Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AEo2XQmxqZ.exe

Overview

General Information

Sample name:AEo2XQmxqZ.exe
renamed because original name is a hash value
Original sample name:63986b611fcfeb4450112069d0ef4bc5ea7ec8390535020048bafb180c31eb65.exe
Analysis ID:1632323
MD5:21dd3d0e0a31093f28ac0f4a70c5b949
SHA1:89ba5afc1309e1d48f968f9cbec75e3f902ceeba
SHA256:63986b611fcfeb4450112069d0ef4bc5ea7ec8390535020048bafb180c31eb65
Tags:exeMassLoggeruser-adrian__luca
Infos:

Detection

MSIL Logger, MassLogger RAT
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected MSIL Logger
Yara detected MassLogger RAT
Yara detected Telegram RAT
.NET source code references suspicious native API functions
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • AEo2XQmxqZ.exe (PID: 7820 cmdline: "C:\Users\user\Desktop\AEo2XQmxqZ.exe" MD5: 21DD3D0E0A31093F28AC0F4A70C5B949)
    • RegSvcs.exe (PID: 7880 cmdline: "C:\Users\user\Desktop\AEo2XQmxqZ.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"EXfil Mode": "SMTP", "From": "securityz@grupomaya.mx", "Password": "    54460hetteXzeLJ  Z+l!UyU_nadu     \u2605\u0b9c\u0b9c", "Server": "mail.grupomaya.mx", "Port": 587}
SourceRuleDescriptionAuthorStrings
00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
        00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0xefb7:$a1: get_encryptedPassword
          • 0xf2df:$a2: get_encryptedUsername
          • 0xed52:$a3: get_timePasswordChanged
          • 0xee73:$a4: get_passwordField
          • 0xefcd:$a5: set_encryptedPassword
          • 0x10929:$a7: get_logins
          • 0x105da:$a8: GetOutlookPasswords
          • 0x103cc:$a9: StartKeylogger
          • 0x10879:$a10: KeyLoggerEventArgs
          • 0x10429:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 18 entries
          SourceRuleDescriptionAuthorStrings
          1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
                1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  1.2.RegSvcs.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                  • 0xf1b7:$a1: get_encryptedPassword
                  • 0xf4df:$a2: get_encryptedUsername
                  • 0xef52:$a3: get_timePasswordChanged
                  • 0xf073:$a4: get_passwordField
                  • 0xf1cd:$a5: set_encryptedPassword
                  • 0x10b29:$a7: get_logins
                  • 0x107da:$a8: GetOutlookPasswords
                  • 0x105cc:$a9: StartKeylogger
                  • 0x10a79:$a10: KeyLoggerEventArgs
                  • 0x10629:$a11: KeyLoggerEventArgsEventHandler
                  Click to see the 13 entries

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 198.59.144.139, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7880, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49718
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-07T22:20:48.195988+010028032742Potentially Bad Traffic192.168.2.449715132.226.8.16980TCP
                  2025-03-07T22:20:55.946016+010028032742Potentially Bad Traffic192.168.2.449715132.226.8.16980TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: AEo2XQmxqZ.exeAvira: detected
                  Source: 1.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "securityz@grupomaya.mx", "Password": " 54460hetteXzeLJ Z+l!UyU_nadu \u2605\u0b9c\u0b9c", "Server": "mail.grupomaya.mx", "Port": 587}
                  Source: AEo2XQmxqZ.exeReversingLabs: Detection: 66%
                  Source: AEo2XQmxqZ.exeVirustotal: Detection: 60%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: AEo2XQmxqZ.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.4:49717 version: TLS 1.0
                  Source: Binary string: wntdll.pdbUGP source: AEo2XQmxqZ.exe, 00000000.00000003.1262532891.00000000041E0000.00000004.00001000.00020000.00000000.sdmp, AEo2XQmxqZ.exe, 00000000.00000003.1262868636.0000000004040000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: AEo2XQmxqZ.exe, 00000000.00000003.1262532891.00000000041E0000.00000004.00001000.00020000.00000000.sdmp, AEo2XQmxqZ.exe, 00000000.00000003.1262868636.0000000004040000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0046445A
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046C6D1 FindFirstFileW,FindClose,0_2_0046C6D1
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0046C75C
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046EF95
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046F0F2
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046F3F3
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_004637EF
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00463B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00463B12
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046BCBC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 018E9731h1_2_018E9480
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 018E9E5Ah1_2_018E9A30
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 018E9E5Ah1_2_018E9D87
                  Source: global trafficTCP traffic: 192.168.2.4:49718 -> 198.59.144.139:587
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                  Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
                  Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
                  Source: Joe Sandbox ViewASN Name: HYPEENT-SJUS HYPEENT-SJUS
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49715 -> 132.226.8.169:80
                  Source: global trafficTCP traffic: 192.168.2.4:49718 -> 198.59.144.139:587
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.4:49717 version: TLS 1.0
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004722EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_004722EE
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: global trafficDNS traffic detected: DNS query: mail.grupomaya.mx
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.0000000003420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.0000000003420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2515135030.0000000003420000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2515135030.000000000340E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: RegSvcs.exe, 00000001.00000002.2516408656.0000000006700000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2515135030.00000000033A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2515135030.0000000003420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                  Source: AEo2XQmxqZ.exe, 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.0000000003420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://grupomaya.mx
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://grupomaya.mxd
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.grupomaya.mx
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.grupomaya.mxd
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2514060970.00000000015A4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2516468485.0000000006747000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.org/0
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2514060970.00000000015A4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2516468485.0000000006747000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org0#
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.000000000343D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.000000000343D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.00000000033A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2514060970.00000000015A4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2516408656.0000000006735000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2516468485.0000000006747000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2514060970.00000000015A4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2516408656.0000000006735000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2516468485.0000000006747000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: AEo2XQmxqZ.exe, 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.0000000003420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: AEo2XQmxqZ.exe, 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2515135030.0000000003420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.0000000003420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.0000000003420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.AEo2XQmxqZ.exe.1730000.1.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00474164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00474164
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00474164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00474164
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00473F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00473F66
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0046001C
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0048CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0048CABC

                  System Summary

                  barindex
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.AEo2XQmxqZ.exe.1730000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.AEo2XQmxqZ.exe.1730000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.AEo2XQmxqZ.exe.1730000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.AEo2XQmxqZ.exe.1730000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: Process Memory Space: AEo2XQmxqZ.exe PID: 7820, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: RegSvcs.exe PID: 7880, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: This is a third-party compiled AutoIt script.0_2_00403B3A
                  Source: AEo2XQmxqZ.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: AEo2XQmxqZ.exe, 00000000.00000000.1252969881.00000000004B4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_9e438496-c
                  Source: AEo2XQmxqZ.exe, 00000000.00000000.1252969881.00000000004B4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_05da707c-e
                  Source: AEo2XQmxqZ.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_e6d56f0d-e
                  Source: AEo2XQmxqZ.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_d848d15b-6
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0046A1EF
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00458310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00458310
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004651BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_004651BD
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0040E6A00_2_0040E6A0
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004012870_2_00401287
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0042D9750_2_0042D975
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0040FCE00_2_0040FCE0
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004221C50_2_004221C5
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004362D20_2_004362D2
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004803DA0_2_004803DA
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0043242E0_2_0043242E
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004225FA0_2_004225FA
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0045E6160_2_0045E616
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004166E10_2_004166E1
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0043878F0_2_0043878F
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004368440_2_00436844
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004808570_2_00480857
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004188080_2_00418808
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004688890_2_00468889
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0042CB210_2_0042CB21
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00436DB60_2_00436DB6
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00416F9E0_2_00416F9E
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004130300_2_00413030
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0042F1D90_2_0042F1D9
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004231870_2_00423187
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004214840_2_00421484
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004155200_2_00415520
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004276960_2_00427696
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004157600_2_00415760
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004219780_2_00421978
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00487DDB0_2_00487DDB
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00421D900_2_00421D90
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0042BDA60_2_0042BDA6
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0040DF000_2_0040DF00
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00413FE00_2_00413FE0
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_017236100_2_01723610
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_018EC5301_2_018EC530
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_018E27B91_2_018E27B9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_018E2DD11_2_018E2DD1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_018E94801_2_018E9480
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_018EC5211_2_018EC521
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_018E946F1_2_018E946F
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: String function: 00420AE3 appears 70 times
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: String function: 00407DE1 appears 35 times
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: String function: 00428900 appears 42 times
                  Source: AEo2XQmxqZ.exe, 00000000.00000003.1270998366.000000000430D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs AEo2XQmxqZ.exe
                  Source: AEo2XQmxqZ.exe, 00000000.00000003.1262868636.0000000004163000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs AEo2XQmxqZ.exe
                  Source: AEo2XQmxqZ.exe, 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs AEo2XQmxqZ.exe
                  Source: AEo2XQmxqZ.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.AEo2XQmxqZ.exe.1730000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.AEo2XQmxqZ.exe.1730000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.AEo2XQmxqZ.exe.1730000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.AEo2XQmxqZ.exe.1730000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: Process Memory Space: AEo2XQmxqZ.exe PID: 7820, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: RegSvcs.exe PID: 7880, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.AEo2XQmxqZ.exe.1730000.1.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.AEo2XQmxqZ.exe.1730000.1.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@3/3
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046A06A GetLastError,FormatMessageW,0_2_0046A06A
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004581CB AdjustTokenPrivileges,CloseHandle,0_2_004581CB
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004587E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_004587E1
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0046B333
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0047EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0047EE0D
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046C397 CoInitialize,CoCreateInstance,CoUninitialize,0_2_0046C397
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00404E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00404E89
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeFile created: C:\Users\user\AppData\Local\Temp\autFD97.tmpJump to behavior
                  Source: AEo2XQmxqZ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegSvcs.exe, 00000001.00000002.2515135030.000000000349E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2515135030.0000000003490000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2515135030.0000000003480000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: AEo2XQmxqZ.exeReversingLabs: Detection: 66%
                  Source: AEo2XQmxqZ.exeVirustotal: Detection: 60%
                  Source: unknownProcess created: C:\Users\user\Desktop\AEo2XQmxqZ.exe "C:\Users\user\Desktop\AEo2XQmxqZ.exe"
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\AEo2XQmxqZ.exe"
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\AEo2XQmxqZ.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: AEo2XQmxqZ.exeStatic file information: File size 80740352 > 1048576
                  Source: AEo2XQmxqZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: AEo2XQmxqZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: AEo2XQmxqZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: AEo2XQmxqZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: AEo2XQmxqZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: AEo2XQmxqZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: AEo2XQmxqZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: AEo2XQmxqZ.exe, 00000000.00000003.1262532891.00000000041E0000.00000004.00001000.00020000.00000000.sdmp, AEo2XQmxqZ.exe, 00000000.00000003.1262868636.0000000004040000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: AEo2XQmxqZ.exe, 00000000.00000003.1262532891.00000000041E0000.00000004.00001000.00020000.00000000.sdmp, AEo2XQmxqZ.exe, 00000000.00000003.1262868636.0000000004040000.00000004.00001000.00020000.00000000.sdmp
                  Source: AEo2XQmxqZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: AEo2XQmxqZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: AEo2XQmxqZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: AEo2XQmxqZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: AEo2XQmxqZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00404B37 LoadLibraryA,GetProcAddress,0_2_00404B37
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00428945 push ecx; ret 0_2_00428958
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004048D7
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00485376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00485376
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00423187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00423187
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeAPI/Special instruction interceptor: Address: 1723234
                  Source: AEo2XQmxqZ.exe, 00000000.00000003.1254355333.00000000018B7000.00000004.00000020.00020000.00000000.sdmp, AEo2XQmxqZ.exe, 00000000.00000003.1254450050.00000000018B7000.00000004.00000020.00020000.00000000.sdmp, AEo2XQmxqZ.exe, 00000000.00000003.1254032848.00000000018B7000.00000004.00000020.00020000.00000000.sdmp, AEo2XQmxqZ.exe, 00000000.00000003.1276142708.00000000018B7000.00000004.00000020.00020000.00000000.sdmp, AEo2XQmxqZ.exe, 00000000.00000003.1253819867.00000000018B7000.00000004.00000020.00020000.00000000.sdmp, AEo2XQmxqZ.exe, 00000000.00000003.1253377592.00000000018A3000.00000004.00000020.00020000.00000000.sdmp, AEo2XQmxqZ.exe, 00000000.00000003.1254183441.00000000018B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXEHH
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1512Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3285Jump to behavior
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeAPI coverage: 5.4 %
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0046445A
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046C6D1 FindFirstFileW,FindClose,0_2_0046C6D1
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0046C75C
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046EF95
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046F0F2
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046F3F3
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_004637EF
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00463B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00463B12
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0046BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046BCBC
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004049A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99874Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99765Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99546Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99437Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99218Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99109Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98890Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98781Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98671Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98562Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98447Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98343Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98234Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98109Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97999Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97890Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97722Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97568Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97450Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97265Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97140Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: RegSvcs.exe, 00000001.00000002.2514060970.0000000001558000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll^
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeAPI call chain: ExitProcess graph end nodegraph_0-100820
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00473F09 BlockInput,0_2_00473F09
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00403B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00403B3A
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00435A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00435A7C
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00404B37 LoadLibraryA,GetProcAddress,0_2_00404B37
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_01723500 mov eax, dword ptr fs:[00000030h]0_2_01723500
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_017234A0 mov eax, dword ptr fs:[00000030h]0_2_017234A0
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_01721E70 mov eax, dword ptr fs:[00000030h]0_2_01721E70
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004580A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_004580A9
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0042A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A155
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0042A124 SetUnhandledExceptionFilter,0_2_0042A124
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: 0.2.AEo2XQmxqZ.exe.1730000.1.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                  Source: 0.2.AEo2XQmxqZ.exe.1730000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                  Source: 0.2.AEo2XQmxqZ.exe.1730000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 117B008Jump to behavior
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004587B1 LogonUserW,0_2_004587B1
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00403B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00403B3A
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004048D7
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00464C53 mouse_event,0_2_00464C53
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\AEo2XQmxqZ.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00457CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00457CAF
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0045874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0045874B
                  Source: AEo2XQmxqZ.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: AEo2XQmxqZ.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_0042862B cpuid 0_2_0042862B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00434E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00434E87
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00441E06 GetUserNameW,0_2_00441E06
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00433F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00433F3A
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_004049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004049A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.AEo2XQmxqZ.exe.1730000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.AEo2XQmxqZ.exe.1730000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: AEo2XQmxqZ.exe PID: 7820, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7880, type: MEMORYSTR
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.AEo2XQmxqZ.exe.1730000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.AEo2XQmxqZ.exe.1730000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: AEo2XQmxqZ.exe PID: 7820, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7880, type: MEMORYSTR
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.AEo2XQmxqZ.exe.1730000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.AEo2XQmxqZ.exe.1730000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: AEo2XQmxqZ.exe PID: 7820, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7880, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: AEo2XQmxqZ.exeBinary or memory string: WIN_81
                  Source: AEo2XQmxqZ.exeBinary or memory string: WIN_XP
                  Source: AEo2XQmxqZ.exeBinary or memory string: WIN_XPe
                  Source: AEo2XQmxqZ.exeBinary or memory string: WIN_VISTA
                  Source: AEo2XQmxqZ.exeBinary or memory string: WIN_7
                  Source: AEo2XQmxqZ.exeBinary or memory string: WIN_8
                  Source: AEo2XQmxqZ.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.AEo2XQmxqZ.exe.1730000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.AEo2XQmxqZ.exe.1730000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: AEo2XQmxqZ.exe PID: 7820, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7880, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.AEo2XQmxqZ.exe.1730000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.AEo2XQmxqZ.exe.1730000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: AEo2XQmxqZ.exe PID: 7820, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7880, type: MEMORYSTR
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.AEo2XQmxqZ.exe.1730000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.AEo2XQmxqZ.exe.1730000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: AEo2XQmxqZ.exe PID: 7820, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7880, type: MEMORYSTR
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.AEo2XQmxqZ.exe.1730000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.AEo2XQmxqZ.exe.1730000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: AEo2XQmxqZ.exe PID: 7820, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7880, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00476283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00476283
                  Source: C:\Users\user\Desktop\AEo2XQmxqZ.exeCode function: 0_2_00476747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476747
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  11
                  Native API
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault AccountsScheduled Task/Job2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  3
                  Obfuscated Files or Information
                  Security Account Manager1
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS127
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets231
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  23
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials11
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  AEo2XQmxqZ.exe67%ReversingLabsWin32.Trojan.Vigorf
                  AEo2XQmxqZ.exe61%VirustotalBrowse
                  AEo2XQmxqZ.exe100%AviraTR/AD.SnakeStealer.eiaqq
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://grupomaya.mxd0%Avira URL Cloudsafe
                  http://grupomaya.mx0%Avira URL Cloudsafe
                  http://mail.grupomaya.mxd0%Avira URL Cloudsafe
                  http://mail.grupomaya.mx0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  reallyfreegeoip.org
                  104.21.112.1
                  truefalse
                    high
                    grupomaya.mx
                    198.59.144.139
                    truetrue
                      unknown
                      checkip.dyndns.com
                      132.226.8.169
                      truefalse
                        high
                        mail.grupomaya.mx
                        unknown
                        unknowntrue
                          unknown
                          checkip.dyndns.org
                          unknown
                          unknownfalse
                            high
                            NameMaliciousAntivirus DetectionReputation
                            https://reallyfreegeoip.org/xml/8.46.123.189false
                              high
                              http://checkip.dyndns.org/false
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://api.telegram.org/botRegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://grupomaya.mxdRegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://reallyfreegeoip.orgdRegSvcs.exe, 00000001.00000002.2515135030.000000000343D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://mail.grupomaya.mxdRegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://r10.o.lencr.org0#RegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2514060970.00000000015A4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2516468485.0000000006747000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.orgRegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2515135030.0000000003420000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2515135030.000000000340E000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://mail.grupomaya.mxRegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://reallyfreegeoip.org/xml/8.46.123.189lRegSvcs.exe, 00000001.00000002.2515135030.0000000003420000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.comdRegSvcs.exe, 00000001.00000002.2515135030.0000000003420000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://x1.c.lencr.org/0RegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2514060970.00000000015A4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2516408656.0000000006735000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2516468485.0000000006747000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://x1.i.lencr.org/0RegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2514060970.00000000015A4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2516408656.0000000006735000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2516468485.0000000006747000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://checkip.dyndns.org/qAEo2XQmxqZ.exe, 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                  high
                                                  https://reallyfreegeoip.org/xml/8.46.123.189dRegSvcs.exe, 00000001.00000002.2515135030.0000000003420000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.2515135030.000000000343D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://checkip.dyndns.orgdRegSvcs.exe, 00000001.00000002.2515135030.0000000003420000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.2515135030.0000000003420000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://checkip.dyndns.comRegSvcs.exe, 00000001.00000002.2515135030.0000000003420000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://grupomaya.mxRegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://checkip.dyndns.org/dRegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2515135030.0000000003420000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.2515135030.00000000033A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://api.telegram.org/bot-/sendDocument?chat_id=AEo2XQmxqZ.exe, 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                  high
                                                                  http://r10.i.lencr.org/0RegSvcs.exe, 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2514060970.00000000015A4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2516468485.0000000006747000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://reallyfreegeoip.org/xml/AEo2XQmxqZ.exe, 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2515135030.0000000003420000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      132.226.8.169
                                                                      checkip.dyndns.comUnited States
                                                                      16989UTMEMUSfalse
                                                                      104.21.112.1
                                                                      reallyfreegeoip.orgUnited States
                                                                      13335CLOUDFLARENETUSfalse
                                                                      198.59.144.139
                                                                      grupomaya.mxUnited States
                                                                      13332HYPEENT-SJUStrue
                                                                      Joe Sandbox version:42.0.0 Malachite
                                                                      Analysis ID:1632323
                                                                      Start date and time:2025-03-07 22:19:38 +01:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 6m 24s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:10
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:AEo2XQmxqZ.exe
                                                                      renamed because original name is a hash value
                                                                      Original Sample Name:63986b611fcfeb4450112069d0ef4bc5ea7ec8390535020048bafb180c31eb65.exe
                                                                      Detection:MAL
                                                                      Classification:mal100.troj.spyw.evad.winEXE@3/4@3/3
                                                                      EGA Information:
                                                                      • Successful, ratio: 50%
                                                                      HCA Information:
                                                                      • Successful, ratio: 100%
                                                                      • Number of executed functions: 63
                                                                      • Number of non-executed functions: 265
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                      • Excluded IPs from analysis (whitelisted): 23.60.203.209
                                                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com, c.pki.goog
                                                                      • Execution Graph export aborted for target RegSvcs.exe, PID 7880 because it is empty
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                      TimeTypeDescription
                                                                      16:20:55API Interceptor25x Sleep call for process: RegSvcs.exe modified
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      132.226.8.169CWu89IbJQw.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                      • checkip.dyndns.org/
                                                                      NDCNDvC27F.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                      • checkip.dyndns.org/
                                                                      TfRJR0Y3uW.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                      • checkip.dyndns.org/
                                                                      DNNueAb5UZ.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                      • checkip.dyndns.org/
                                                                      NmuA605dM4.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                      • checkip.dyndns.org/
                                                                      4PYRGCo1Di.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                      • checkip.dyndns.org/
                                                                      XiJhd7Lx30.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      • checkip.dyndns.org/
                                                                      UFOiZapHGS.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      • checkip.dyndns.org/
                                                                      PvAmrCZENy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      • checkip.dyndns.org/
                                                                      uB9KTHzsXJ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                      • checkip.dyndns.org/
                                                                      104.21.112.1jzqc1V4NqB.exeGet hashmaliciousFormBookBrowse
                                                                      • www.rbopisalive.cyou/a669/?WBuDj=rwARXV5iz9NY7lD2nse3mpYvX8mI8lq4kwoE5vm7VO31wBaqesAJuHozl9YZ6Ede+IkifZaE/LHkIUXetab9qlITGUdXxZLx5IMa8uxv5i9osOS22A==&Jzwht=FNiD
                                                                      CP07E1clp1.exeGet hashmaliciousFormBookBrowse
                                                                      • www.fz977.xyz/406r/
                                                                      2Stejb80vJ.exeGet hashmaliciousFormBookBrowse
                                                                      • www.askvtwv8.top/uztg/
                                                                      Shipment_Docus_COSCO_20250307_35405649_pdf.bat.exeGet hashmaliciousLokibotBrowse
                                                                      • touxzw.ir/sccc/five/fre.php
                                                                      ORDER-000291-XLSX.exeGet hashmaliciousLokibotBrowse
                                                                      • touxzw.ir/tking3/five/fre.php
                                                                      Quotation_Order_Request_pdf.bat.exeGet hashmaliciousLokibotBrowse
                                                                      • touxzw.ir/sccc/five/fre.php
                                                                      CACUuGJw8e.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                      • loveme123ru.ru/PipeAuthmultiwordpress.php
                                                                      Udeladelsers21.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                      • www.tumbetgirislinki.fit/7tw6/
                                                                      http://onedrivesharedfiles.sbs/Get hashmaliciousDarkCloudBrowse
                                                                      • onedrivesharedfiles.sbs/
                                                                      PAYMENT SWIFT COPY.exeGet hashmaliciousFormBookBrowse
                                                                      • www.rbopisalive.cyou/6m32/
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      reallyfreegeoip.orgCWu89IbJQw.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                      • 104.21.112.1
                                                                      tSftorqHTy.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                      • 104.21.16.1
                                                                      O20L0ptxGs.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                      • 104.21.32.1
                                                                      DayVXJx1km.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                      • 104.21.64.1
                                                                      NDCNDvC27F.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                      • 104.21.32.1
                                                                      NDCNDvC27F.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                      • 104.21.48.1
                                                                      cexqIzhyvM.exeGet hashmaliciousGuLoaderBrowse
                                                                      • 104.21.96.1
                                                                      3c638k0NJx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      • 104.21.96.1
                                                                      drRbNknjyb.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      • 104.21.48.1
                                                                      3GrfjMY0pG.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      • 104.21.96.1
                                                                      checkip.dyndns.comCWu89IbJQw.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                      • 132.226.8.169
                                                                      tSftorqHTy.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                      • 132.226.247.73
                                                                      O20L0ptxGs.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                      • 158.101.44.242
                                                                      DayVXJx1km.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                      • 132.226.247.73
                                                                      NDCNDvC27F.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                      • 132.226.8.169
                                                                      NDCNDvC27F.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                      • 193.122.6.168
                                                                      cexqIzhyvM.exeGet hashmaliciousGuLoaderBrowse
                                                                      • 132.226.247.73
                                                                      3c638k0NJx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      • 158.101.44.242
                                                                      drRbNknjyb.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      • 132.226.247.73
                                                                      3GrfjMY0pG.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      • 193.122.6.168
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      UTMEMUSl9inNHJqHS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                      • 132.226.247.73
                                                                      CWu89IbJQw.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                      • 132.226.8.169
                                                                      tSftorqHTy.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                      • 132.226.247.73
                                                                      DayVXJx1km.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                      • 132.226.247.73
                                                                      NDCNDvC27F.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                      • 132.226.8.169
                                                                      cexqIzhyvM.exeGet hashmaliciousGuLoaderBrowse
                                                                      • 132.226.247.73
                                                                      drRbNknjyb.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      • 132.226.247.73
                                                                      TfRJR0Y3uW.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                      • 132.226.8.169
                                                                      DNNueAb5UZ.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                      • 132.226.8.169
                                                                      NmuA605dM4.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                      • 132.226.8.169
                                                                      HYPEENT-SJUStSftorqHTy.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                      • 198.59.144.139
                                                                      TfRJR0Y3uW.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                      • 198.59.144.139
                                                                      NmuA605dM4.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                      • 198.59.144.139
                                                                      qUG1ZROxLJ.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                      • 198.59.144.139
                                                                      arm.elfGet hashmaliciousUnknownBrowse
                                                                      • 206.206.98.7
                                                                      Pago 20250211.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                      • 198.59.144.139
                                                                      https://www.irmaflores.net/suh/*Get hashmaliciousUnknownBrowse
                                                                      • 206.206.123.61
                                                                      linux_ppc64el.elfGet hashmaliciousChaosBrowse
                                                                      • 206.206.76.202
                                                                      linux_arm6.elfGet hashmaliciousChaosBrowse
                                                                      • 206.206.76.202
                                                                      linux_arm7.elfGet hashmaliciousChaosBrowse
                                                                      • 206.206.76.202
                                                                      CLOUDFLARENETUSl9inNHJqHS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                      • 104.21.112.1
                                                                      tmezkNPazz.exeGet hashmaliciousNetSupport RATBrowse
                                                                      • 104.26.1.231
                                                                      CWu89IbJQw.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                      • 104.21.112.1
                                                                      https://live.dot.vu/p/dholcomb/landing-page-trends-report/Get hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                                                                      • 104.17.25.14
                                                                      tSftorqHTy.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                      • 104.21.16.1
                                                                      Play_Voicemail_Transcription._(387.KB).svgGet hashmaliciousHTMLPhisherBrowse
                                                                      • 172.67.167.74
                                                                      tmezkNPazz.exeGet hashmaliciousNetSupport RATBrowse
                                                                      • 104.26.1.231
                                                                      DQBok03QL1.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.187.236
                                                                      ORLVDnEcC3.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.189.66
                                                                      kS9YOZjwfn.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 188.114.97.3
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      54328bd36c14bd82ddaa0c04b25ed9adl9inNHJqHS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                      • 104.21.112.1
                                                                      CWu89IbJQw.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                      • 104.21.112.1
                                                                      tSftorqHTy.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                      • 104.21.112.1
                                                                      Z6ojPnRBp1.exeGet hashmaliciousRedLineBrowse
                                                                      • 104.21.112.1
                                                                      O20L0ptxGs.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                      • 104.21.112.1
                                                                      DayVXJx1km.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                      • 104.21.112.1
                                                                      NDCNDvC27F.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                      • 104.21.112.1
                                                                      NDCNDvC27F.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                      • 104.21.112.1
                                                                      cexqIzhyvM.exeGet hashmaliciousGuLoaderBrowse
                                                                      • 104.21.112.1
                                                                      3c638k0NJx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      • 104.21.112.1
                                                                      No context
                                                                      Process:C:\Users\user\Desktop\AEo2XQmxqZ.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):61634
                                                                      Entropy (8bit):7.868946654220264
                                                                      Encrypted:false
                                                                      SSDEEP:1536:dNCFkYRms+F56OwE60Pra0ZXUH9yfy1AOSnfE3ST+c2Sh0:dYFkIms856Owcr3Aky52fEhXSO
                                                                      MD5:E093900B6C3DCE67C96C3804AF7D3A05
                                                                      SHA1:0AA29AF949EE7F1F9A6CE724BD123F1E577E2E4B
                                                                      SHA-256:25002F9D682CAD41915999E4C57BD49EC016067B612E6AA607345AD1F99A93CC
                                                                      SHA-512:E7129F765E6DAFD8640FBD1F318FFF438DD21384932982702D2CE08CE43A3F1DED7E824C995FA06A5DF7428F80E53FF39377833427EF837F5D2B7A87B8BE9295
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:EA06..n..B.t..fmB..T.6.9...:.B.J......B.D..f`.....|]..B{F.S+>*.....]...$.a#..3j..q;.J....Z.n.I.2)..'0.X....i+..#.9.&....LN.I..j.......d..H.T..9..U1..k.....)t..........*gy..*..Mt.35...m...0..+u..>gY.P.4`.F.9..21#...1.........x|.j]&......}...D.S.....{.(.vuU..@..<.oB.....Js3..(|7.%N...P.3..C.\..>.....@.L@.>....y..*....J..Zd.....|...O....PQ..BcY.....C.S......B.L..&./.....)..._6..{..W.x.)..".].V. .........N`.....P......BN.(S@.....A..'...x.P....p....*.f.Y..i.+].C.L.....J..h.9..{...k\:D.2....8.....i.....Q....KU.....&u.l...(Vh..d.0.\..:Dn.6.T...x...T:F..@_#..%..?..&.:...J.....Z.c..w..:ui.....v;B..&........"S.eB.N.Vc..=..P...q....Y.Z)Q..rAY..(...B.R.L(.....9..U..*.c.Kf.:t.6........~...1.(.AY.D)S:.....R...d.s3.L-6:..53..(W.=*._.^qs9......i...B.\..(.9.6.H..j..,.<..l.....9..&...B...<.@....3.M.w....5.....2.q.T.3Ztb#Y.QiQ.`.....x....[..`*...+.Rk4..gL...5.=..Y.Q/.K......j.+]......p......b.....Q.@&..$P.0.U..t.s.P...d..P.R....B.N.Vj.....6.V..x......g|..B.K.btt*.J..d
                                                                      Process:C:\Users\user\Desktop\AEo2XQmxqZ.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):9774
                                                                      Entropy (8bit):7.61635944574595
                                                                      Encrypted:false
                                                                      SSDEEP:192:NShgedIkhnQbtvYp/UgbVPjOxTjtpsdL8bYfUW1MgNUscIsX:0h7pYtgp5VLO9xSubYfUsMyUs56
                                                                      MD5:8053BF39F260EA97FEF995EDC8109076
                                                                      SHA1:3EB2EACD2D1B2A300B0358D73DF910B4747358D3
                                                                      SHA-256:315AC602DC0AC8898881D88FA1FF0285CB058FD85B614FF6E42F7ADB69154CD9
                                                                      SHA-512:AA41FD8C193F4F00491D4BE0C6B565EB951ABF980F2794514B3AA612BA8789139C66866BB84A37F14DCDB2681085AEADC14221E70EB212A7CF9035D310FE5D63
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:EA06..p.....i]..p......G!....i,.Iq..n ...G%...Ry4.Oq.Id..]....)$..K........|. .o..q.In......+.H...*..eR.........!.Z.M*..6.p.o.J..\....X.g.*.H$....\....N...y=........*.I....r.%ri<..c ....Ar.H.......F.3<..]..6...F.... ...x..L....BT.....\..0.I..;..H...]. 5_..N.....5_..V.U...@5_....U....5_..F.U.. 5\..>2 ..I@^.r.Z..M%.z.I%......@.....RI..G../Z..e@.....jT...].H.u....$.P./.I+...d.G_T........>_.......zM&....YX...R....................`.M..`... ...p...@....'.'..@{>K...c..2p..\d.._..V....A.>K.#G.q..3|w...G.'..$ 8_..Mp..i|w.(...p.h... ........$...{.....$..;..+.....L..7YX.f..+..fdW.T..%.......f.`.E...Y....3.y.............wy...........2p....<d....,vD.........!+..'$@....,fI!.]...5......r.!.X..c2[..Cu.Y.!. .Gd ....,f.*.J.. .#$....c.......I..V.h.s.....,v@......t....P40...8..d......R.<..4..@.6.-..p..R....!...R..N..;&.`...*.......M+....c.`..].R.wx.....vJ...(... .E......y6....p.c2....'..b.!....F ....B5p..%R.$......vH... ..dw...T...B2`.....;+.X...r..........X..e`...Hd.[...p...
                                                                      Process:C:\Users\user\Desktop\AEo2XQmxqZ.exe
                                                                      File Type:ASCII text, with very long lines (28674), with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):28674
                                                                      Entropy (8bit):3.581041646927325
                                                                      Encrypted:false
                                                                      SSDEEP:768:NGGMNy6o9Fv2VkUPf0OAv/pROe2SknWEqeX:NGG6yUK0sbdFA
                                                                      MD5:DE6418E564CDC71874800EABACA4C484
                                                                      SHA1:D0E1D9E3C4B59A7BC2A494DD4A47F9279FE86AB2
                                                                      SHA-256:A977DB0DE7DCB3CF7BE596A4F6528E46F8B47A6581C6F4359ACB44528E8F05CE
                                                                      SHA-512:0B7E23F413C6E9C34B391A08E62A7300FB3F68A0715CB8355DED54BA670621CE3339449EDA7E1A7EA680D47BCD5A7E30D3B30F4DF9FEF2DB73BBB6D689307932
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:#k&&+qvp+"vppp#!####&%&$q+%q######%%+*'&+'q*%&######%%+*'w+%qr$!######%%+*&&++q+%v######%%+*'&+rq*%&######%%+*'w+pqr%p######%%+*&&+vq+ ######%%+*'&*#q* !######%%+*'w*!qr!v######%%+*&&*'q+%'######%%+*'&*%q*%p######%%+*'w*+qr%p######%%+*&&*r p#%%+*'&*pq*%v######%%+*+w''uuuuuuqr$'######%%+**&'%uuuuuuq+%'######%%+*+&'+uuuuuuq*%p######%%+*+w'ruuuuuuqr%p######%%+**&'puuuuuuq+!v######%%+*+&'vuuuuuuq*%'######%%+*+w&#uuuuuuqr%p######%%+**&&!uuuuuuq+%p######%%+*+&&'uuuuuu p*%%+*+w&%uuuuuuqr$&######%%+*&&w#q+$ ######%%+*'&w!q*%&######%%+*'ww'qr$!######%%+*&&w%q+ ######%%+*'&w+q* !######%%+*'wwrqr!v######%%+*&&wpq+%'######%%+*'&wvq*%p######%%+*'wv#qr%p######%%+*&&v! p#%%+*'&v'q*%"######%%+*+w%+uuuuuuqr%'######%%+**&%ruuuuuuq+$%######%%+*+&%puuuuuuq*%"######%%+*+w%vuuuuuuqr$#######%%+**&$#uuuuuuq+%*######%%+*+&$!uuuuuuq* ######%%+*+w$'uuuuuuqr !######%%+**&$%uuuuuuq+!v######%%+*+&$+uuuuuuq*%'######%%+*+w$ruuuuuuqr%p######%%+**&$puuuuuuq+%p######%%+*+&$vuuuuuu p*%%+*'w+#qr$ ######%%+*&&r#q+%+
                                                                      Process:C:\Users\user\Desktop\AEo2XQmxqZ.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):93696
                                                                      Entropy (8bit):6.804323888967216
                                                                      Encrypted:false
                                                                      SSDEEP:1536:AX1svHms9Rm4I+Ws9sSsksltsasMs4G9FEd+ARJn90z8iUi4o0jPBfONv8OisMfI:AX1uv/WG97kdPLG9FEdvL9A8iUi4jPBY
                                                                      MD5:7C187DD1ADF05DF274B5A9ED7F4349DF
                                                                      SHA1:BD521EA7743B48F9F886E93EBABD1AF1192AED06
                                                                      SHA-256:DBCAFDC1CD356AF0D19BD98BC9FD139C8B163A97CF9A7BBDAE116FDD9A7B1D08
                                                                      SHA-512:19F21C0EF0C02ED99AA1AA9B81E63EC159767A14714ACE541E79CACAF0F0539B7A2FA0242D5F528484538E270EFE07105A2CE2160442BBFDC73891989DF4F0D8
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:...J0Y6B]VJI..S9.N0CYPCJsY6BYVJIYDS93N0CYPCJ3Y6BYVJIYDS93N0C.PCJ=F.LY.C.x.Ru.od+0#c:A6Q08;j*8*=VGnR&y"6$.0Xb...i4+7\.C=I}PCJ3Y6B..JI.EP9. x.YPCJ3Y6B.VHHRE.93*1CYXCJ3Y6B..KIYdS93.1CYP.J3y6BYTJI]DS93N0C_PCJ3Y6BY.KIYFS93N0C[P#.3Y&BYFJIYDC93^0CYPCJ#Y6BYVJIYDS9k.1C.PCJ3.7B.SJIYDS93N0CYPCJ3Y6BY.KIUDS93N0CYPCJ3Y6BYVJIYDS93N0CYPCJ3Y6BYVJIYDS93N0CYPCJ3y6BQVJIYDS93N0CQpCJ{Y6BYVJIYDS9.:U;-PCJ.;7BYvJIY R93L0CYPCJ3Y6BYVJIyDSY.<C1:PCJ.\6BY.KIYBS93(1CYPCJ3Y6BYVJI.DSy.<U/63CJ?Y6BY.KIYFS93"1CYPCJ3Y6BYVJI.DS{3N0CYPCJ3Y6BYVJI..R93N0C.PCJ1Y3B..JI].S90N0C.PCL..6B.VJIYDS93N0CYPCJ3Y6BYVJIYDS93N0CYPCJ3Y6BYVJI.9.6...**..J3Y6BYWHJ]B[13N0CYPCJMY6B.VJI.DS9.N0C|PCJ^Y6B}VJI'DS9MN0C=PCJAY6B8VJI.DS9\N0C7PCJMY6BGTbVYDY..N2kyPC@3s.1xVJC.ES97=.CYZ.H3Y21zVJC.GS97=.CYZ.N3Y21|VJC.AS97djCZ.UL3Y--aVJCYG.,5N0XsvCH.`6BSV`oYG.,5N0XsrCH.P6B]|.:DDS?..0CS$JJ3[.HYVNcGF{z3N:i{.PJ3].Bst4]YDW.3d.=LPCN.Y.`'@JI]oS..0'CYThJ._. Y$.EY4PVRN0Eq.CJ9qvBYPJccD-73N4A6.CJ9...Y~.IYBS.eN0EYx.J3_6j.VJOYl.93H0icPk.3Y0Bq.JI_Dy.30.CYToMMj6B]}\7hDS=.HHC
                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                      Entropy (8bit):0.15024189640555335
                                                                      TrID:
                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                      File name:AEo2XQmxqZ.exe
                                                                      File size:80'740'352 bytes
                                                                      MD5:21dd3d0e0a31093f28ac0f4a70c5b949
                                                                      SHA1:89ba5afc1309e1d48f968f9cbec75e3f902ceeba
                                                                      SHA256:63986b611fcfeb4450112069d0ef4bc5ea7ec8390535020048bafb180c31eb65
                                                                      SHA512:0469ad24270b9ddc5be82bb7d543cc8b4d37b3f3818475e044f3fb2bacb947ecd1e4749d222245fdb541ed0ef83263c276944058b2c4320f82e3f2b9ae71ab45
                                                                      SSDEEP:24576:7u6J33O0c+JY5UZ+XC0kGso6FaKypwnWY:1u0c++OCvkGs9FaK4Y
                                                                      TLSH:4F08AD2273DDC360CB669173BF6AB7016EBF7C614630B85B2F880D7DA950162162D7A3
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                                      Icon Hash:aaf3e3e3938382a0
                                                                      Entrypoint:0x427dcd
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x67ADFD9C [Thu Feb 13 14:11:40 2025 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:5
                                                                      OS Version Minor:1
                                                                      File Version Major:5
                                                                      File Version Minor:1
                                                                      Subsystem Version Major:5
                                                                      Subsystem Version Minor:1
                                                                      Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                                      Instruction
                                                                      call 00007F78DCEE83AAh
                                                                      jmp 00007F78DCEDB174h
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      push edi
                                                                      push esi
                                                                      mov esi, dword ptr [esp+10h]
                                                                      mov ecx, dword ptr [esp+14h]
                                                                      mov edi, dword ptr [esp+0Ch]
                                                                      mov eax, ecx
                                                                      mov edx, ecx
                                                                      add eax, esi
                                                                      cmp edi, esi
                                                                      jbe 00007F78DCEDB2FAh
                                                                      cmp edi, eax
                                                                      jc 00007F78DCEDB65Eh
                                                                      bt dword ptr [004C31FCh], 01h
                                                                      jnc 00007F78DCEDB2F9h
                                                                      rep movsb
                                                                      jmp 00007F78DCEDB60Ch
                                                                      cmp ecx, 00000080h
                                                                      jc 00007F78DCEDB4C4h
                                                                      mov eax, edi
                                                                      xor eax, esi
                                                                      test eax, 0000000Fh
                                                                      jne 00007F78DCEDB300h
                                                                      bt dword ptr [004BE324h], 01h
                                                                      jc 00007F78DCEDB7D0h
                                                                      bt dword ptr [004C31FCh], 00000000h
                                                                      jnc 00007F78DCEDB49Dh
                                                                      test edi, 00000003h
                                                                      jne 00007F78DCEDB4AEh
                                                                      test esi, 00000003h
                                                                      jne 00007F78DCEDB48Dh
                                                                      bt edi, 02h
                                                                      jnc 00007F78DCEDB2FFh
                                                                      mov eax, dword ptr [esi]
                                                                      sub ecx, 04h
                                                                      lea esi, dword ptr [esi+04h]
                                                                      mov dword ptr [edi], eax
                                                                      lea edi, dword ptr [edi+04h]
                                                                      bt edi, 03h
                                                                      jnc 00007F78DCEDB303h
                                                                      movq xmm1, qword ptr [esi]
                                                                      sub ecx, 08h
                                                                      lea esi, dword ptr [esi+08h]
                                                                      movq qword ptr [edi], xmm1
                                                                      lea edi, dword ptr [edi+08h]
                                                                      test esi, 00000007h
                                                                      je 00007F78DCEDB355h
                                                                      bt esi, 03h
                                                                      jnc 00007F78DCEDB3A8h
                                                                      Programming Language:
                                                                      • [ASM] VS2013 build 21005
                                                                      • [ C ] VS2013 build 21005
                                                                      • [C++] VS2013 build 21005
                                                                      • [ C ] VS2008 SP1 build 30729
                                                                      • [IMP] VS2008 SP1 build 30729
                                                                      • [ASM] VS2013 UPD4 build 31101
                                                                      • [RES] VS2013 build 21005
                                                                      • [LNK] VS2013 UPD4 build 31101
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x1ce74.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xe40000x711c.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .rsrc0xc70000x1ce740x1d0009011123016b5bf6c78727ac494777542False0.7713244207974138data7.43948593267875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0xe40000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                      RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                      RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                      RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                      RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                      RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                      RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                      RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                      RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                      RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                      RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                      RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                      RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                                      RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                      RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                                      RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                                      RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                      RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                      RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                      RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                      RT_RCDATA0xcf7b80x1413adata1.0004377751295084
                                                                      RT_GROUP_ICON0xe38f40x76dataEnglishGreat Britain0.6610169491525424
                                                                      RT_GROUP_ICON0xe396c0x14dataEnglishGreat Britain1.25
                                                                      RT_GROUP_ICON0xe39800x14dataEnglishGreat Britain1.15
                                                                      RT_GROUP_ICON0xe39940x14dataEnglishGreat Britain1.25
                                                                      RT_VERSION0xe39a80xdcdataEnglishGreat Britain0.6181818181818182
                                                                      RT_MANIFEST0xe3a840x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                      DLLImport
                                                                      WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                                      VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                      MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                                      WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                                      PSAPI.DLLGetProcessMemoryInfo
                                                                      IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                                      USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                                      UxTheme.dllIsThemeActive
                                                                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                                      USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                                      GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                                      COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                                      SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                                      OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                                      DescriptionData
                                                                      Translation0x0809 0x04b0
                                                                      Language of compilation systemCountry where language is spokenMap
                                                                      EnglishGreat Britain
                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                      2025-03-07T22:20:48.195988+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449715132.226.8.16980TCP
                                                                      2025-03-07T22:20:55.946016+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449715132.226.8.16980TCP
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Mar 7, 2025 22:20:46.932763100 CET4971580192.168.2.4132.226.8.169
                                                                      Mar 7, 2025 22:20:46.937906027 CET8049715132.226.8.169192.168.2.4
                                                                      Mar 7, 2025 22:20:46.937973976 CET4971580192.168.2.4132.226.8.169
                                                                      Mar 7, 2025 22:20:46.938244104 CET4971580192.168.2.4132.226.8.169
                                                                      Mar 7, 2025 22:20:46.943244934 CET8049715132.226.8.169192.168.2.4
                                                                      Mar 7, 2025 22:20:47.855318069 CET8049715132.226.8.169192.168.2.4
                                                                      Mar 7, 2025 22:20:47.859061956 CET4971580192.168.2.4132.226.8.169
                                                                      Mar 7, 2025 22:20:47.864223957 CET8049715132.226.8.169192.168.2.4
                                                                      Mar 7, 2025 22:20:48.149168015 CET8049715132.226.8.169192.168.2.4
                                                                      Mar 7, 2025 22:20:48.161732912 CET49717443192.168.2.4104.21.112.1
                                                                      Mar 7, 2025 22:20:48.161839008 CET44349717104.21.112.1192.168.2.4
                                                                      Mar 7, 2025 22:20:48.162117958 CET49717443192.168.2.4104.21.112.1
                                                                      Mar 7, 2025 22:20:48.171292067 CET49717443192.168.2.4104.21.112.1
                                                                      Mar 7, 2025 22:20:48.171329975 CET44349717104.21.112.1192.168.2.4
                                                                      Mar 7, 2025 22:20:48.195987940 CET4971580192.168.2.4132.226.8.169
                                                                      Mar 7, 2025 22:20:49.832648993 CET44349717104.21.112.1192.168.2.4
                                                                      Mar 7, 2025 22:20:49.832776070 CET49717443192.168.2.4104.21.112.1
                                                                      Mar 7, 2025 22:20:49.851309061 CET49717443192.168.2.4104.21.112.1
                                                                      Mar 7, 2025 22:20:49.851376057 CET44349717104.21.112.1192.168.2.4
                                                                      Mar 7, 2025 22:20:49.851672888 CET44349717104.21.112.1192.168.2.4
                                                                      Mar 7, 2025 22:20:49.894597054 CET49717443192.168.2.4104.21.112.1
                                                                      Mar 7, 2025 22:20:49.907186985 CET49717443192.168.2.4104.21.112.1
                                                                      Mar 7, 2025 22:20:49.948338985 CET44349717104.21.112.1192.168.2.4
                                                                      Mar 7, 2025 22:20:50.419209003 CET44349717104.21.112.1192.168.2.4
                                                                      Mar 7, 2025 22:20:50.419296980 CET44349717104.21.112.1192.168.2.4
                                                                      Mar 7, 2025 22:20:50.419363976 CET49717443192.168.2.4104.21.112.1
                                                                      Mar 7, 2025 22:20:50.427490950 CET49717443192.168.2.4104.21.112.1
                                                                      Mar 7, 2025 22:20:55.607168913 CET4971580192.168.2.4132.226.8.169
                                                                      Mar 7, 2025 22:20:55.612533092 CET8049715132.226.8.169192.168.2.4
                                                                      Mar 7, 2025 22:20:55.897794962 CET8049715132.226.8.169192.168.2.4
                                                                      Mar 7, 2025 22:20:55.946016073 CET4971580192.168.2.4132.226.8.169
                                                                      Mar 7, 2025 22:20:56.273924112 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:56.279998064 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:56.280072927 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:56.869951963 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:56.870354891 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:56.875426054 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:57.007745981 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:57.008028984 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:57.013094902 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:57.147546053 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:57.152187109 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:57.157404900 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:57.306983948 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:57.306997061 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:57.306998968 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:57.307245016 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:57.345674038 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:57.350819111 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:57.485565901 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:57.489931107 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:57.495671034 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:57.626705885 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:57.627950907 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:57.633033037 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:57.764862061 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:57.765424967 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:57.770524025 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:57.913341999 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:57.915529966 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:57.920645952 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:58.253103018 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:58.255470991 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:58.260504961 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:58.413428068 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:58.413661003 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:58.418772936 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:58.549807072 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:58.589973927 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:58.590090990 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:58.590122938 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:58.590167999 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:58.590373039 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:58.590398073 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:58.590430021 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:58.590523005 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:20:58.595083952 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:58.595216036 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:58.595227957 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:58.595315933 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:58.595455885 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:58.595575094 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:58.595671892 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:58.595681906 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:58.595691919 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:58.595700979 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:58.774065018 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:20:58.821021080 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:21:45.915127039 CET4971580192.168.2.4132.226.8.169
                                                                      Mar 7, 2025 22:21:45.920510054 CET8049715132.226.8.169192.168.2.4
                                                                      Mar 7, 2025 22:21:45.920609951 CET4971580192.168.2.4132.226.8.169
                                                                      Mar 7, 2025 22:22:35.930803061 CET49718587192.168.2.4198.59.144.139
                                                                      Mar 7, 2025 22:22:35.935977936 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:22:36.068161964 CET58749718198.59.144.139192.168.2.4
                                                                      Mar 7, 2025 22:22:36.068656921 CET49718587192.168.2.4198.59.144.139
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Mar 7, 2025 22:20:46.908500910 CET5524953192.168.2.41.1.1.1
                                                                      Mar 7, 2025 22:20:46.915796995 CET53552491.1.1.1192.168.2.4
                                                                      Mar 7, 2025 22:20:48.150857925 CET6158853192.168.2.41.1.1.1
                                                                      Mar 7, 2025 22:20:48.160890102 CET53615881.1.1.1192.168.2.4
                                                                      Mar 7, 2025 22:20:55.909837008 CET5153153192.168.2.41.1.1.1
                                                                      Mar 7, 2025 22:20:56.272316933 CET53515311.1.1.1192.168.2.4
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Mar 7, 2025 22:20:46.908500910 CET192.168.2.41.1.1.10x2a13Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                      Mar 7, 2025 22:20:48.150857925 CET192.168.2.41.1.1.10x3aacStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                      Mar 7, 2025 22:20:55.909837008 CET192.168.2.41.1.1.10xd9ccStandard query (0)mail.grupomaya.mxA (IP address)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Mar 7, 2025 22:20:46.915796995 CET1.1.1.1192.168.2.40x2a13No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                      Mar 7, 2025 22:20:46.915796995 CET1.1.1.1192.168.2.40x2a13No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                      Mar 7, 2025 22:20:46.915796995 CET1.1.1.1192.168.2.40x2a13No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                      Mar 7, 2025 22:20:46.915796995 CET1.1.1.1192.168.2.40x2a13No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                      Mar 7, 2025 22:20:46.915796995 CET1.1.1.1192.168.2.40x2a13No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                      Mar 7, 2025 22:20:46.915796995 CET1.1.1.1192.168.2.40x2a13No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                      Mar 7, 2025 22:20:48.160890102 CET1.1.1.1192.168.2.40x3aacNo error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                      Mar 7, 2025 22:20:48.160890102 CET1.1.1.1192.168.2.40x3aacNo error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                      Mar 7, 2025 22:20:48.160890102 CET1.1.1.1192.168.2.40x3aacNo error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                      Mar 7, 2025 22:20:48.160890102 CET1.1.1.1192.168.2.40x3aacNo error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                      Mar 7, 2025 22:20:48.160890102 CET1.1.1.1192.168.2.40x3aacNo error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                      Mar 7, 2025 22:20:48.160890102 CET1.1.1.1192.168.2.40x3aacNo error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                      Mar 7, 2025 22:20:48.160890102 CET1.1.1.1192.168.2.40x3aacNo error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                      Mar 7, 2025 22:20:56.272316933 CET1.1.1.1192.168.2.40xd9ccNo error (0)mail.grupomaya.mxgrupomaya.mxCNAME (Canonical name)IN (0x0001)false
                                                                      Mar 7, 2025 22:20:56.272316933 CET1.1.1.1192.168.2.40xd9ccNo error (0)grupomaya.mx198.59.144.139A (IP address)IN (0x0001)false
                                                                      • reallyfreegeoip.org
                                                                      • checkip.dyndns.org
                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.449715132.226.8.169807880C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Mar 7, 2025 22:20:46.938244104 CET151OUTGET / HTTP/1.1
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                      Host: checkip.dyndns.org
                                                                      Connection: Keep-Alive
                                                                      Mar 7, 2025 22:20:47.855318069 CET273INHTTP/1.1 200 OK
                                                                      Date: Fri, 07 Mar 2025 21:20:47 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 104
                                                                      Connection: keep-alive
                                                                      Cache-Control: no-cache
                                                                      Pragma: no-cache
                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                      Mar 7, 2025 22:20:47.859061956 CET127OUTGET / HTTP/1.1
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                      Host: checkip.dyndns.org
                                                                      Mar 7, 2025 22:20:48.149168015 CET273INHTTP/1.1 200 OK
                                                                      Date: Fri, 07 Mar 2025 21:20:48 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 104
                                                                      Connection: keep-alive
                                                                      Cache-Control: no-cache
                                                                      Pragma: no-cache
                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                      Mar 7, 2025 22:20:55.607168913 CET127OUTGET / HTTP/1.1
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                      Host: checkip.dyndns.org
                                                                      Mar 7, 2025 22:20:55.897794962 CET273INHTTP/1.1 200 OK
                                                                      Date: Fri, 07 Mar 2025 21:20:55 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 104
                                                                      Connection: keep-alive
                                                                      Cache-Control: no-cache
                                                                      Pragma: no-cache
                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.449717104.21.112.14437880C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2025-03-07 21:20:49 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                      Host: reallyfreegeoip.org
                                                                      Connection: Keep-Alive
                                                                      2025-03-07 21:20:50 UTC854INHTTP/1.1 200 OK
                                                                      Date: Fri, 07 Mar 2025 21:20:50 GMT
                                                                      Content-Type: text/xml
                                                                      Content-Length: 362
                                                                      Connection: close
                                                                      Age: 468185
                                                                      Cache-Control: max-age=31536000
                                                                      cf-cache-status: HIT
                                                                      last-modified: Sun, 02 Mar 2025 11:17:44 GMT
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zwCBKR3cOoUoRIWuSsU7ERXd9F%2BdsmNoZcQmXwZmAxEb10AEPYDnfd%2BfksMTF6X2OwdV1YwKb3FFucM60Y6IDyklqB%2FuOqGY9GHBUBQgOrQFFtjkl1l9Y8pKTWAI7bVLnZSyEO7a"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 91cd239919c888c3-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=7386&min_rtt=7255&rtt_var=2268&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=370427&cwnd=117&unsent_bytes=0&cid=36a7139e7b66843b&ts=595&x=0"
                                                                      2025-03-07 21:20:50 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                      TimestampSource PortDest PortSource IPDest IPCommands
                                                                      Mar 7, 2025 22:20:56.869951963 CET58749718198.59.144.139192.168.2.4220-svgt326.serverneubox.com.mx ESMTP Exim 4.98.1 #2 Fri, 07 Mar 2025 15:20:56 -0600
                                                                      220-We do not authorize the use of this system to transport unsolicited,
                                                                      220 and/or bulk e-mail.
                                                                      Mar 7, 2025 22:20:56.870354891 CET49718587192.168.2.4198.59.144.139EHLO 830021
                                                                      Mar 7, 2025 22:20:57.007745981 CET58749718198.59.144.139192.168.2.4250-svgt326.serverneubox.com.mx Hello 830021 [8.46.123.189]
                                                                      250-SIZE 52428800
                                                                      250-LIMITS MAILMAX=1000 RCPTMAX=50000
                                                                      250-8BITMIME
                                                                      250-PIPELINING
                                                                      250-PIPECONNECT
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-STARTTLS
                                                                      250 HELP
                                                                      Mar 7, 2025 22:20:57.008028984 CET49718587192.168.2.4198.59.144.139STARTTLS
                                                                      Mar 7, 2025 22:20:57.147546053 CET58749718198.59.144.139192.168.2.4220 TLS go ahead

                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:16:20:43
                                                                      Start date:07/03/2025
                                                                      Path:C:\Users\user\Desktop\AEo2XQmxqZ.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\AEo2XQmxqZ.exe"
                                                                      Imagebase:0x400000
                                                                      File size:80'740'352 bytes
                                                                      MD5 hash:21DD3D0E0A31093F28AC0F4A70C5B949
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_MSILLogger, Description: Yara detected MSIL Logger, Source: 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.1276906217.0000000001730000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:1
                                                                      Start time:16:20:44
                                                                      Start date:07/03/2025
                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\AEo2XQmxqZ.exe"
                                                                      Imagebase:0xf10000
                                                                      File size:45'984 bytes
                                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_MSILLogger, Description: Yara detected MSIL Logger, Source: 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.2513494614.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.2515135030.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:high
                                                                      Has exited:false

                                                                      Reset < >