Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NmuA605dM4.exe

Overview

General Information

Sample name:NmuA605dM4.exe
renamed because original name is a hash value
Original sample name:bd60ebef71e2759f1b06ca6766f8d21d418a8fa99d69d0009004d461b8cb6f87.exe
Analysis ID:1632203
MD5:0d36f475590e673e4303bc2beb338d72
SHA1:fbea0f77026dfd797473578ac35504842ef9f20c
SHA256:bd60ebef71e2759f1b06ca6766f8d21d418a8fa99d69d0009004d461b8cb6f87
Tags:exeSnakeKeyloggeruser-adrian__luca
Infos:

Detection

MSIL Logger, MassLogger RAT
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected MSIL Logger
Yara detected MassLogger RAT
Yara detected Telegram RAT
.NET source code references suspicious native API functions
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • NmuA605dM4.exe (PID: 7064 cmdline: "C:\Users\user\Desktop\NmuA605dM4.exe" MD5: 0D36F475590E673E4303BC2BEB338D72)
    • RegSvcs.exe (PID: 6284 cmdline: "C:\Users\user\Desktop\NmuA605dM4.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"EXfil Mode": "SMTP", "From": "securityz@grupomaya.mx", "Password": "    54460hetteXzeLJ  Z+l!UyU_nadu     \u2605\u0b9c\u0b9c", "Server": "mail.grupomaya.mx", "Port": 587}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
        00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0xefb7:$a1: get_encryptedPassword
          • 0xf2df:$a2: get_encryptedUsername
          • 0xed52:$a3: get_timePasswordChanged
          • 0xee73:$a4: get_passwordField
          • 0xefcd:$a5: set_encryptedPassword
          • 0x10929:$a7: get_logins
          • 0x105da:$a8: GetOutlookPasswords
          • 0x103cc:$a9: StartKeylogger
          • 0x10879:$a10: KeyLoggerEventArgs
          • 0x10429:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 18 entries
          SourceRuleDescriptionAuthorStrings
          2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
                2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  2.2.RegSvcs.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                  • 0xf1b7:$a1: get_encryptedPassword
                  • 0xf4df:$a2: get_encryptedUsername
                  • 0xef52:$a3: get_timePasswordChanged
                  • 0xf073:$a4: get_passwordField
                  • 0xf1cd:$a5: set_encryptedPassword
                  • 0x10b29:$a7: get_logins
                  • 0x107da:$a8: GetOutlookPasswords
                  • 0x105cc:$a9: StartKeylogger
                  • 0x10a79:$a10: KeyLoggerEventArgs
                  • 0x10629:$a11: KeyLoggerEventArgsEventHandler
                  Click to see the 13 entries

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 198.59.144.139, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 6284, Protocol: tcp, SourceIp: 192.168.2.10, SourceIsIpv6: false, SourcePort: 49686
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-07T20:51:52.329502+010028032742Potentially Bad Traffic192.168.2.1049681132.226.8.16980TCP
                  2025-03-07T20:52:01.470071+010028032742Potentially Bad Traffic192.168.2.1049681132.226.8.16980TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: NmuA605dM4.exeAvira: detected
                  Source: 0.2.NmuA605dM4.exe.1850000.1.raw.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "securityz@grupomaya.mx", "Password": " 54460hetteXzeLJ Z+l!UyU_nadu \u2605\u0b9c\u0b9c", "Server": "mail.grupomaya.mx", "Port": 587}
                  Source: NmuA605dM4.exeVirustotal: Detection: 54%Perma Link
                  Source: NmuA605dM4.exeReversingLabs: Detection: 50%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: NmuA605dM4.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.10:49682 version: TLS 1.0
                  Source: Binary string: wntdll.pdbUGP source: NmuA605dM4.exe, 00000000.00000003.1099754245.0000000004280000.00000004.00001000.00020000.00000000.sdmp, NmuA605dM4.exe, 00000000.00000003.1102066896.0000000004100000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: NmuA605dM4.exe, 00000000.00000003.1099754245.0000000004280000.00000004.00001000.00020000.00000000.sdmp, NmuA605dM4.exe, 00000000.00000003.1102066896.0000000004100000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A7445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00A7445A
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A7C6D1 FindFirstFileW,FindClose,0_2_00A7C6D1
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A7C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00A7C75C
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A7EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A7EF95
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A7F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A7F0F2
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A7F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00A7F3F3
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A737EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A737EF
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A73B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A73B12
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A7BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00A7BCBC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02B1A7D8h2_2_02B1A3C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02B1A0B1h2_2_02B19E00
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02B1E640h2_2_02B1E220
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02B1A7D8h2_2_02B1A3B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02B1EA98h2_2_02B1E7F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02B1A7D8h2_2_02B1A706
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02B1EEF0h2_2_02B1EC48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02B1F348h2_2_02B1F0A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02B1F7A0h2_2_02B1F4F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02B1FBF8h2_2_02B1F950
                  Source: global trafficTCP traffic: 192.168.2.10:49686 -> 198.59.144.139:587
                  Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                  Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
                  Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
                  Source: Joe Sandbox ViewASN Name: HYPEENT-SJUS HYPEENT-SJUS
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49681 -> 132.226.8.169:80
                  Source: global trafficTCP traffic: 192.168.2.10:49686 -> 198.59.144.139:587
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.10:49682 version: TLS 1.0
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A822EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00A822EE
                  Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: global trafficDNS traffic detected: DNS query: mail.grupomaya.mx
                  Source: RegSvcs.exe, 00000002.00000002.2358304237.0000000002E30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: RegSvcs.exe, 00000002.00000002.2358304237.0000000002E30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                  Source: RegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002E30000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002E1E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: RegSvcs.exe, 00000002.00000002.2358304237.0000000002DB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: RegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002E30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                  Source: NmuA605dM4.exe, 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: RegSvcs.exe, 00000002.00000002.2358304237.0000000002E30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                  Source: RegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://grupomaya.mx
                  Source: RegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://grupomaya.mxd
                  Source: RegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.grupomaya.mx
                  Source: RegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.grupomaya.mxd
                  Source: RegSvcs.exe, 00000002.00000002.2357348536.0000000000FD7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2360117491.0000000006264000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2360117491.0000000006254000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.org/0
                  Source: RegSvcs.exe, 00000002.00000002.2357348536.0000000000FD7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2360117491.0000000006264000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2360117491.0000000006254000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org0#
                  Source: RegSvcs.exe, 00000002.00000002.2358304237.0000000002E51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                  Source: RegSvcs.exe, 00000002.00000002.2358304237.0000000002E51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                  Source: RegSvcs.exe, 00000002.00000002.2358304237.0000000002DB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: RegSvcs.exe, 00000002.00000002.2360117491.0000000006264000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2360117491.0000000006254000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                  Source: RegSvcs.exe, 00000002.00000002.2360117491.0000000006264000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2360117491.0000000006254000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                  Source: RegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: NmuA605dM4.exe, 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                  Source: RegSvcs.exe, 00000002.00000002.2358304237.0000000002E30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: NmuA605dM4.exe, 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002E30000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: RegSvcs.exe, 00000002.00000002.2358304237.0000000002E30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/d
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49682
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49682 -> 443

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.NmuA605dM4.exe.1850000.1.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A84164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00A84164
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A84164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00A84164
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A83F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00A83F66
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A7001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00A7001C
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A9CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00A9CABC

                  System Summary

                  barindex
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.NmuA605dM4.exe.1850000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.NmuA605dM4.exe.1850000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.NmuA605dM4.exe.1850000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.NmuA605dM4.exe.1850000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: Process Memory Space: NmuA605dM4.exe PID: 7064, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: RegSvcs.exe PID: 6284, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: This is a third-party compiled AutoIt script.0_2_00A13B3A
                  Source: NmuA605dM4.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: NmuA605dM4.exe, 00000000.00000000.1088775342.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_6b1cc5f5-1
                  Source: NmuA605dM4.exe, 00000000.00000000.1088775342.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_eeb1a3c1-1
                  Source: NmuA605dM4.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_aeef38c9-3
                  Source: NmuA605dM4.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_262d08e1-2
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A7A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00A7A1EF
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A68310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00A68310
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A751BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00A751BD
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A1E6A00_2_00A1E6A0
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A3D9750_2_00A3D975
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A321C50_2_00A321C5
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A462D20_2_00A462D2
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A903DA0_2_00A903DA
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A4242E0_2_00A4242E
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A325FA0_2_00A325FA
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A266E10_2_00A266E1
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A6E6160_2_00A6E616
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A4878F0_2_00A4878F
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A788890_2_00A78889
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A288080_2_00A28808
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A468440_2_00A46844
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A908570_2_00A90857
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A3CB210_2_00A3CB21
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A46DB60_2_00A46DB6
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A26F9E0_2_00A26F9E
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A230300_2_00A23030
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A331870_2_00A33187
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A3F1D90_2_00A3F1D9
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A112870_2_00A11287
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A314840_2_00A31484
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A255200_2_00A25520
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A376960_2_00A37696
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A257600_2_00A25760
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A319780_2_00A31978
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A49AB50_2_00A49AB5
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A1FCE00_2_00A1FCE0
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A3BDA60_2_00A3BDA6
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A31D900_2_00A31D90
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A97DDB0_2_00A97DDB
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A23FE00_2_00A23FE0
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A1DF000_2_00A1DF00
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_018436200_2_01843620
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B127B92_2_02B127B9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B12DD12_2_02B12DD1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B1DB082_2_02B1DB08
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B19E002_2_02B19E00
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B1E2202_2_02B1E220
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B1E7F02_2_02B1E7F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B1E7E02_2_02B1E7E0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B1EC392_2_02B1EC39
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B1EC482_2_02B1EC48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B1F0A02_2_02B1F0A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B1F0902_2_02B1F090
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B1F4F82_2_02B1F4F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B1F4E82_2_02B1F4E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B1F9502_2_02B1F950
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B1F9412_2_02B1F941
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B19DEF2_2_02B19DEF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_063C5E0C2_2_063C5E0C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_063CB6502_2_063CB650
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_063C32002_2_063C3200
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_063C6C712_2_063C6C71
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_063C4A602_2_063C4A60
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: String function: 00A30AE3 appears 70 times
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: String function: 00A17DE1 appears 35 times
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: String function: 00A38900 appears 42 times
                  Source: NmuA605dM4.exe, 00000000.00000003.1102311447.00000000043CD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs NmuA605dM4.exe
                  Source: NmuA605dM4.exe, 00000000.00000003.1100275212.0000000004203000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs NmuA605dM4.exe
                  Source: NmuA605dM4.exe, 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs NmuA605dM4.exe
                  Source: NmuA605dM4.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.NmuA605dM4.exe.1850000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.NmuA605dM4.exe.1850000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.NmuA605dM4.exe.1850000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.NmuA605dM4.exe.1850000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: Process Memory Space: NmuA605dM4.exe PID: 7064, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: RegSvcs.exe PID: 6284, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.NmuA605dM4.exe.1850000.1.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.NmuA605dM4.exe.1850000.1.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@3/3
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A7A06A GetLastError,FormatMessageW,0_2_00A7A06A
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A681CB AdjustTokenPrivileges,CloseHandle,0_2_00A681CB
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A687E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00A687E1
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A7B3FB SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00A7B3FB
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A8EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00A8EE0D
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A883BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00A883BB
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A14E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00A14E89
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeFile created: C:\Users\user\AppData\Local\Temp\autA08E.tmpJump to behavior
                  Source: NmuA605dM4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.2358304237.0000000002EA3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002EC6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002EB2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002E94000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002ED3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2359273292.0000000003DDD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: NmuA605dM4.exeVirustotal: Detection: 54%
                  Source: NmuA605dM4.exeReversingLabs: Detection: 50%
                  Source: unknownProcess created: C:\Users\user\Desktop\NmuA605dM4.exe "C:\Users\user\Desktop\NmuA605dM4.exe"
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\NmuA605dM4.exe"
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\NmuA605dM4.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: NmuA605dM4.exeStatic file information: File size 80740352 > 1048576
                  Source: NmuA605dM4.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: NmuA605dM4.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: NmuA605dM4.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: NmuA605dM4.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: NmuA605dM4.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: NmuA605dM4.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: NmuA605dM4.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: NmuA605dM4.exe, 00000000.00000003.1099754245.0000000004280000.00000004.00001000.00020000.00000000.sdmp, NmuA605dM4.exe, 00000000.00000003.1102066896.0000000004100000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: NmuA605dM4.exe, 00000000.00000003.1099754245.0000000004280000.00000004.00001000.00020000.00000000.sdmp, NmuA605dM4.exe, 00000000.00000003.1102066896.0000000004100000.00000004.00001000.00020000.00000000.sdmp
                  Source: NmuA605dM4.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: NmuA605dM4.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: NmuA605dM4.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: NmuA605dM4.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: NmuA605dM4.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A14B37 LoadLibraryA,GetProcAddress,0_2_00A14B37
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A38945 push ecx; ret 0_2_00A38958
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B1BF80 push esp; ret 2_2_02B1BFED
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B138B0 push eax; ret 2_2_02B138EA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B138B0 push eax; ret 2_2_02B1390A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B13880 push eax; ret 2_2_02B138FA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B138F0 push eax; ret 2_2_02B138FA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B13910 push eax; ret 2_2_02B1391A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B13900 push eax; ret 2_2_02B1390A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B1BFE0 push esp; ret 2_2_02B1BFED
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A148D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00A148D7
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A95376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00A95376
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A33187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00A33187
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeAPI/Special instruction interceptor: Address: 1843244
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 931Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3193Jump to behavior
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-105435
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeAPI coverage: 4.7 %
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A7445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00A7445A
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A7C6D1 FindFirstFileW,FindClose,0_2_00A7C6D1
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A7C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00A7C75C
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A7EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A7EF95
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A7F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A7F0F2
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A7F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00A7F3F3
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A737EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A737EF
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A73B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A73B12
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A7BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00A7BCBC
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A149A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00A149A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99622Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99506Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99264Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99146Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98909Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98782Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98657Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98532Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98407Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98282Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98157Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98047Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97937Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97828Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.2357348536.0000000000FD7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllte
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A83F09 BlockInput,0_2_00A83F09
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A13B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00A13B3A
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A45A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00A45A7C
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A14B37 LoadLibraryA,GetProcAddress,0_2_00A14B37
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_01843510 mov eax, dword ptr fs:[00000030h]0_2_01843510
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_018434B0 mov eax, dword ptr fs:[00000030h]0_2_018434B0
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_01841E70 mov eax, dword ptr fs:[00000030h]0_2_01841E70
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A680A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_00A680A9
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A3A124 SetUnhandledExceptionFilter,0_2_00A3A124
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A3A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A3A155
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: 0.2.NmuA605dM4.exe.1850000.1.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                  Source: 0.2.NmuA605dM4.exe.1850000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                  Source: 0.2.NmuA605dM4.exe.1850000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: C9C008Jump to behavior
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A687B1 LogonUserW,0_2_00A687B1
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A13B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00A13B3A
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A148D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00A148D7
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A74C27 mouse_event,0_2_00A74C27
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\NmuA605dM4.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A67CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00A67CAF
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A6874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00A6874B
                  Source: NmuA605dM4.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: NmuA605dM4.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A3862B cpuid 0_2_00A3862B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A44E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00A44E87
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A51E06 GetUserNameW,0_2_00A51E06
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A43F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00A43F3A
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A149A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00A149A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.NmuA605dM4.exe.1850000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.NmuA605dM4.exe.1850000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: NmuA605dM4.exe PID: 7064, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6284, type: MEMORYSTR
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.NmuA605dM4.exe.1850000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.NmuA605dM4.exe.1850000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: NmuA605dM4.exe PID: 7064, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6284, type: MEMORYSTR
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.NmuA605dM4.exe.1850000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.NmuA605dM4.exe.1850000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: NmuA605dM4.exe PID: 7064, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6284, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: NmuA605dM4.exeBinary or memory string: WIN_81
                  Source: NmuA605dM4.exeBinary or memory string: WIN_XP
                  Source: NmuA605dM4.exeBinary or memory string: WIN_XPe
                  Source: NmuA605dM4.exeBinary or memory string: WIN_VISTA
                  Source: NmuA605dM4.exeBinary or memory string: WIN_7
                  Source: NmuA605dM4.exeBinary or memory string: WIN_8
                  Source: NmuA605dM4.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.NmuA605dM4.exe.1850000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.NmuA605dM4.exe.1850000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: NmuA605dM4.exe PID: 7064, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6284, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.NmuA605dM4.exe.1850000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.NmuA605dM4.exe.1850000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: NmuA605dM4.exe PID: 7064, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6284, type: MEMORYSTR
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.NmuA605dM4.exe.1850000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.NmuA605dM4.exe.1850000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: NmuA605dM4.exe PID: 7064, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6284, type: MEMORYSTR
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.NmuA605dM4.exe.1850000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.NmuA605dM4.exe.1850000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: NmuA605dM4.exe PID: 7064, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6284, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A86283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00A86283
                  Source: C:\Users\user\Desktop\NmuA605dM4.exeCode function: 0_2_00A86747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00A86747
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  12
                  Native API
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault AccountsScheduled Task/Job2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  3
                  Obfuscated Files or Information
                  Security Account Manager1
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS127
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets131
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  23
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials11
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  NmuA605dM4.exe55%VirustotalBrowse
                  NmuA605dM4.exe50%ReversingLabsWin32.Trojan.AutoitInject
                  NmuA605dM4.exe100%AviraTR/AD.ShellcodeCrypter.yqbaa
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://mail.grupomaya.mx0%Avira URL Cloudsafe
                  http://grupomaya.mxd0%Avira URL Cloudsafe
                  http://mail.grupomaya.mxd0%Avira URL Cloudsafe
                  http://grupomaya.mx0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  reallyfreegeoip.org
                  104.21.16.1
                  truefalse
                    high
                    grupomaya.mx
                    198.59.144.139
                    truetrue
                      unknown
                      checkip.dyndns.com
                      132.226.8.169
                      truefalse
                        high
                        mail.grupomaya.mx
                        unknown
                        unknowntrue
                          unknown
                          checkip.dyndns.org
                          unknown
                          unknownfalse
                            high
                            NameMaliciousAntivirus DetectionReputation
                            http://checkip.dyndns.org/false
                              high
                              https://reallyfreegeoip.org/xml/false
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://reallyfreegeoip.org/xml/dRegSvcs.exe, 00000002.00000002.2358304237.0000000002E30000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.org/botRegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://checkip.dyndns.comdRegSvcs.exe, 00000002.00000002.2358304237.0000000002E30000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://grupomaya.mxdRegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://x1.c.lencr.org/0RegSvcs.exe, 00000002.00000002.2360117491.0000000006264000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2360117491.0000000006254000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://x1.i.lencr.org/0RegSvcs.exe, 00000002.00000002.2360117491.0000000006264000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2360117491.0000000006254000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.org/qNmuA605dM4.exe, 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                            high
                                            http://reallyfreegeoip.orgdRegSvcs.exe, 00000002.00000002.2358304237.0000000002E51000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.2358304237.0000000002E51000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://checkip.dyndns.orgdRegSvcs.exe, 00000002.00000002.2358304237.0000000002E30000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.2358304237.0000000002E30000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://mail.grupomaya.mxdRegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://r10.o.lencr.org0#RegSvcs.exe, 00000002.00000002.2357348536.0000000000FD7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2360117491.0000000006264000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2360117491.0000000006254000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://checkip.dyndns.orgRegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002E30000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002E1E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://checkip.dyndns.comRegSvcs.exe, 00000002.00000002.2358304237.0000000002E30000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://grupomaya.mxRegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://checkip.dyndns.org/dRegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002E30000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.2358304237.0000000002DB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://mail.grupomaya.mxRegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://api.telegram.org/bot-/sendDocument?chat_id=NmuA605dM4.exe, 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                high
                                                                http://r10.i.lencr.org/0RegSvcs.exe, 00000002.00000002.2357348536.0000000000FD7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2360117491.0000000006264000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2360117491.0000000006254000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  132.226.8.169
                                                                  checkip.dyndns.comUnited States
                                                                  16989UTMEMUSfalse
                                                                  104.21.16.1
                                                                  reallyfreegeoip.orgUnited States
                                                                  13335CLOUDFLARENETUSfalse
                                                                  198.59.144.139
                                                                  grupomaya.mxUnited States
                                                                  13332HYPEENT-SJUStrue
                                                                  Joe Sandbox version:42.0.0 Malachite
                                                                  Analysis ID:1632203
                                                                  Start date and time:2025-03-07 20:50:48 +01:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 6m 53s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:12
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:NmuA605dM4.exe
                                                                  renamed because original name is a hash value
                                                                  Original Sample Name:bd60ebef71e2759f1b06ca6766f8d21d418a8fa99d69d0009004d461b8cb6f87.exe
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.spyw.evad.winEXE@3/4@3/3
                                                                  EGA Information:
                                                                  • Successful, ratio: 100%
                                                                  HCA Information:
                                                                  • Successful, ratio: 99%
                                                                  • Number of executed functions: 55
                                                                  • Number of non-executed functions: 277
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
                                                                  • Excluded IPs from analysis (whitelisted): 23.199.214.10
                                                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com, c.pki.goog
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                  TimeTypeDescription
                                                                  14:52:00API Interceptor22x Sleep call for process: RegSvcs.exe modified
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  132.226.8.169XiJhd7Lx30.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • checkip.dyndns.org/
                                                                  UFOiZapHGS.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • checkip.dyndns.org/
                                                                  PvAmrCZENy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • checkip.dyndns.org/
                                                                  uB9KTHzsXJ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • checkip.dyndns.org/
                                                                  PENDING PAYMENT FOR March SOA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • checkip.dyndns.org/
                                                                  Invoice- Trikaya Bio.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • checkip.dyndns.org/
                                                                  Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                  • checkip.dyndns.org/
                                                                  QUOTATION_FEBQUOTE312025#U00faPDF.scrGet hashmaliciousMSIL LoggerBrowse
                                                                  • checkip.dyndns.org/
                                                                  rDoubleheartedness.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                  • checkip.dyndns.org/
                                                                  SAGPU05R03 - 01-YS-00052201.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                  • checkip.dyndns.org/
                                                                  104.21.16.1Shipping Document.exeGet hashmaliciousFormBookBrowse
                                                                  • www.rbopisalive.cyou/6m32/
                                                                  Payment Record.exeGet hashmaliciousLokibotBrowse
                                                                  • touxzw.ir/sccc/five/fre.php
                                                                  Invoice Remittance ref27022558.exeGet hashmaliciousFormBookBrowse
                                                                  • www.rbopisalive.cyou/a669/
                                                                  ujXpculHYDYhc6i.exeGet hashmaliciousLokibotBrowse
                                                                  • touxzw.ir/sss2/five/fre.php
                                                                  368c6e62-b031-5b65-fd43-e7a610184138.emlGet hashmaliciousHTMLPhisherBrowse
                                                                  • ce60771026585.oakdiiocese.org/p/298?session=770558a25b5d1fcbb8d81f113631d430f5b8d022cdc6d97cf6b16a412a3be9e6
                                                                  http://orico-rapaciid.xqyrr.cn/eorico/login/Get hashmaliciousUnknownBrowse
                                                                  • orico-rapaciid.xqyrr.cn/favicon.ico
                                                                  Order confirmation.exeGet hashmaliciousFormBookBrowse
                                                                  • www.englishmaterials.net/3nop/?-Z=cjlpd&Vz=5VQMUr9vdJst/aGqnmtehORilpahgrSgoeoRp4hSLdasMjOC27ijg2BR7Ep4jmwJ4Zkm
                                                                  Bank Transfer Accounting Copy.Vbs.vbsGet hashmaliciousFormBookBrowse
                                                                  • www.fz977.xyz/48bq/
                                                                  PO from tpc Type 34.1 34,2 35 Spec.jsGet hashmaliciousFormBookBrowse
                                                                  • www.lucynoel6465.shop/jgkl/
                                                                  PO from tpc Type 34.1 34,2 35 Spec 1.jsGet hashmaliciousFormBookBrowse
                                                                  • www.tumbetgirislinki.fit/k566/
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  reallyfreegeoip.orgpkNnK2ya0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                  • 104.21.32.1
                                                                  XiJhd7Lx30.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.64.1
                                                                  AQIu7JYa5r.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                  • 104.21.48.1
                                                                  Shipment advice H-BL Draft.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.32.1
                                                                  DHL Shipping Details Ref ID 446331798008765975594-pdf.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                  • 104.21.80.1
                                                                  ZTEIhNCtP3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.64.1
                                                                  LE2dyDn347.exeGet hashmaliciousGuLoaderBrowse
                                                                  • 104.21.64.1
                                                                  uPDwUy9ewY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                  • 104.21.80.1
                                                                  qUG1ZROxLJ.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                  • 104.21.80.1
                                                                  OeM750ajqm.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                  • 104.21.80.1
                                                                  checkip.dyndns.compkNnK2ya0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                  • 132.226.247.73
                                                                  XiJhd7Lx30.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 132.226.8.169
                                                                  AQIu7JYa5r.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                  • 158.101.44.242
                                                                  Shipment advice H-BL Draft.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 193.122.6.168
                                                                  DHL Shipping Details Ref ID 446331798008765975594-pdf.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                  • 132.226.247.73
                                                                  ZTEIhNCtP3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 132.226.247.73
                                                                  LE2dyDn347.exeGet hashmaliciousGuLoaderBrowse
                                                                  • 193.122.130.0
                                                                  uPDwUy9ewY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                  • 132.226.247.73
                                                                  qUG1ZROxLJ.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                  • 132.226.247.73
                                                                  OeM750ajqm.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                  • 193.122.6.168
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  CLOUDFLARENETUShttp://lploverar.bestGet hashmaliciousUnknownBrowse
                                                                  • 162.159.136.54
                                                                  pkNnK2ya0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                  • 104.21.32.1
                                                                  Launcher.exeGet hashmaliciousGrowtopia, Phoenix StealerBrowse
                                                                  • 162.159.128.233
                                                                  5aQpYG37db.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 104.26.12.205
                                                                  fls3eql72b.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 172.67.74.152
                                                                  jzqc1V4NqB.exeGet hashmaliciousFormBookBrowse
                                                                  • 188.114.97.3
                                                                  XiJhd7Lx30.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.64.1
                                                                  https://securefile395.outgrow.us/securefile395-9Get hashmaliciousHTMLPhisherBrowse
                                                                  • 104.17.25.14
                                                                  AQIu7JYa5r.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                  • 104.21.48.1
                                                                  plugin-newest_release_.exeGet hashmaliciousUnknownBrowse
                                                                  • 104.18.111.161
                                                                  UTMEMUSpkNnK2ya0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                  • 132.226.247.73
                                                                  XiJhd7Lx30.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 132.226.8.169
                                                                  DHL Shipping Details Ref ID 446331798008765975594-pdf.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                  • 132.226.247.73
                                                                  ZTEIhNCtP3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 132.226.247.73
                                                                  uPDwUy9ewY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                  • 132.226.247.73
                                                                  qUG1ZROxLJ.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                  • 132.226.247.73
                                                                  UFOiZapHGS.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 132.226.8.169
                                                                  HT4YGXBRtx.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 132.226.247.73
                                                                  4LJHFzA8jr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 132.226.247.73
                                                                  nGI2U2r41E.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 132.226.247.73
                                                                  HYPEENT-SJUSqUG1ZROxLJ.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                  • 198.59.144.139
                                                                  arm.elfGet hashmaliciousUnknownBrowse
                                                                  • 206.206.98.7
                                                                  Pago 20250211.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                  • 198.59.144.139
                                                                  https://www.irmaflores.net/suh/*Get hashmaliciousUnknownBrowse
                                                                  • 206.206.123.61
                                                                  linux_ppc64el.elfGet hashmaliciousChaosBrowse
                                                                  • 206.206.76.202
                                                                  linux_arm6.elfGet hashmaliciousChaosBrowse
                                                                  • 206.206.76.202
                                                                  linux_arm7.elfGet hashmaliciousChaosBrowse
                                                                  • 206.206.76.202
                                                                  linux_amd64.elfGet hashmaliciousChaosBrowse
                                                                  • 206.206.76.202
                                                                  linux_ppc64.elfGet hashmaliciousChaosBrowse
                                                                  • 206.206.76.202
                                                                  linux_arm5.elfGet hashmaliciousChaosBrowse
                                                                  • 206.206.76.202
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  54328bd36c14bd82ddaa0c04b25ed9adpkNnK2ya0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                  • 104.21.16.1
                                                                  XiJhd7Lx30.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.16.1
                                                                  AQIu7JYa5r.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                  • 104.21.16.1
                                                                  Shipment advice H-BL Draft.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.16.1
                                                                  DHL Shipping Details Ref ID 446331798008765975594-pdf.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                  • 104.21.16.1
                                                                  ZTEIhNCtP3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.16.1
                                                                  LE2dyDn347.exeGet hashmaliciousGuLoaderBrowse
                                                                  • 104.21.16.1
                                                                  uPDwUy9ewY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                  • 104.21.16.1
                                                                  qUG1ZROxLJ.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                  • 104.21.16.1
                                                                  OeM750ajqm.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                  • 104.21.16.1
                                                                  No context
                                                                  Process:C:\Users\user\Desktop\NmuA605dM4.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):63788
                                                                  Entropy (8bit):7.845529584299243
                                                                  Encrypted:false
                                                                  SSDEEP:1536:HBscWhfJw3+JOqLDpeZgiT0Fe3cQPE88f/SEr22YU:hERikDp5HvqcYU
                                                                  MD5:EC8CE4F20BA604BFCD2CF398C708E8F9
                                                                  SHA1:0AD7DAA818C9C4CD1B78956D20A6B438268ED571
                                                                  SHA-256:63C4F084609CA4520E8866D561EE1F98F6BD3893333A310BCFB1A3327F1746BA
                                                                  SHA-512:AF443DE9024881BD53753D06F963091E97DEE10635FF7BDFF57FC37112A6DFC15692F1C032F3F93C9A2C7218B6B43B83BFF0B96A945E310B329201B87AE7A085
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:EA06..n..G..Z..M.Pj...C...U....6..+.Z...P..).5.f.1....y........O...Y..0.,.ep.O$...Juz.T.:..:.].R...Q>.B..[.zq>.G).....#0.%B...Qh~).K......L.. ..t..C....1..Vf.x....H.j....0P).j..Fj....... ...0..*...2.[..iU..H.c.p...........Vf........k`!.....a.S(.....+.X...c.9....0y......l......0..o.9..Z.`}j@....6.....P...P..k..{Y.T......8*......Q.C.th..G...4j...`.P..h>*.5..*..........j.......3..i..... ....1@.S.T.u,..R...".0D.........+.....)..%.....`....0..(.0N......0..%.[.:eB....J.t....-y....F......co.T...^aQ.\.5.7:.F......T..5....Q*..U.9C.ji.y...Y..+....WX.@*.Km....V.3...!S.....V.z..)....A}.H..*l....Mk.J.6.C.Q.....@..H7...kW._.......0Z&w..OB...K.^S&.`-U.5.kQ...w..b.g.T....^.V.Lh5.U..F..o..M.Zh.i...O..j..%.........z.D.L..56.G.Y#@3.....0...W.T..B.H..>39M..2.Xf2..A....4..#aM.P.u.O..........P..,.J].53..*1.u6mU.\/...<.!.C..(...g...........n^p..mQ..c...Ryz.S....!..T........Z...L.Uh..U^.[.['.:.....L*...~.N.W..T.b.O....j."(.0.......".....W.W..P...]..fuz...].n.TJ....
                                                                  Process:C:\Users\user\Desktop\NmuA605dM4.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):9772
                                                                  Entropy (8bit):7.6137806910013826
                                                                  Encrypted:false
                                                                  SSDEEP:192:6JVLuam+BbAnJ3BVgVbWZg0nEljHr/9c2oJNEHLydrOGwk5JkHCystQppF1J/4:67uamwbM/eV2ElC2ofEr4qctOptA
                                                                  MD5:0B099CD2A387AB3A6AE23D1A34F8A87C
                                                                  SHA1:5288F0060EB27318F7AC51C8C0F75006DD61019D
                                                                  SHA-256:C7C702CDE2B2526F8F82871A95634640BCA4E1AFF5C4B5FD8E114825EA0AF488
                                                                  SHA-512:5FA03D150DD918CB76BE7622D11AEF0931C4E37EEDC39E1675B0466C73F7B8AD6E7A0D13F2AEE52002CA44FBBE64EA0F162F5717A053299F631C8A31465CEFE4
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:EA06..p..[.r9u..u.I.w[..M$....9..Ct.H.....M .K..)..Et..$`.]....y...K........|.p.o..t............@../.]%.P...R.%..$.Z.G/..6. .o.@..]@...p.g./..d.P..]@...N.R)........./......r.%.9...c ....Aw.H.......F.3<..\..6...L........x.F....B^.....]. 0...Rk..B...\..5_..D.....5_..\.U...5_....U..`5_..L.U...5\..>2p..H.^.w.Z..G .z.C .....@.......0.G. /Z.H%......j^...u.B.u....$.../.C....d G_T......n`>_.......zG#.....p....@.......@...........`.M..`... ...u...@....'.".].{>K...c.H. ..]$.._..\......>K.#G.t..3|wY0.G.".]d.8_..Gu..i|wY....u.h...p........!.H..+....Hd.P;....K.rP.L..7.p.f..+..fd.I|.. .K.@...f...E...Y.4..3.)%....H@......w)4....P.....2p....<d....,vN........K.!+..'$.....,fC$..WI.......r.$.X..c2...Ip.Y.!...Gd.....,f./.... .#!....c.P......,.\.h.s.....,vJ......t.I...x40......d@...K......4..@.6.-..p..R...$...RP.N...;#.`.../.H.....G.....c.0..\...wx.....v@........E....K.y6....p.c2..."..b.!....F ...@B5u.Ie.........vB......d.[..^...B20....;..X...w.HA.......p..e.....$r....u...
                                                                  Process:C:\Users\user\Desktop\NmuA605dM4.exe
                                                                  File Type:ASCII text, with very long lines (28674), with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):28674
                                                                  Entropy (8bit):3.5826176336931215
                                                                  Encrypted:false
                                                                  SSDEEP:768:X9KA+dD7KzCaynKpACXECY9xMBHZBKOD26dSrxlO:UA+R7+BXD264a
                                                                  MD5:653D498971FEF376EA16E6DADF407F5B
                                                                  SHA1:685DED98549FD78ED92DE05AE21091A7C5EBE9E4
                                                                  SHA-256:B396E1E5AC487327E1E03940569B780F2E848CD062FCDF8C62345E60F8D2BE42
                                                                  SHA-512:1870A1FE10EB3B32422DBC7B76A631DD51AE5BBCB7B67DFDC31A2B3743F97947AFB21EB51C2EA48FD8E429CA812A0C70497610376389D5B255BA80AFE729207A
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:&n##.tsu.'suuu&$&&&&# #!t. t&&&&&& ./"#."t/ #&&&&&& ./"r. tw!$&&&&&& ./##..t. s&&&&&& ./"#.wt/ #&&&&&& ./"r.utw u&&&&&& ./##.st.%%&&&&&& ./"#/&t/%$&&&&&& ./"r/$tw$s&&&&&& ./##/"t. "&&&&&& ./"#/ t/ u&&&&&& ./"r/.tw u&&&&&& ./##/w%%u& ./"#/ut/ s&&&&&& ./.r""pppppptw!"&&&&&& .//#" ppppppt. "&&&&&& ./.#".ppppppt/ u&&&&&& ./.r"wpppppptw u&&&&&& .//#"uppppppt.$s&&&&&& ./.#"sppppppt/ "&&&&&& ./.r#&pppppptw u&&&&&& .//##$ppppppt. u&&&&&& ./.##"pppppp%%u/ ./.r# pppppptw!#&&&&&& ./##r&t.!%&&&&&& ./"#r$t/ #&&&&&& ./"rr"tw!$&&&&&& ./##r t.%%&&&&&& ./"#r.t/%$&&&&&& ./"rrwtw$s&&&&&& ./##rut. "&&&&&& ./"#rst/ u&&&&&& ./"rs&tw u&&&&&& ./##s$%%u& ./"#s"t/ '&&&&&& ./.r .pppppptw "&&&&&& .//# wppppppt.! &&&&&& ./.# uppppppt/ '&&&&&& ./.r spppppptw!&&&&&&& .//#!&ppppppt. /&&&&&& ./.#!$ppppppt/%%&&&&&& ./.r!"pppppptw%$&&&&&& .//#! ppppppt.$s&&&&&& ./.#!.ppppppt/ "&&&&&& ./.r!wpppppptw u&&&&&& .//#!uppppppt. u&&&&&& ./.#!spppppp%%u/ ./"r.&tw!%&&&&&& ./##w&t. .
                                                                  Process:C:\Users\user\Desktop\NmuA605dM4.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):93696
                                                                  Entropy (8bit):6.911655417503038
                                                                  Encrypted:false
                                                                  SSDEEP:1536:vtHKWys22kPO1oeiSJSOels+p1mk+Kq2E4/e6pwUYmaJUez/9qSzJCHi7L7Uow0Y:FHKm2bWiU2fvwUUXz/9qSzJr7RTy
                                                                  MD5:3F2B1336AA19DC0E48E2C187A71B7323
                                                                  SHA1:1E52593574D550AB031E4FAA0D432E67372A91A5
                                                                  SHA-256:A5F8CC2EDBBEDDDC0291C1B0785A82B57054C037B2F79F5A58B472C147C25616
                                                                  SHA-512:6F3D8F16959EA0AAEEFAD37C47902BA14C33D620C0F6BE24FFB4F5F4DEE1347DAB0BA37394C201F53680F58DAEFD08F85A9BE1904AE70AF8EBA360E09B1300CE
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:...5T0UMTAPL..FC.WZQ2BM6.DX5W0UMPAPLNKFC3WZQ2BM6SDX5W0UMPAPL.KFC=H._2.D.r.Yy...%92p<<$!1R:z2S,#Y'd:PwB #p(>l...c^8>4.O@<wDX5W0UM..PL.JEC.9..2BM6SDX5.0WL[@.LN/GC3_ZQ2BM6..Y5W.UMP.QLNK.C3wZQ2@M6WDX5W0UMVAPLNKFC3.[Q2@M6SDX5U05.PA@LN[FC3WJQ2RM6SDX5G0UMPAPLNKFCk.[QaBM6S.Y5.5UMPAPLNKFC3WZQ2BM6S.Y5[0UMPAPLNKFC3WZQ2BM6SDX5W0UMPAPLNKFC3WZQ2BM6SDX5W0UMPaPLFKFC3WZQ2BM6[dX5.0UMPAPLNKFC.#?)FBM6.&Y5W.UMP%QLNIFC3WZQ2BM6SDX5w0U-~3#>-KFC.RZQ2.L6SBX5WVTMPAPLNKFC3WZQrBMv}6=Y8SUM\APLN.GC3UZQ2.L6SDX5W0UMPAPL.KF.3WZQ2BM6SDX5W0UM..QLNKFC{WZQ0BH6..X5S.UMSAPL.KFE..ZQ.BM6SDX5W0UMPAPLNKFC3WZQ2BM6SDX5W0UMPAPLNKFC.*.^.._ .5W0UMP@ROJMNK3WZQ2BM6-DX5.0UM.APLyKFC.WZQ_BM6wDX5)0UM.APL*KFCAWZQSBM6.DX580UM>APL0KFC-UrN2BG.uDZ.w0UGPk.?oKFI.VZQ61o6SN.7W0Q>sAPF.HFC7$~Q2H.2SD\Fr0UG.DPLJa.C0.LW2BVYkDX?W3.XVAPWdmFA.nZQ8Bg.SG. Q0UVzcPN.BFC7}."/BM0{.X5]D\MPC.FNKBi-Ur.2BG.q:K5W4~Mzc.XNKBh3}x/'BM2xDr.)&UMTjPfl5QC3SqQ.DgTS6.9W@V"1APJf.FC9..Q2DM.iD&;W0QO?.PLDml.3..Q2DM..DX3W..MPGPd.KFE3..Q2DM.iDpeW0SMx.PLHKl.3)iQ2Fa1-wX5S.C3aAPH.M>C
                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Entropy (8bit):0.15197513782217703
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:NmuA605dM4.exe
                                                                  File size:80'740'352 bytes
                                                                  MD5:0d36f475590e673e4303bc2beb338d72
                                                                  SHA1:fbea0f77026dfd797473578ac35504842ef9f20c
                                                                  SHA256:bd60ebef71e2759f1b06ca6766f8d21d418a8fa99d69d0009004d461b8cb6f87
                                                                  SHA512:7392bc44266b6fc471d9a93f6ee5688d0265de0a88261466fd63daf340e0200ec08b0846dfc42ad14db7d65706f273faeb38c72d51c498255cd0607000fb5600
                                                                  SSDEEP:24576:Eu6J33O0c+JY5UZ+XC0kGso6FaBUfxy98HWY:+u0c++OCvkGs9FaBgk9vY
                                                                  TLSH:B208AD2273DDC360CB669173BF6AB7016EBF7C610630B85B2F980D7DA950161262D7A3
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                                  Icon Hash:aaf3e3e3938382a0
                                                                  Entrypoint:0x427dcd
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x67B6C6BE [Thu Feb 20 06:07:58 2025 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:5
                                                                  OS Version Minor:1
                                                                  File Version Major:5
                                                                  File Version Minor:1
                                                                  Subsystem Version Major:5
                                                                  Subsystem Version Minor:1
                                                                  Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                                  Instruction
                                                                  call 00007FB4107DEA5Ah
                                                                  jmp 00007FB4107D1824h
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  push edi
                                                                  push esi
                                                                  mov esi, dword ptr [esp+10h]
                                                                  mov ecx, dword ptr [esp+14h]
                                                                  mov edi, dword ptr [esp+0Ch]
                                                                  mov eax, ecx
                                                                  mov edx, ecx
                                                                  add eax, esi
                                                                  cmp edi, esi
                                                                  jbe 00007FB4107D19AAh
                                                                  cmp edi, eax
                                                                  jc 00007FB4107D1D0Eh
                                                                  bt dword ptr [004C31FCh], 01h
                                                                  jnc 00007FB4107D19A9h
                                                                  rep movsb
                                                                  jmp 00007FB4107D1CBCh
                                                                  cmp ecx, 00000080h
                                                                  jc 00007FB4107D1B74h
                                                                  mov eax, edi
                                                                  xor eax, esi
                                                                  test eax, 0000000Fh
                                                                  jne 00007FB4107D19B0h
                                                                  bt dword ptr [004BE324h], 01h
                                                                  jc 00007FB4107D1E80h
                                                                  bt dword ptr [004C31FCh], 00000000h
                                                                  jnc 00007FB4107D1B4Dh
                                                                  test edi, 00000003h
                                                                  jne 00007FB4107D1B5Eh
                                                                  test esi, 00000003h
                                                                  jne 00007FB4107D1B3Dh
                                                                  bt edi, 02h
                                                                  jnc 00007FB4107D19AFh
                                                                  mov eax, dword ptr [esi]
                                                                  sub ecx, 04h
                                                                  lea esi, dword ptr [esi+04h]
                                                                  mov dword ptr [edi], eax
                                                                  lea edi, dword ptr [edi+04h]
                                                                  bt edi, 03h
                                                                  jnc 00007FB4107D19B3h
                                                                  movq xmm1, qword ptr [esi]
                                                                  sub ecx, 08h
                                                                  lea esi, dword ptr [esi+08h]
                                                                  movq qword ptr [edi], xmm1
                                                                  lea edi, dword ptr [edi+08h]
                                                                  test esi, 00000007h
                                                                  je 00007FB4107D1A05h
                                                                  bt esi, 03h
                                                                  jnc 00007FB4107D1A58h
                                                                  Programming Language:
                                                                  • [ASM] VS2013 build 21005
                                                                  • [ C ] VS2013 build 21005
                                                                  • [C++] VS2013 build 21005
                                                                  • [ C ] VS2008 SP1 build 30729
                                                                  • [IMP] VS2008 SP1 build 30729
                                                                  • [ASM] VS2013 UPD4 build 31101
                                                                  • [RES] VS2013 build 21005
                                                                  • [LNK] VS2013 UPD4 build 31101
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x1f374.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xe70000x711c.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .rsrc0xc70000x1f3740x1f400462e0dfb5166e6ef305ca3923aedb49eFalse0.7899453125data7.497904803666288IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0xe70000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                  RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                  RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                  RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                  RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                  RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                  RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                  RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                  RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                  RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                  RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                  RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                                  RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                  RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                                  RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                                  RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                  RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                  RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                  RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                  RT_RCDATA0xcf7b80x1663cdata1.0003925502682427
                                                                  RT_GROUP_ICON0xe5df40x76dataEnglishGreat Britain0.6610169491525424
                                                                  RT_GROUP_ICON0xe5e6c0x14dataEnglishGreat Britain1.25
                                                                  RT_GROUP_ICON0xe5e800x14dataEnglishGreat Britain1.15
                                                                  RT_GROUP_ICON0xe5e940x14dataEnglishGreat Britain1.25
                                                                  RT_VERSION0xe5ea80xdcdataEnglishGreat Britain0.6181818181818182
                                                                  RT_MANIFEST0xe5f840x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                  DLLImport
                                                                  WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                                  VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                  COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                  MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                                  WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                                  PSAPI.DLLGetProcessMemoryInfo
                                                                  IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                                  USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                                  UxTheme.dllIsThemeActive
                                                                  KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                                  USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                                  GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                                  COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                                  ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                                  SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                  ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                                  OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                                  DescriptionData
                                                                  Translation0x0809 0x04b0
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  EnglishGreat Britain
                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                  2025-03-07T20:51:52.329502+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049681132.226.8.16980TCP
                                                                  2025-03-07T20:52:01.470071+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049681132.226.8.16980TCP
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Mar 7, 2025 20:51:50.151981115 CET4968180192.168.2.10132.226.8.169
                                                                  Mar 7, 2025 20:51:50.157150984 CET8049681132.226.8.169192.168.2.10
                                                                  Mar 7, 2025 20:51:50.157237053 CET4968180192.168.2.10132.226.8.169
                                                                  Mar 7, 2025 20:51:50.157974958 CET4968180192.168.2.10132.226.8.169
                                                                  Mar 7, 2025 20:51:50.163094997 CET8049681132.226.8.169192.168.2.10
                                                                  Mar 7, 2025 20:51:50.987040997 CET8049681132.226.8.169192.168.2.10
                                                                  Mar 7, 2025 20:51:50.993982077 CET4968180192.168.2.10132.226.8.169
                                                                  Mar 7, 2025 20:51:50.999144077 CET8049681132.226.8.169192.168.2.10
                                                                  Mar 7, 2025 20:51:52.274341106 CET8049681132.226.8.169192.168.2.10
                                                                  Mar 7, 2025 20:51:52.312582970 CET49682443192.168.2.10104.21.16.1
                                                                  Mar 7, 2025 20:51:52.312633038 CET44349682104.21.16.1192.168.2.10
                                                                  Mar 7, 2025 20:51:52.312767029 CET49682443192.168.2.10104.21.16.1
                                                                  Mar 7, 2025 20:51:52.320883989 CET49682443192.168.2.10104.21.16.1
                                                                  Mar 7, 2025 20:51:52.320902109 CET44349682104.21.16.1192.168.2.10
                                                                  Mar 7, 2025 20:51:52.329502106 CET4968180192.168.2.10132.226.8.169
                                                                  Mar 7, 2025 20:51:54.098956108 CET44349682104.21.16.1192.168.2.10
                                                                  Mar 7, 2025 20:51:54.099092007 CET49682443192.168.2.10104.21.16.1
                                                                  Mar 7, 2025 20:51:54.106473923 CET49682443192.168.2.10104.21.16.1
                                                                  Mar 7, 2025 20:51:54.106508017 CET44349682104.21.16.1192.168.2.10
                                                                  Mar 7, 2025 20:51:54.106852055 CET44349682104.21.16.1192.168.2.10
                                                                  Mar 7, 2025 20:51:54.155457973 CET49682443192.168.2.10104.21.16.1
                                                                  Mar 7, 2025 20:51:54.196327925 CET44349682104.21.16.1192.168.2.10
                                                                  Mar 7, 2025 20:51:55.005017042 CET44349682104.21.16.1192.168.2.10
                                                                  Mar 7, 2025 20:51:55.010499954 CET44349682104.21.16.1192.168.2.10
                                                                  Mar 7, 2025 20:51:55.010673046 CET49682443192.168.2.10104.21.16.1
                                                                  Mar 7, 2025 20:51:55.016412973 CET49682443192.168.2.10104.21.16.1
                                                                  Mar 7, 2025 20:52:00.156935930 CET4968180192.168.2.10132.226.8.169
                                                                  Mar 7, 2025 20:52:00.162159920 CET8049681132.226.8.169192.168.2.10
                                                                  Mar 7, 2025 20:52:01.428190947 CET8049681132.226.8.169192.168.2.10
                                                                  Mar 7, 2025 20:52:01.470071077 CET4968180192.168.2.10132.226.8.169
                                                                  Mar 7, 2025 20:52:02.029325008 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:02.034459114 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:02.035186052 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:02.619261980 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:02.619580984 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:02.624783039 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:02.757304907 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:02.757576942 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:02.762600899 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:02.896440983 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:02.897119045 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:02.902177095 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:03.049047947 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:03.049069881 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:03.049082994 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:03.049097061 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:03.049154043 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:03.049196959 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:03.092257023 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:03.097291946 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:03.231136084 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:03.234889030 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:03.240192890 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:03.374541998 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:03.375766039 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:03.382385969 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:03.515423059 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:03.516479015 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:03.521917105 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:03.679162979 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:03.679466009 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:03.684679031 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:03.816338062 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:03.816690922 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:03.821870089 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:03.974178076 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:03.974373102 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:03.979638100 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:04.112200022 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:04.113650084 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:04.113748074 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:04.113789082 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:04.113831997 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:04.113948107 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:04.113971949 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:04.113991976 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:04.114017963 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:04.119004965 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:04.119043112 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:04.119134903 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:04.119147062 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:04.300416946 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:52:04.345154047 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:52:51.455089092 CET4968180192.168.2.10132.226.8.169
                                                                  Mar 7, 2025 20:52:51.460366964 CET8049681132.226.8.169192.168.2.10
                                                                  Mar 7, 2025 20:52:51.460457087 CET4968180192.168.2.10132.226.8.169
                                                                  Mar 7, 2025 20:53:41.470922947 CET49686587192.168.2.10198.59.144.139
                                                                  Mar 7, 2025 20:53:41.476089954 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:53:41.610572100 CET58749686198.59.144.139192.168.2.10
                                                                  Mar 7, 2025 20:53:41.612274885 CET49686587192.168.2.10198.59.144.139
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Mar 7, 2025 20:51:50.133277893 CET6161853192.168.2.101.1.1.1
                                                                  Mar 7, 2025 20:51:50.140686989 CET53616181.1.1.1192.168.2.10
                                                                  Mar 7, 2025 20:51:52.286412001 CET5150753192.168.2.101.1.1.1
                                                                  Mar 7, 2025 20:51:52.311605930 CET53515071.1.1.1192.168.2.10
                                                                  Mar 7, 2025 20:52:01.450963974 CET6222153192.168.2.101.1.1.1
                                                                  Mar 7, 2025 20:52:02.021836042 CET53622211.1.1.1192.168.2.10
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Mar 7, 2025 20:51:50.133277893 CET192.168.2.101.1.1.10x6aaeStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                  Mar 7, 2025 20:51:52.286412001 CET192.168.2.101.1.1.10xf6f9Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                  Mar 7, 2025 20:52:01.450963974 CET192.168.2.101.1.1.10x4922Standard query (0)mail.grupomaya.mxA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Mar 7, 2025 20:51:50.140686989 CET1.1.1.1192.168.2.100x6aaeNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                  Mar 7, 2025 20:51:50.140686989 CET1.1.1.1192.168.2.100x6aaeNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                  Mar 7, 2025 20:51:50.140686989 CET1.1.1.1192.168.2.100x6aaeNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                  Mar 7, 2025 20:51:50.140686989 CET1.1.1.1192.168.2.100x6aaeNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                  Mar 7, 2025 20:51:50.140686989 CET1.1.1.1192.168.2.100x6aaeNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                  Mar 7, 2025 20:51:50.140686989 CET1.1.1.1192.168.2.100x6aaeNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                  Mar 7, 2025 20:51:52.311605930 CET1.1.1.1192.168.2.100xf6f9No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                  Mar 7, 2025 20:51:52.311605930 CET1.1.1.1192.168.2.100xf6f9No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                  Mar 7, 2025 20:51:52.311605930 CET1.1.1.1192.168.2.100xf6f9No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                  Mar 7, 2025 20:51:52.311605930 CET1.1.1.1192.168.2.100xf6f9No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                  Mar 7, 2025 20:51:52.311605930 CET1.1.1.1192.168.2.100xf6f9No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                  Mar 7, 2025 20:51:52.311605930 CET1.1.1.1192.168.2.100xf6f9No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                  Mar 7, 2025 20:51:52.311605930 CET1.1.1.1192.168.2.100xf6f9No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                  Mar 7, 2025 20:52:02.021836042 CET1.1.1.1192.168.2.100x4922No error (0)mail.grupomaya.mxgrupomaya.mxCNAME (Canonical name)IN (0x0001)false
                                                                  Mar 7, 2025 20:52:02.021836042 CET1.1.1.1192.168.2.100x4922No error (0)grupomaya.mx198.59.144.139A (IP address)IN (0x0001)false
                                                                  • reallyfreegeoip.org
                                                                  • checkip.dyndns.org
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.1049681132.226.8.169806284C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Mar 7, 2025 20:51:50.157974958 CET151OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                  Host: checkip.dyndns.org
                                                                  Connection: Keep-Alive
                                                                  Mar 7, 2025 20:51:50.987040997 CET273INHTTP/1.1 200 OK
                                                                  Date: Fri, 07 Mar 2025 19:51:50 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 104
                                                                  Connection: keep-alive
                                                                  Cache-Control: no-cache
                                                                  Pragma: no-cache
                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                  Mar 7, 2025 20:51:50.993982077 CET127OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                  Host: checkip.dyndns.org
                                                                  Mar 7, 2025 20:51:52.274341106 CET682INHTTP/1.1 502 Bad Gateway
                                                                  Date: Fri, 07 Mar 2025 19:51:52 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 547
                                                                  Connection: keep-alive
                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                                                  Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                                                                  Mar 7, 2025 20:52:00.156935930 CET127OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                  Host: checkip.dyndns.org
                                                                  Mar 7, 2025 20:52:01.428190947 CET682INHTTP/1.1 502 Bad Gateway
                                                                  Date: Fri, 07 Mar 2025 19:52:01 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 547
                                                                  Connection: keep-alive
                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                                                  Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.1049682104.21.16.14436284C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2025-03-07 19:51:54 UTC73OUTGET /xml/ HTTP/1.1
                                                                  Host: reallyfreegeoip.org
                                                                  Connection: Keep-Alive
                                                                  2025-03-07 19:51:55 UTC771INHTTP/1.1 200 OK
                                                                  Date: Fri, 07 Mar 2025 19:51:54 GMT
                                                                  Content-Type: text/xml
                                                                  Content-Length: 375
                                                                  Connection: close
                                                                  cf-cache-status: DYNAMIC
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Pakp78oLddQbTkTq1WxyGfRrFadYAGg86NN%2F2LoHnxw2GmvkX3wuXUSucCy2v%2Bpil3ApR7CGhLqPg7SCorx5cVFoICIZuDSINGziTrqQBHvKbYgOnPsIfVl4dfw%2Fb%2FUx57GWd4L6"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 91cca154efe75b5f-IAD
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=23920&min_rtt=23410&rtt_var=7034&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=687&delivery_rate=123581&cwnd=231&unsent_bytes=0&cid=74f615377903738d&ts=1050&x=0"
                                                                  2025-03-07 19:51:55 UTC375INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 34 37 2e 32 37 2e 31 31 32 2e 31 36 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 43 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 6f 72 74 68 20 43 61 72 6f 6c 69 6e 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 53 68 65 72 72 69 6c 6c 73 20 46 6f 72 64 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 32 38 36 37 33 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77
                                                                  Data Ascii: <Response><IP>47.27.112.167</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NC</RegionCode><RegionName>North Carolina</RegionName><City>Sherrills Ford</City><ZipCode>28673</ZipCode><TimeZone>America/New


                                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                                  Mar 7, 2025 20:52:02.619261980 CET58749686198.59.144.139192.168.2.10220-svgt326.serverneubox.com.mx ESMTP Exim 4.98.1 #2 Fri, 07 Mar 2025 13:52:02 -0600
                                                                  220-We do not authorize the use of this system to transport unsolicited,
                                                                  220 and/or bulk e-mail.
                                                                  Mar 7, 2025 20:52:02.619580984 CET49686587192.168.2.10198.59.144.139EHLO 992547
                                                                  Mar 7, 2025 20:52:02.757304907 CET58749686198.59.144.139192.168.2.10250-svgt326.serverneubox.com.mx Hello 992547 [8.46.123.189]
                                                                  250-SIZE 52428800
                                                                  250-LIMITS MAILMAX=1000 RCPTMAX=50000
                                                                  250-8BITMIME
                                                                  250-PIPELINING
                                                                  250-PIPECONNECT
                                                                  250-AUTH PLAIN LOGIN
                                                                  250-STARTTLS
                                                                  250 HELP
                                                                  Mar 7, 2025 20:52:02.757576942 CET49686587192.168.2.10198.59.144.139STARTTLS
                                                                  Mar 7, 2025 20:52:02.896440983 CET58749686198.59.144.139192.168.2.10220 TLS go ahead

                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:14:51:46
                                                                  Start date:07/03/2025
                                                                  Path:C:\Users\user\Desktop\NmuA605dM4.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\NmuA605dM4.exe"
                                                                  Imagebase:0xa10000
                                                                  File size:80'740'352 bytes
                                                                  MD5 hash:0D36F475590E673E4303BC2BEB338D72
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_MSILLogger, Description: Yara detected MSIL Logger, Source: 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.1117415314.0000000001850000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:2
                                                                  Start time:14:51:47
                                                                  Start date:07/03/2025
                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\NmuA605dM4.exe"
                                                                  Imagebase:0xa80000
                                                                  File size:45'984 bytes
                                                                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_MSILLogger, Description: Yara detected MSIL Logger, Source: 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.2356190295.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.2358304237.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Reset < >