,0_2_005A4B37
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_01D93510 mov eax, dword ptr fs:[00000030h]0_2_01D93510
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_01D934B0 mov eax, dword ptr fs:[00000030h]0_2_01D934B0
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_01D91E70 mov eax, dword ptr fs:[00000030h]0_2_01D91E70
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005F80C9 GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_005F80C9
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005CA155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005CA155
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005CA124 SetUnhandledExceptionFilter,0_2_005CA124
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: 0.2.qUG1ZROxLJ.exe.1da0000.1.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                  Source: 0.2.qUG1ZROxLJ.exe.1da0000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                  Source: 0.2.qUG1ZROxLJ.exe.1da0000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: F24008Jump to behavior
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005F87B1 LogonUserW,0_2_005F87B1
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005A3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_005A3B3A
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_006012C7 SendInput,keybd_event,0_2_006012C7
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_00604C7F mouse_event,0_2_00604C7F
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\qUG1ZROxLJ.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005F7CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_005F7CAF
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005F874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_005F874B
                  Source: qUG1ZROxLJ.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: qUG1ZROxLJ.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005C862B cpuid 0_2_005C862B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005D4E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_005D4E87
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005E1E06 GetUserNameW,0_2_005E1E06
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_005A49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005A49A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: qUG1ZROxLJ.exe, 00000000.00000002.967013382.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.955802734.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.938174183.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.936559811.00000000011A0000.00000004.00000020.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.937632121.00000000011AF000.00000004.00000020.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.935933262.00000000011CB000.00000004.00000020.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.935884431.00000000011AE000.00000004.00000020.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.938073201.00000000011AF000.00000004.00000020.00020000.00000000.sdmp, qUG1ZROxLJ.exe, 00000000.00000003.936611732.00000000011AF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: msmpeng.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.qUG1ZROxLJ.exe.1da0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.qUG1ZROxLJ.exe.1da0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: qUG1ZROxLJ.exe PID: 6900, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6924, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.qUG1ZROxLJ.exe.1da0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.qUG1ZROxLJ.exe.1da0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: qUG1ZROxLJ.exe PID: 6900, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6924, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.qUG1ZROxLJ.exe.1da0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.qUG1ZROxLJ.exe.1da0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: qUG1ZROxLJ.exe PID: 6900, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6924, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: qUG1ZROxLJ.exeBinary or memory string: WIN_81
                  Source: qUG1ZROxLJ.exeBinary or memory string: WIN_XP
                  Source: qUG1ZROxLJ.exeBinary or memory string: WIN_XPe
                  Source: qUG1ZROxLJ.exeBinary or memory string: WIN_VISTA
                  Source: qUG1ZROxLJ.exeBinary or memory string: WIN_7
                  Source: qUG1ZROxLJ.exeBinary or memory string: WIN_8
                  Source: qUG1ZROxLJ.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                  Source: Yara matchFile source: 0.2.qUG1ZROxLJ.exe.1da0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.qUG1ZROxLJ.exe.1da0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: qUG1ZROxLJ.exe PID: 6900, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6924, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.qUG1ZROxLJ.exe.1da0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.qUG1ZROxLJ.exe.1da0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: qUG1ZROxLJ.exe PID: 6900, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6924, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.qUG1ZROxLJ.exe.1da0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.qUG1ZROxLJ.exe.1da0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: qUG1ZROxLJ.exe PID: 6900, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6924, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.qUG1ZROxLJ.exe.1da0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.qUG1ZROxLJ.exe.1da0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: qUG1ZROxLJ.exe PID: 6900, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6924, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\qUG1ZROxLJ.exeCode function: 0_2_00616747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00616747
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  12
                  Native API
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault AccountsScheduled Task/Job2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  3
                  Obfuscated Files or Information
                  Security Account Manager1
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS127
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets241
                  Security Software Discovery
                  SSHKeylogging23
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials11
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  qUG1ZROxLJ.exe62%VirustotalBrowse
                  qUG1ZROxLJ.exe55%ReversingLabsWin32.Trojan.AutoitInject
                  qUG1ZROxLJ.exe100%AviraTR/AD.ShellcodeCrypter.qydhk
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\slashing0%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://grupomaya.mx0%Avira URL Cloudsafe
                  http://mail.grupomaya.mx0%Avira URL Cloudsafe
                  http://mail.grupomaya.mxd0%Avira URL Cloudsafe
                  http://grupomaya.mxd0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  reallyfreegeoip.org
                  104.21.80.1
                  truefalse
                    high
                    grupomaya.mx
                    198.59.144.139
                    truetrue
                      unknown
                      checkip.dyndns.com
                      132.226.247.73
                      truefalse
                        high
                        mail.grupomaya.mx
                        unknown
                        unknowntrue
                          unknown
                          checkip.dyndns.org
                          unknown
                          unknownfalse
                            high
                            NameMaliciousAntivirus DetectionReputation
                            https://reallyfreegeoip.org/xml/8.46.123.189false
                              high
                              http://checkip.dyndns.org/false
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://api.telegram.org/botRegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://grupomaya.mxdRegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://reallyfreegeoip.orgdRegSvcs.exe, 00000001.00000002.2218019806.0000000002FAD000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://mail.grupomaya.mxdRegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://r10.o.lencr.org0#RegSvcs.exe, 00000001.00000002.2219867814.0000000006748000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2217094924.00000000014A6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.orgRegSvcs.exe, 00000001.00000002.2218019806.0000000002F7E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000002F90000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://mail.grupomaya.mxRegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://reallyfreegeoip.org/xml/8.46.123.189lRegSvcs.exe, 00000001.00000002.2218019806.0000000002F90000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.comdRegSvcs.exe, 00000001.00000002.2218019806.0000000002F90000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://x1.c.lencr.org/0RegSvcs.exe, 00000001.00000002.2219867814.0000000006748000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2217094924.00000000014A6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://x1.i.lencr.org/0RegSvcs.exe, 00000001.00000002.2219867814.0000000006748000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2217094924.00000000014A6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://checkip.dyndns.org/qqUG1ZROxLJ.exe, 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                  high
                                                  https://reallyfreegeoip.org/xml/8.46.123.189dRegSvcs.exe, 00000001.00000002.2218019806.0000000002F90000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.2218019806.0000000002FAD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://checkip.dyndns.orgdRegSvcs.exe, 00000001.00000002.2218019806.0000000002F90000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.2218019806.0000000002F90000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://checkip.dyndns.comRegSvcs.exe, 00000001.00000002.2218019806.0000000002F90000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://grupomaya.mxRegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://checkip.dyndns.org/dRegSvcs.exe, 00000001.00000002.2218019806.0000000002F90000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.2218019806.0000000002F11000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://api.telegram.org/bot-/sendDocument?chat_id=qUG1ZROxLJ.exe, 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                  high
                                                                  http://r10.i.lencr.org/0RegSvcs.exe, 00000001.00000002.2219867814.0000000006748000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2217094924.00000000014A6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://reallyfreegeoip.org/xml/qUG1ZROxLJ.exe, 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2218019806.0000000002F90000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                      high
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      198.59.144.139
                                                                      grupomaya.mxUnited States
                                                                      13332HYPEENT-SJUStrue
                                                                      104.21.80.1
                                                                      reallyfreegeoip.orgUnited States
                                                                      13335CLOUDFLARENETUSfalse
                                                                      132.226.247.73
                                                                      checkip.dyndns.comUnited States
                                                                      16989UTMEMUSfalse
                                                                      Joe Sandbox version:42.0.0 Malachite
                                                                      Analysis ID:1631810
                                                                      Start date and time:2025-03-07 16:16:34 +01:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 6m 30s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:11
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:qUG1ZROxLJ.exe
                                                                      renamed because original name is a hash value
                                                                      Original Sample Name:5e013ceed78a1934a9b2cb464c372b4b9c89e0228344d19c8d0132355d015c36.exe
                                                                      Detection:MAL
                                                                      Classification:mal100.troj.spyw.evad.winEXE@3/4@3/3
                                                                      EGA Information:
                                                                      • Successful, ratio: 50%
                                                                      HCA Information:
                                                                      • Successful, ratio: 99%
                                                                      • Number of executed functions: 58
                                                                      • Number of non-executed functions: 282
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, sppsvc.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                      • Excluded IPs from analysis (whitelisted): 23.60.203.209
                                                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com, c.pki.goog
                                                                      • Execution Graph export aborted for target RegSvcs.exe, PID 6924 because it is empty
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                      TimeTypeDescription
                                                                      10:17:48API Interceptor27x Sleep call for process: RegSvcs.exe modified
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      198.59.144.139Pago 20250211.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                        ESrXps2S0J.exeGet hashmaliciousMassLogger RATBrowse
                                                                          owcaUFSF2e.exeGet hashmaliciousMassLogger RATBrowse
                                                                            Cp3HR4KHgC.exeGet hashmaliciousMassLogger RATBrowse
                                                                              104.21.80.1DHL AWB Receipt_pdf.bat.exeGet hashmaliciousFormBookBrowse
                                                                              • www.rbopisalive.cyou/2dxw/
                                                                              Marzec 2025-faktura.pdf.exeGet hashmaliciousFormBookBrowse
                                                                              • www.oldpay.online/u023/?lneDc=2js00DxFGjY6gHlVOW1q9a10L3HzPIs7WpRmaT2A/LnakQk0VzYAjcxSKMUcEwKHsPPKaiHoQA==&NvExnX=FrapFFYPB
                                                                              z1companyProfileandproducts.exeGet hashmaliciousFormBookBrowse
                                                                              • www.dd87558.vip/uoki/
                                                                              http://7a.ithuupvudv.ruGet hashmaliciousUnknownBrowse
                                                                              • 7a.ithuupvudv.ru/favicon.ico
                                                                              PRI_VTK250419A.exeGet hashmaliciousLokibotBrowse
                                                                              • touxzw.ir/scc1/five/fre.php
                                                                              dfiCWCanbj.exeGet hashmaliciousLokibotBrowse
                                                                              • touxzw.ir/sccc/five/fre.php
                                                                              laser (2).ps1Get hashmaliciousFormBookBrowse
                                                                              • www.lucynoel6465.shop/jgkl/
                                                                              laser.ps1Get hashmaliciousFormBookBrowse
                                                                              • www.tumbetgirislinki.fit/k566/
                                                                              QUOTATION REQUEST.exeGet hashmaliciousFormBookBrowse
                                                                              • www.shlomi.app/t3l4/
                                                                              Quotation.exeGet hashmaliciousFormBookBrowse
                                                                              • www.askvtwv8.top/uztg/
                                                                              132.226.247.73HT4YGXBRtx.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              4LJHFzA8jr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              nGI2U2r41E.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              7l3CafRVv7.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                              • checkip.dyndns.org/
                                                                              C6FGS0I3yn.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              ckHregxJIq.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              jcHIuFAWdB.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                              • checkip.dyndns.org/
                                                                              SecuriteInfo.com.Win32.CrypterX-gen.30422.25408.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                              • checkip.dyndns.org/
                                                                              z1INVOICE4602-FMT25020147.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              Ziraat_Bankasi_Swift_Messaji.png.exeGet hashmaliciousMSIL Logger, MassLogger RAT, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              checkip.dyndns.comOeM750ajqm.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                              • 193.122.6.168
                                                                              UFOiZapHGS.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 132.226.8.169
                                                                              jVE64QGXtK.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                              • 193.122.6.168
                                                                              TR3lYZyOE3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 158.101.44.242
                                                                              mKRflLn5sx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 193.122.6.168
                                                                              HT4YGXBRtx.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 132.226.247.73
                                                                              UOEAjWmusE.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                              • 193.122.130.0
                                                                              4LJHFzA8jr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 132.226.247.73
                                                                              nGI2U2r41E.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 132.226.247.73
                                                                              7l3CafRVv7.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                              • 132.226.247.73
                                                                              reallyfreegeoip.orgOeM750ajqm.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                              • 104.21.80.1
                                                                              UFOiZapHGS.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 104.21.64.1
                                                                              jVE64QGXtK.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                              • 104.21.16.1
                                                                              mKRflLn5sx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 104.21.64.1
                                                                              HT4YGXBRtx.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 104.21.64.1
                                                                              UOEAjWmusE.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                              • 104.21.16.1
                                                                              4LJHFzA8jr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 104.21.16.1
                                                                              nGI2U2r41E.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 104.21.64.1
                                                                              7l3CafRVv7.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                              • 104.21.80.1
                                                                              C6FGS0I3yn.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 104.21.112.1
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              CLOUDFLARENETUSOeM750ajqm.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                              • 104.21.80.1
                                                                              Checkpoint_News.htmlGet hashmaliciousUnknownBrowse
                                                                              • 1.1.1.1
                                                                              EYv5BQ5NjI.exeGet hashmaliciousUnknownBrowse
                                                                              • 162.159.133.233
                                                                              UFOiZapHGS.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 104.21.64.1
                                                                              jVE64QGXtK.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                              • 104.21.16.1
                                                                              x8ggp1u7V8.exeGet hashmaliciousAgentTeslaBrowse
                                                                              • 104.26.13.205
                                                                              EYv5BQ5NjI.exeGet hashmaliciousUnknownBrowse
                                                                              • 162.159.129.233
                                                                              CP07E1clp1.exeGet hashmaliciousFormBookBrowse
                                                                              • 104.21.112.1
                                                                              wubZB5Ar1r.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                              • 104.26.12.205
                                                                              yKRHzdeELv.exeGet hashmaliciousAgentTeslaBrowse
                                                                              • 104.26.13.205
                                                                              HYPEENT-SJUSarm.elfGet hashmaliciousUnknownBrowse
                                                                              • 206.206.98.7
                                                                              Pago 20250211.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                              • 198.59.144.139
                                                                              https://www.irmaflores.net/suh/*Get hashmaliciousUnknownBrowse
                                                                              • 206.206.123.61
                                                                              linux_ppc64el.elfGet hashmaliciousChaosBrowse
                                                                              • 206.206.76.202
                                                                              linux_arm6.elfGet hashmaliciousChaosBrowse
                                                                              • 206.206.76.202
                                                                              linux_arm7.elfGet hashmaliciousChaosBrowse
                                                                              • 206.206.76.202
                                                                              linux_amd64.elfGet hashmaliciousChaosBrowse
                                                                              • 206.206.76.202
                                                                              linux_ppc64.elfGet hashmaliciousChaosBrowse
                                                                              • 206.206.76.202
                                                                              linux_arm5.elfGet hashmaliciousChaosBrowse
                                                                              • 206.206.76.202
                                                                              linux_386.elfGet hashmaliciousChaosBrowse
                                                                              • 206.206.76.202
                                                                              UTMEMUSUFOiZapHGS.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 132.226.8.169
                                                                              HT4YGXBRtx.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 132.226.247.73
                                                                              4LJHFzA8jr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 132.226.247.73
                                                                              nGI2U2r41E.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 132.226.247.73
                                                                              7l3CafRVv7.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                              • 132.226.247.73
                                                                              C6FGS0I3yn.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 132.226.247.73
                                                                              ckHregxJIq.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 132.226.247.73
                                                                              PvAmrCZENy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 132.226.8.169
                                                                              jcHIuFAWdB.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                              • 132.226.247.73
                                                                              uB9KTHzsXJ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 132.226.8.169
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              54328bd36c14bd82ddaa0c04b25ed9adOeM750ajqm.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                              • 104.21.80.1
                                                                              UFOiZapHGS.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 104.21.80.1
                                                                              jVE64QGXtK.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                              • 104.21.80.1
                                                                              mKRflLn5sx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 104.21.80.1
                                                                              HT4YGXBRtx.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 104.21.80.1
                                                                              UOEAjWmusE.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                              • 104.21.80.1
                                                                              4LJHFzA8jr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 104.21.80.1
                                                                              nGI2U2r41E.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 104.21.80.1
                                                                              7l3CafRVv7.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                              • 104.21.80.1
                                                                              C6FGS0I3yn.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 104.21.80.1
                                                                              No context
                                                                              Process:C:\Users\user\Desktop\qUG1ZROxLJ.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):67232
                                                                              Entropy (8bit):7.920803720680584
                                                                              Encrypted:false
                                                                              SSDEEP:1536:rVlVbSepI1ylsozdOdBpi8xpHfFtykcSgePczX:hHFp2ozaBpiSFttykcSgt
                                                                              MD5:C2B35E568A669C6591890C0105CFA78B
                                                                              SHA1:8AC7FC50584ABEB5DAECCFB6E451C66FBC65B7A5
                                                                              SHA-256:54ECFE61F839C6D15AFF230BA6186645FB55E8CDEDE4F5B84D42CA54A176E1C4
                                                                              SHA-512:435874532BF962FCA4CCAFDA8ED50C0DEA0E4ED27E4C378558F0A6DB9DFA438F452E627F6D94C9075B4A3BBEA1B47EAF97D1665D604D01BC07F7DC1782DF345A
                                                                              Malicious:false
                                                                              Reputation:low
                                                                              Preview:EA06..n....uze^.1..jS....Q..T..RsZ.S'3:.<.d........Q.....g. ...N..&_..f1..>.(..} ..es...)......A..U.4..>..c.h.fI[.M/........<*.S..+U/D....d..eN.N*...N.X.. ...s..I.......K.f.r.}(...H.[4..mnjs.L......g.2.Jfuz...I.Nk ....dv...V` ./.V.R@8~ ...P..>.@.?..g.....3..f.4...v/G.M.`.'.a8..,..%Z.Y.N....L.1..(3...........Nc_..%.P...W...9..{Z..)...0.............S#`...gmE.K. .$.<...5z...Y.N...]F.4.e*........*.V.?.s..qX.N.........DD...(p..t..$ .%..,.......l..M......~.d*.....,..2..5.V.Q.w).b5l.....v.x..|..2.%.S+5....=.]).z..Y.OgQ.%F..S+5.U.eL...T..^7...x.....J.....g.Y....K..c[...4....w.LvT..).F.u^}x....)UI...y.L..9..2.ng5z}N./..b .E../.........Kfuz]......L..Q..)...R{q.Y.t........9\.m..T...sZ.Y3.:......k.(..i:..j.jt..9.N-Q=.^....oV.L.Q..fT..R#..S'.;.j.S..nv...D.....f.?.F?.m........./..K......~.D.f.R..c.J.F.2.d....]..Kn1..&eD....*Uf.v.Rcp.}^.1...S.|......(......Z.2...R.....yf..'r..2s7......n...)..."ad.U'5...F...=8.f.V...m}...:U.R{...U.....v..TJ%ZeN....$
                                                                              Process:C:\Users\user\Desktop\qUG1ZROxLJ.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):9772
                                                                              Entropy (8bit):7.614795893376107
                                                                              Encrypted:false
                                                                              SSDEEP:192:6JVLuam+BbAnJ3BVgVbWZg0nEljHr/9c2oJNEHLydrOGwk5MIHToDdzaIka7lS3N:67uamwbM/eV2ElC2ofEr4PCduoS3u5Ov
                                                                              MD5:20BCAB73E97D12E42A4719699BB72835
                                                                              SHA1:B5B8988F235B6C525474B48FE93B291DA2474DDA
                                                                              SHA-256:69EB7B474243CA5B3E24E388CC73DB43AA848BE5B25F1835D5DE53F7BA33C625
                                                                              SHA-512:DD0940653CF13EF3C2200D49E647B1DA2FB01042C66D766438C7799E15353594CA47A4CE772CF6B7814B91E91535AB34378E9E20F55AB995628D93E295607BA5
                                                                              Malicious:false
                                                                              Reputation:low
                                                                              Preview:EA06..p..[.r9u..u.I.w[..M$....9..Ct.H.....M .K..)..Et..$`.]....y...K........|.p.o..t............@../.]%.P...R.%..$.Z.G/..6. .o.@..]@...p.g./..d.P..]@...N.R)........./......r.%.9...c ....Aw.H.......F.3<..\..6...L........x.F....B^.....]. 0...Rk..B...\..5_..D.....5_..\.U...5_....U..`5_..L.U...5\..>2p..H.^.w.Z..G .z.C .....@.......0.G. /Z.H%......j^...u.B.u....$.../.C....d G_T......n`>_.......zG#.....p....@.......@...........`.M..`... ...u...@....'.".].{>K...c.H. ..]$.._..\......>K.#G.t..3|wY0.G.".]d.8_..Gu..i|wY....u.h...p........!.H..+....Hd.P;....K.rP.L..7.p.f..+..fd.I|.. .K.@...f...E...Y.4..3.)%....H@......w)4....P.....2p....<d....,vN........K.!+..'$.....,fC$..WI.......r.$.X..c2...Ip.Y.!...Gd.....,f./.... .#!....c.P......,.\.h.s.....,vJ......t.I...x40......d@...K......4..@.6.-..p..R...$...RP.N...;#.`.../.H.....G.....c.0..\...wx.....v@........E....K.y6....p.c2..."..b.!....F ...@B5u.Ie.........vB......d.[..^...B20....;..X...w.HA.......p..e.....$r....u...
                                                                              Process:C:\Users\user\Desktop\qUG1ZROxLJ.exe
                                                                              File Type:MIPSEB MIPS-II ECOFF executable not stripped - version 57.90
                                                                              Category:dropped
                                                                              Size (bytes):93696
                                                                              Entropy (8bit):6.8792074390067155
                                                                              Encrypted:false
                                                                              SSDEEP:1536:ht8zY1HSewR0kF9mm39NJ0ynJdp3UwhB28U3Q2Jq3ZimKBV45+Vf:huY5S1dzNv0YJhB28U63ZiW+B
                                                                              MD5:EF20059C5A87E0F794FE27701823F565
                                                                              SHA1:DDF0BD01B81DBFEEB681DBDE8F5EE940773A4A46
                                                                              SHA-256:A0368A765BFF22FC7095912F21B9DDB58F31F6A44635D62ACE5E477AF5E18239
                                                                              SHA-512:5CBF32171122E0D66D744DA5EA415ACB67F74F40211040956C100DB5D655E307FCAAAC69F3E511007A930BCA09C2353FDEFF8041C26C37B8FF49C0063F5FE348
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Reputation:low
                                                                              Preview:.c.WLWS1]YR9..DQ.V2LYT9ZrL93WOWS1YYR9I4DQQV2LYT9Z2L93WOWS1YY.9I4JN.X2.P...3....'> .)+=^;U)q27\"6 .8WlKF9o>=.....$[ 4.[?F}T9Z2L93..WS}XZR.'|.QQV2LYT9.2N88V.WSUXYR1I4DQQV..XT9z2L9.VOWSqYYr9I4FQQR2LYT9Z2J93WOWS1Y.S9I6DQQV2L[TY.2L)3W_WS1YIR9Y4DQQV2\YT9Z2L93WOW..XY.9I4D.PV.IYT9Z2L93WOWS1YYR9I4.PQZ2LYT9Z2L93WOWS1YYR9I4DQQV2LYT9Z2L93WOWS1YYR9I4DQQV2LyT9R2L93WOWS1YYZ.I4.QQV2LYT9Z2L.G27#S1Y.08I4dQQVVMYT;Z2L93WOWS1YYR9i4D1.$A>:T9Z.I93W.VS1_YR9/5DQQV2LYT9Z2L9sWO.}C<5=ZI4HQQV2.XT9X2L9_VOWS1YYR9I4DQQ.2L.T9Z2L93WOWS1YYR9.EQQV2L.T9Z0L<3..WS5.YR:I4D.QV4.T9.2L93WOWS1YYR9I4DQQV2LYT9Z2L93WOWS1YYR9I4DQQ.O.V..[?..WOWS1YXP:M2LYQV2LYT9ZLL93.OWSqYYR.I4DtQV2!YT9~2L9MWOW-1YY69I46QQVSLYT~Z2LV3WO9S1Y'R9I*FyNV2Fsr9X.l93]O}.BxYR3.5DQU%.LY^.X2L=@tOWY.ZYR=:.DQ[.6LYPJ.2L3.ROWW..YQ._2DQJ9.LY^9Y.Y?3WT}u1[qk9I>D{wV1.LR9Z)f.3U.^S1]s.JT4DWy.2LS 0Z2N.9WOSy/[q.9I>ns/E2L].9p.2-3WK|S.{'G9I0oQ{tLZYT=q2f.M@OWW.YsT.+46.]VBO659Z4d.3WE..1Y_R.s4:_QV6N6.9Z8j..Wg.S1_YzoI4BQy.2L_T..2L?3..WS7Ysh9adDQWV..YT?Z..9MdOWW.^'a9I0oG/g2L].?"2
                                                                              Process:C:\Users\user\Desktop\qUG1ZROxLJ.exe
                                                                              File Type:ASCII text, with very long lines (28674), with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):28674
                                                                              Entropy (8bit):3.5837418241448984
                                                                              Encrypted:false
                                                                              SSDEEP:768:X9KA+dD7KzCaynKpACXECY9xMBHZBK3fy3D26dSrxlO:UA+R7+BG63D264a
                                                                              MD5:BDD7F4556E12DB436605D2B6AFAE852B
                                                                              SHA1:A60876944E9C7EA8A842B12A1B3ED2055A9CBE5B
                                                                              SHA-256:0EFED47FC0C4CC15C72ED7F27B6EB4626D201D09C0AF8B3EF083ECF6108ABA4B
                                                                              SHA-512:438A098C93AF652A94F90BB8A5BD87DBE0F63AED7D6E09706E2469745B2EE51EDD683C9DF3806B8E472E50FD5A2FE50BD445DC10710889BFCF401686A486950D
                                                                              Malicious:false
                                                                              Reputation:low
                                                                              Preview:&n##.tsu.'suuu&$&&&&# #!t. t&&&&&& ./"#."t/ #&&&&&& ./"r. tw!$&&&&&& ./##..t. s&&&&&& ./"#.wt/ #&&&&&& ./"r.utw u&&&&&& ./##.st.%%&&&&&& ./"#/&t/%$&&&&&& ./"r/$tw$s&&&&&& ./##/"t. "&&&&&& ./"#/ t/ u&&&&&& ./"r/.tw u&&&&&& ./##/w%%u& ./"#/ut/ s&&&&&& ./.r""pppppptw!"&&&&&& .//#" ppppppt. "&&&&&& ./.#".ppppppt/ u&&&&&& ./.r"wpppppptw u&&&&&& .//#"uppppppt.$s&&&&&& ./.#"sppppppt/ "&&&&&& ./.r#&pppppptw u&&&&&& .//##$ppppppt. u&&&&&& ./.##"pppppp%%u/ ./.r# pppppptw!#&&&&&& ./##r&t.!%&&&&&& ./"#r$t/ #&&&&&& ./"rr"tw!$&&&&&& ./##r t.%%&&&&&& ./"#r.t/%$&&&&&& ./"rrwtw$s&&&&&& ./##rut. "&&&&&& ./"#rst/ u&&&&&& ./"rs&tw u&&&&&& ./##s$%%u& ./"#s"t/ '&&&&&& ./.r .pppppptw "&&&&&& .//# wppppppt.! &&&&&& ./.# uppppppt/ '&&&&&& ./.r spppppptw!&&&&&&& .//#!&ppppppt. /&&&&&& ./.#!$ppppppt/%%&&&&&& ./.r!"pppppptw%$&&&&&& .//#! ppppppt.$s&&&&&& ./.#!.ppppppt/ "&&&&&& ./.r!wpppppptw u&&&&&& .//#!uppppppt. u&&&&&& ./.#!spppppp%%u/ ./"r.&tw!%&&&&&& ./##w&t. .
                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                              Entropy (8bit):0.15473164189464864
                                                                              TrID:
                                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                              • DOS Executable Generic (2002/1) 0.02%
                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                              File name:qUG1ZROxLJ.exe
                                                                              File size:80'740'352 bytes
                                                                              MD5:9994ce2c42925fa3ba3a03ac57e9f9db
                                                                              SHA1:4cba142aed0bc5019485e58d90dd50f4ca97de34
                                                                              SHA256:5e013ceed78a1934a9b2cb464c372b4b9c89e0228344d19c8d0132355d015c36
                                                                              SHA512:3d057d7acac43f708a926627393ed22da88ce4e2441c5fc0a456ab05b7def5ae2b1814655eabc74e6bd65f25a7c5646517c93ef97e68c7c4e9217db2914cb8aa
                                                                              SSDEEP:24576:Ru6J33O0c+JY5UZ+XC0kGso6FabA+6MyjJGFxdWY:Du0c++OCvkGs9FabA+6NjwFOY
                                                                              TLSH:3008AE2273DDC360CB669173BF69B7056EBF7C614630B85B2F880D7DA960162162C7A3
                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                                              Icon Hash:aaf3e3e3938382a0
                                                                              Entrypoint:0x427dcd
                                                                              Entrypoint Section:.text
                                                                              Digitally signed:false
                                                                              Imagebase:0x400000
                                                                              Subsystem:windows gui
                                                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                              Time Stamp:0x67B5EA61 [Wed Feb 19 14:27:45 2025 UTC]
                                                                              TLS Callbacks:
                                                                              CLR (.Net) Version:
                                                                              OS Version Major:5
                                                                              OS Version Minor:1
                                                                              File Version Major:5
                                                                              File Version Minor:1
                                                                              Subsystem Version Major:5
                                                                              Subsystem Version Minor:1
                                                                              Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                                              Instruction
                                                                              call 00007F947CFB870Ah
                                                                              jmp 00007F947CFAB4D4h
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              push edi
                                                                              push esi
                                                                              mov esi, dword ptr [esp+10h]
                                                                              mov ecx, dword ptr [esp+14h]
                                                                              mov edi, dword ptr [esp+0Ch]
                                                                              mov eax, ecx
                                                                              mov edx, ecx
                                                                              add eax, esi
                                                                              cmp edi, esi
                                                                              jbe 00007F947CFAB65Ah
                                                                              cmp edi, eax
                                                                              jc 00007F947CFAB9BEh
                                                                              bt dword ptr [004C31FCh], 01h
                                                                              jnc 00007F947CFAB659h
                                                                              rep movsb
                                                                              jmp 00007F947CFAB96Ch
                                                                              cmp ecx, 00000080h
                                                                              jc 00007F947CFAB824h
                                                                              mov eax, edi
                                                                              xor eax, esi
                                                                              test eax, 0000000Fh
                                                                              jne 00007F947CFAB660h
                                                                              bt dword ptr [004BE324h], 01h
                                                                              jc 00007F947CFABB30h
                                                                              bt dword ptr [004C31FCh], 00000000h
                                                                              jnc 00007F947CFAB7FDh
                                                                              test edi, 00000003h
                                                                              jne 00007F947CFAB80Eh
                                                                              test esi, 00000003h
                                                                              jne 00007F947CFAB7EDh
                                                                              bt edi, 02h
                                                                              jnc 00007F947CFAB65Fh
                                                                              mov eax, dword ptr [esi]
                                                                              sub ecx, 04h
                                                                              lea esi, dword ptr [esi+04h]
                                                                              mov dword ptr [edi], eax
                                                                              lea edi, dword ptr [edi+04h]
                                                                              bt edi, 03h
                                                                              jnc 00007F947CFAB663h
                                                                              movq xmm1, qword ptr [esi]
                                                                              sub ecx, 08h
                                                                              lea esi, dword ptr [esi+08h]
                                                                              movq qword ptr [edi], xmm1
                                                                              lea edi, dword ptr [edi+08h]
                                                                              test esi, 00000007h
                                                                              je 00007F947CFAB6B5h
                                                                              bt esi, 03h
                                                                              jnc 00007F947CFAB708h
                                                                              Programming Language:
                                                                              • [ASM] VS2013 build 21005
                                                                              • [ C ] VS2013 build 21005
                                                                              • [C++] VS2013 build 21005
                                                                              • [ C ] VS2008 SP1 build 30729
                                                                              • [IMP] VS2008 SP1 build 30729
                                                                              • [ASM] VS2013 UPD4 build 31101
                                                                              • [RES] VS2013 build 21005
                                                                              • [LNK] VS2013 UPD4 build 31101
                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x22d00.rsrc
                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xea0000x711c.reloc
                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                              .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                              .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              .rsrc0xc70000x22d000x22e007c7b7c077195dc094322aef53ee9f383False0.8110089045698925data7.568321509896291IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .reloc0xea0000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                              RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                              RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                              RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                              RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                              RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                              RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                              RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                              RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                              RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                              RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                              RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                              RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                                              RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                              RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                                              RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                                              RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                              RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                              RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                              RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                              RT_RCDATA0xcf7b80x19fc8data1.0003851935362646
                                                                              RT_GROUP_ICON0xe97800x76dataEnglishGreat Britain0.6610169491525424
                                                                              RT_GROUP_ICON0xe97f80x14dataEnglishGreat Britain1.25
                                                                              RT_GROUP_ICON0xe980c0x14dataEnglishGreat Britain1.15
                                                                              RT_GROUP_ICON0xe98200x14dataEnglishGreat Britain1.25
                                                                              RT_VERSION0xe98340xdcdataEnglishGreat Britain0.6181818181818182
                                                                              RT_MANIFEST0xe99100x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                              DLLImport
                                                                              WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                                              VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                              COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                              MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                                              WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                                              PSAPI.DLLGetProcessMemoryInfo
                                                                              IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                                              USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                                              UxTheme.dllIsThemeActive
                                                                              KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                                              USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                                              GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                                              COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                                              ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                                              SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                              ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                                              OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                                              DescriptionData
                                                                              Translation0x0809 0x04b0
                                                                              Language of compilation systemCountry where language is spokenMap
                                                                              EnglishGreat Britain
                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                              2025-03-07T16:17:40.163515+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949683132.226.247.7380TCP
                                                                              2025-03-07T16:17:49.788507+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949683132.226.247.7380TCP
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Mar 7, 2025 16:17:38.827034950 CET4968380192.168.2.9132.226.247.73
                                                                              Mar 7, 2025 16:17:38.832215071 CET8049683132.226.247.73192.168.2.9
                                                                              Mar 7, 2025 16:17:38.832281113 CET4968380192.168.2.9132.226.247.73
                                                                              Mar 7, 2025 16:17:38.832542896 CET4968380192.168.2.9132.226.247.73
                                                                              Mar 7, 2025 16:17:38.837599039 CET8049683132.226.247.73192.168.2.9
                                                                              Mar 7, 2025 16:17:39.545331001 CET8049683132.226.247.73192.168.2.9
                                                                              Mar 7, 2025 16:17:39.601052046 CET4968380192.168.2.9132.226.247.73
                                                                              Mar 7, 2025 16:17:39.910037994 CET4968380192.168.2.9132.226.247.73
                                                                              Mar 7, 2025 16:17:39.915237904 CET8049683132.226.247.73192.168.2.9
                                                                              Mar 7, 2025 16:17:40.121911049 CET8049683132.226.247.73192.168.2.9
                                                                              Mar 7, 2025 16:17:40.147618055 CET49684443192.168.2.9104.21.80.1
                                                                              Mar 7, 2025 16:17:40.147660017 CET44349684104.21.80.1192.168.2.9
                                                                              Mar 7, 2025 16:17:40.147718906 CET49684443192.168.2.9104.21.80.1
                                                                              Mar 7, 2025 16:17:40.163515091 CET4968380192.168.2.9132.226.247.73
                                                                              Mar 7, 2025 16:17:40.239161015 CET49684443192.168.2.9104.21.80.1
                                                                              Mar 7, 2025 16:17:40.239193916 CET44349684104.21.80.1192.168.2.9
                                                                              Mar 7, 2025 16:17:42.404083967 CET44349684104.21.80.1192.168.2.9
                                                                              Mar 7, 2025 16:17:42.404200077 CET49684443192.168.2.9104.21.80.1
                                                                              Mar 7, 2025 16:17:42.431021929 CET49684443192.168.2.9104.21.80.1
                                                                              Mar 7, 2025 16:17:42.431045055 CET44349684104.21.80.1192.168.2.9
                                                                              Mar 7, 2025 16:17:42.431525946 CET44349684104.21.80.1192.168.2.9
                                                                              Mar 7, 2025 16:17:42.475986958 CET49684443192.168.2.9104.21.80.1
                                                                              Mar 7, 2025 16:17:42.537414074 CET49684443192.168.2.9104.21.80.1
                                                                              Mar 7, 2025 16:17:42.584335089 CET44349684104.21.80.1192.168.2.9
                                                                              Mar 7, 2025 16:17:42.962030888 CET44349684104.21.80.1192.168.2.9
                                                                              Mar 7, 2025 16:17:42.962114096 CET44349684104.21.80.1192.168.2.9
                                                                              Mar 7, 2025 16:17:42.962193012 CET49684443192.168.2.9104.21.80.1
                                                                              Mar 7, 2025 16:17:43.136521101 CET49684443192.168.2.9104.21.80.1
                                                                              Mar 7, 2025 16:17:49.535073996 CET4968380192.168.2.9132.226.247.73
                                                                              Mar 7, 2025 16:17:49.540211916 CET8049683132.226.247.73192.168.2.9
                                                                              Mar 7, 2025 16:17:49.743268967 CET8049683132.226.247.73192.168.2.9
                                                                              Mar 7, 2025 16:17:49.788506985 CET4968380192.168.2.9132.226.247.73
                                                                              Mar 7, 2025 16:17:50.212796926 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:50.217984915 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:50.218086004 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:50.828547955 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:50.828829050 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:50.833807945 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:50.971332073 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:50.971645117 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:50.976666927 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:51.115993023 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:51.116822958 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:51.121865988 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:51.292627096 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:51.292650938 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:51.292664051 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:51.292778015 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:51.362389088 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:51.367417097 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:51.505404949 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:51.509227037 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:51.514290094 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:51.652851105 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:51.658081055 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:51.663242102 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:51.801217079 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:51.851161003 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:51.860764027 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:51.865772009 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:52.024537086 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:52.024897099 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:52.029978991 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:52.167210102 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:52.167460918 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:52.172466993 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:52.335052013 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:52.335391998 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:52.340446949 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:52.480346918 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:52.489758015 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:52.489959955 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:52.489959955 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:52.489959955 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:52.490025997 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:52.490087032 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:52.490124941 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:52.490155935 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:17:52.494748116 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:52.494910955 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:52.494921923 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:52.495023012 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:52.495299101 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:52.495309114 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:52.702429056 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:17:52.757297039 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:18:39.789192915 CET4968380192.168.2.9132.226.247.73
                                                                              Mar 7, 2025 16:18:39.794440031 CET8049683132.226.247.73192.168.2.9
                                                                              Mar 7, 2025 16:18:39.794537067 CET4968380192.168.2.9132.226.247.73
                                                                              Mar 7, 2025 16:19:29.804553986 CET49685587192.168.2.9198.59.144.139
                                                                              Mar 7, 2025 16:19:29.809675932 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:19:29.947669983 CET58749685198.59.144.139192.168.2.9
                                                                              Mar 7, 2025 16:19:29.948276997 CET49685587192.168.2.9198.59.144.139
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Mar 7, 2025 16:17:38.587377071 CET5663253192.168.2.91.1.1.1
                                                                              Mar 7, 2025 16:17:38.595705986 CET53566321.1.1.1192.168.2.9
                                                                              Mar 7, 2025 16:17:40.138576984 CET5445353192.168.2.91.1.1.1
                                                                              Mar 7, 2025 16:17:40.146925926 CET53544531.1.1.1192.168.2.9
                                                                              Mar 7, 2025 16:17:49.785573006 CET5723153192.168.2.91.1.1.1
                                                                              Mar 7, 2025 16:17:50.211213112 CET53572311.1.1.1192.168.2.9
                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                              Mar 7, 2025 16:17:38.587377071 CET192.168.2.91.1.1.10x8667Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                              Mar 7, 2025 16:17:40.138576984 CET192.168.2.91.1.1.10xf916Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                              Mar 7, 2025 16:17:49.785573006 CET192.168.2.91.1.1.10x8410Standard query (0)mail.grupomaya.mxA (IP address)IN (0x0001)false
                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                              Mar 7, 2025 16:17:38.595705986 CET1.1.1.1192.168.2.90x8667No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                              Mar 7, 2025 16:17:38.595705986 CET1.1.1.1192.168.2.90x8667No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                              Mar 7, 2025 16:17:38.595705986 CET1.1.1.1192.168.2.90x8667No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                              Mar 7, 2025 16:17:38.595705986 CET1.1.1.1192.168.2.90x8667No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                              Mar 7, 2025 16:17:38.595705986 CET1.1.1.1192.168.2.90x8667No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                              Mar 7, 2025 16:17:38.595705986 CET1.1.1.1192.168.2.90x8667No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                              Mar 7, 2025 16:17:40.146925926 CET1.1.1.1192.168.2.90xf916No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                              Mar 7, 2025 16:17:40.146925926 CET1.1.1.1192.168.2.90xf916No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                              Mar 7, 2025 16:17:40.146925926 CET1.1.1.1192.168.2.90xf916No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                              Mar 7, 2025 16:17:40.146925926 CET1.1.1.1192.168.2.90xf916No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                              Mar 7, 2025 16:17:40.146925926 CET1.1.1.1192.168.2.90xf916No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                              Mar 7, 2025 16:17:40.146925926 CET1.1.1.1192.168.2.90xf916No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                              Mar 7, 2025 16:17:40.146925926 CET1.1.1.1192.168.2.90xf916No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                              Mar 7, 2025 16:17:50.211213112 CET1.1.1.1192.168.2.90x8410No error (0)mail.grupomaya.mxgrupomaya.mxCNAME (Canonical name)IN (0x0001)false
                                                                              Mar 7, 2025 16:17:50.211213112 CET1.1.1.1192.168.2.90x8410No error (0)grupomaya.mx198.59.144.139A (IP address)IN (0x0001)false
                                                                              • reallyfreegeoip.org
                                                                              • checkip.dyndns.org
                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              0192.168.2.949683132.226.247.73806924C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Mar 7, 2025 16:17:38.832542896 CET151OUTGET / HTTP/1.1
                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                              Host: checkip.dyndns.org
                                                                              Connection: Keep-Alive
                                                                              Mar 7, 2025 16:17:39.545331001 CET273INHTTP/1.1 200 OK
                                                                              Date: Fri, 07 Mar 2025 15:17:39 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 104
                                                                              Connection: keep-alive
                                                                              Cache-Control: no-cache
                                                                              Pragma: no-cache
                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                              Mar 7, 2025 16:17:39.910037994 CET127OUTGET / HTTP/1.1
                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                              Host: checkip.dyndns.org
                                                                              Mar 7, 2025 16:17:40.121911049 CET273INHTTP/1.1 200 OK
                                                                              Date: Fri, 07 Mar 2025 15:17:40 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 104
                                                                              Connection: keep-alive
                                                                              Cache-Control: no-cache
                                                                              Pragma: no-cache
                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                              Mar 7, 2025 16:17:49.535073996 CET127OUTGET / HTTP/1.1
                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                              Host: checkip.dyndns.org
                                                                              Mar 7, 2025 16:17:49.743268967 CET273INHTTP/1.1 200 OK
                                                                              Date: Fri, 07 Mar 2025 15:17:49 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 104
                                                                              Connection: keep-alive
                                                                              Cache-Control: no-cache
                                                                              Pragma: no-cache
                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              0192.168.2.949684104.21.80.14436924C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2025-03-07 15:17:42 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                              Host: reallyfreegeoip.org
                                                                              Connection: Keep-Alive
                                                                              2025-03-07 15:17:42 UTC866INHTTP/1.1 200 OK
                                                                              Date: Fri, 07 Mar 2025 15:17:42 GMT
                                                                              Content-Type: text/xml
                                                                              Content-Length: 362
                                                                              Connection: close
                                                                              Age: 3218
                                                                              Cache-Control: max-age=31536000
                                                                              cf-cache-status: HIT
                                                                              last-modified: Fri, 07 Mar 2025 14:24:03 GMT
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=S6BsiAvaN5OP1y5%2BA8TGNcwVHMuCZWpdKlGG9A3%2BTmGNW1nzN4m8DXDX9zeV9SxWMFk7r2K8W4rmcbs%2F%2Fz24eSORL%2BmWr37o8AB%2FLnns%2BCejOmb%2FNgqltMXdCgzdUwBSk9llOpJa"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 91cb0fae187df88d-IAD
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=120573&min_rtt=39014&rtt_var=152342&sent=7&recv=9&lost=0&retrans=2&sent_bytes=5696&recv_bytes=699&delivery_rate=7488&cwnd=251&unsent_bytes=0&cid=00a96c00c1099d67&ts=1060&x=0"
                                                                              2025-03-07 15:17:42 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                              TimestampSource PortDest PortSource IPDest IPCommands
                                                                              Mar 7, 2025 16:17:50.828547955 CET58749685198.59.144.139192.168.2.9220-svgt326.serverneubox.com.mx ESMTP Exim 4.98.1 #2 Fri, 07 Mar 2025 09:17:50 -0600
                                                                              220-We do not authorize the use of this system to transport unsolicited,
                                                                              220 and/or bulk e-mail.
                                                                              Mar 7, 2025 16:17:50.828829050 CET49685587192.168.2.9198.59.144.139EHLO 210979
                                                                              Mar 7, 2025 16:17:50.971332073 CET58749685198.59.144.139192.168.2.9250-svgt326.serverneubox.com.mx Hello 210979 [8.46.123.189]
                                                                              250-SIZE 52428800
                                                                              250-LIMITS MAILMAX=1000 RCPTMAX=50000
                                                                              250-8BITMIME
                                                                              250-PIPELINING
                                                                              250-PIPECONNECT
                                                                              250-AUTH PLAIN LOGIN
                                                                              250-STARTTLS
                                                                              250 HELP
                                                                              Mar 7, 2025 16:17:50.971645117 CET49685587192.168.2.9198.59.144.139STARTTLS
                                                                              Mar 7, 2025 16:17:51.115993023 CET58749685198.59.144.139192.168.2.9220 TLS go ahead

                                                                              Click to jump to process

                                                                              Click to jump to process

                                                                              Click to dive into process behavior distribution

                                                                              Click to jump to process

                                                                              Target ID:0
                                                                              Start time:10:17:35
                                                                              Start date:07/03/2025
                                                                              Path:C:\Users\user\Desktop\qUG1ZROxLJ.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\Desktop\qUG1ZROxLJ.exe"
                                                                              Imagebase:0x5a0000
                                                                              File size:80'740'352 bytes
                                                                              MD5 hash:9994CE2C42925FA3BA3A03AC57E9F9DB
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_MSILLogger, Description: Yara detected MSIL Logger, Source: 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                              • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.968127790.0000000001DA0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Target ID:1
                                                                              Start time:10:17:36
                                                                              Start date:07/03/2025
                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\Desktop\qUG1ZROxLJ.exe"
                                                                              Imagebase:0xde0000
                                                                              File size:45'984 bytes
                                                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_MSILLogger, Description: Yara detected MSIL Logger, Source: 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.2216653430.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.2218019806.0000000003036000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              Reputation:high
                                                                              Has exited:false

                                                                              Reset < >