Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
smss (2).exe

Overview

General Information

Sample name:smss (2).exe
Analysis ID:1664057
MD5:a9a05d451c24858918183c1e7271a306
SHA1:e9ea72f8b86886be421da90c131659d6ebb9483f
SHA256:d878f6aa5cc41db62f6b2c3466cbec5d792eaf8f77b2ea1e779e7925f267be52
Tags:104-168-7-18exesalsita-linkuser-JAMESWT_WT
Infos:

Detection

MSIL Logger, MassLogger RAT
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected MSIL Logger
Yara detected MassLogger RAT
Yara detected Telegram RAT
.NET source code references suspicious native API functions
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • smss (2).exe (PID: 8184 cmdline: "C:\Users\user\Desktop\smss (2).exe" MD5: A9A05D451C24858918183C1E7271A306)
    • RegSvcs.exe (PID: 7392 cmdline: "C:\Users\user\Desktop\smss (2).exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"EXfil Mode": "Telegram", "Telegram Token": "7598843355:AAHehybWWiULdkPS1RLFstdr4_yw-SdkoII", "Telegram Chatid": "7668947425"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
        00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0xf1df:$a1: get_encryptedPassword
          • 0xf507:$a2: get_encryptedUsername
          • 0xef7a:$a3: get_timePasswordChanged
          • 0xf09b:$a4: get_passwordField
          • 0xf1f5:$a5: set_encryptedPassword
          • 0x10b51:$a7: get_logins
          • 0x10802:$a8: GetOutlookPasswords
          • 0x105f4:$a9: StartKeylogger
          • 0x10aa1:$a10: KeyLoggerEventArgs
          • 0x10651:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 17 entries
          SourceRuleDescriptionAuthorStrings
          0.2.smss (2).exe.3f10000.1.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            0.2.smss (2).exe.3f10000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.smss (2).exe.3f10000.1.unpackJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
                0.2.smss (2).exe.3f10000.1.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  0.2.smss (2).exe.3f10000.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                  • 0xd3df:$a1: get_encryptedPassword
                  • 0xd707:$a2: get_encryptedUsername
                  • 0xd17a:$a3: get_timePasswordChanged
                  • 0xd29b:$a4: get_passwordField
                  • 0xd3f5:$a5: set_encryptedPassword
                  • 0xed51:$a7: get_logins
                  • 0xea02:$a8: GetOutlookPasswords
                  • 0xe7f4:$a9: StartKeylogger
                  • 0xeca1:$a10: KeyLoggerEventArgs
                  • 0xe851:$a11: KeyLoggerEventArgsEventHandler
                  Click to see the 13 entries
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-04-13T10:58:29.242684+020028032742Potentially Bad Traffic192.168.2.549692193.122.130.080TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 00000001.00000002.2569009214.0000000003031000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7598843355:AAHehybWWiULdkPS1RLFstdr4_yw-SdkoII", "Telegram Chatid": "7668947425"}
                  Source: smss (2).exeVirustotal: Detection: 64%Perma Link
                  Source: smss (2).exeReversingLabs: Detection: 63%
                  Source: Submited SampleNeural Call Log Analysis: 97.5%

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: smss (2).exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49693 version: TLS 1.0
                  Source: Binary string: wntdll.pdbUGP source: smss (2).exe, 00000000.00000003.1327321038.00000000040D0000.00000004.00001000.00020000.00000000.sdmp, smss (2).exe, 00000000.00000003.1327159958.0000000003F30000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: smss (2).exe, 00000000.00000003.1327321038.00000000040D0000.00000004.00001000.00020000.00000000.sdmp, smss (2).exe, 00000000.00000003.1327159958.0000000003F30000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0019445A
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019C6D1 FindFirstFileW,FindClose,0_2_0019C6D1
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0019C75C
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0019EF95
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0019F0F2
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0019F3F3
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001937EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_001937EF
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00193B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00193B12
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0019BCBC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 013B9731h1_2_013B9480
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 013B9E5Ah1_2_013B9A40
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 013B9E5Ah1_2_013B9A30
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 013B9E5Ah1_2_013B9D87
                  Source: global trafficHTTP traffic detected: GET /xml/89.187.171.161 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
                  Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
                  Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49692 -> 193.122.130.0:80
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49693 version: TLS 1.0
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001A22EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_001A22EE
                  Source: global trafficHTTP traffic detected: GET /xml/89.187.171.161 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: RegSvcs.exe, 00000001.00000002.2569009214.00000000030B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: RegSvcs.exe, 00000001.00000002.2569009214.00000000030B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                  Source: RegSvcs.exe, 00000001.00000002.2569009214.00000000030B0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2569009214.000000000309E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: RegSvcs.exe, 00000001.00000002.2569009214.0000000003031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: RegSvcs.exe, 00000001.00000002.2569009214.00000000030B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                  Source: smss (2).exe, 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: RegSvcs.exe, 00000001.00000002.2569009214.00000000030B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                  Source: RegSvcs.exe, 00000001.00000002.2569009214.00000000030CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                  Source: RegSvcs.exe, 00000001.00000002.2569009214.00000000030CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                  Source: RegSvcs.exe, 00000001.00000002.2569009214.0000000003031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: smss (2).exe, 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                  Source: RegSvcs.exe, 00000001.00000002.2569009214.00000000030B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: smss (2).exe, 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2569009214.00000000030B0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: RegSvcs.exe, 00000001.00000002.2569009214.00000000030B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/89.187.171.161d
                  Source: RegSvcs.exe, 00000001.00000002.2569009214.00000000030B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/89.187.171.161l
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.smss (2).exe.3f10000.1.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001A4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_001A4164
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001A4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_001A4164
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001A3F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_001A3F66
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0019001C
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001BCABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_001BCABC

                  System Summary

                  barindex
                  Source: 0.2.smss (2).exe.3f10000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.smss (2).exe.3f10000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.smss (2).exe.3f10000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.smss (2).exe.3f10000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: smss (2).exe PID: 8184, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: RegSvcs.exe PID: 7392, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: This is a third-party compiled AutoIt script.0_2_00133B3A
                  Source: smss (2).exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: smss (2).exe, 00000000.00000000.1312707495.00000000001E4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_2c5a4984-a
                  Source: smss (2).exe, 00000000.00000000.1312707495.00000000001E4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_c0a18c71-9
                  Source: smss (2).exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_082210b7-2
                  Source: smss (2).exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_b6372469-5
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0019A1EF
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00188310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00188310
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001951BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_001951BD
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0013E6A00_2_0013E6A0
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0015D9750_2_0015D975
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001521C50_2_001521C5
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001662D20_2_001662D2
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001B03DA0_2_001B03DA
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0016242E0_2_0016242E
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001525FA0_2_001525FA
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0018E6160_2_0018E616
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001466E10_2_001466E1
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0016878F0_2_0016878F
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001488080_2_00148808
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001B08570_2_001B0857
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001668440_2_00166844
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001988890_2_00198889
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0015CB210_2_0015CB21
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00166DB60_2_00166DB6
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00146F9E0_2_00146F9E
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001430300_2_00143030
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001531870_2_00153187
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0015F1D90_2_0015F1D9
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001312870_2_00131287
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001514840_2_00151484
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001455200_2_00145520
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001576960_2_00157696
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001457600_2_00145760
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001519780_2_00151978
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00169AB50_2_00169AB5
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0013FCE00_2_0013FCE0
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00151D900_2_00151D90
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0015BDA60_2_0015BDA6
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001B7DDB0_2_001B7DDB
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0013DF000_2_0013DF00
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00143FE00_2_00143FE0
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_018582880_2_01858288
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_013BC5301_2_013BC530
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_013B27B91_2_013B27B9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_013B94801_2_013B9480
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_013BC5211_2_013BC521
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_013B2DD11_2_013B2DD1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_013B946F1_2_013B946F
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: String function: 00150AE3 appears 70 times
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: String function: 00137DE1 appears 35 times
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: String function: 00158900 appears 42 times
                  Source: smss (2).exe, 00000000.00000003.1328022782.0000000004053000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs smss (2).exe
                  Source: smss (2).exe, 00000000.00000003.1329288356.000000000421D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs smss (2).exe
                  Source: smss (2).exe, 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs smss (2).exe
                  Source: smss (2).exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 0.2.smss (2).exe.3f10000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.smss (2).exe.3f10000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.smss (2).exe.3f10000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.smss (2).exe.3f10000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: smss (2).exe PID: 8184, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: RegSvcs.exe PID: 7392, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.smss (2).exe.3f10000.1.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.smss (2).exe.3f10000.1.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@2/2
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019A06A GetLastError,FormatMessageW,0_2_0019A06A
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001881CB AdjustTokenPrivileges,CloseHandle,0_2_001881CB
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001887E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_001887E1
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0019B333
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001AEE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_001AEE0D
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019C397 CoInitialize,CoCreateInstance,CoUninitialize,0_2_0019C397
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00134E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00134E89
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\smss (2).exeFile created: C:\Users\user\AppData\Local\Temp\aut33A.tmpJump to behavior
                  Source: smss (2).exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\smss (2).exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegSvcs.exe, 00000001.00000002.2569009214.0000000003150000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2569009214.0000000003143000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2569009214.000000000312F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2569394913.000000000405D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2569009214.0000000003111000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2569009214.0000000003120000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: smss (2).exeVirustotal: Detection: 64%
                  Source: smss (2).exeReversingLabs: Detection: 63%
                  Source: unknownProcess created: C:\Users\user\Desktop\smss (2).exe "C:\Users\user\Desktop\smss (2).exe"
                  Source: C:\Users\user\Desktop\smss (2).exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\smss (2).exe"
                  Source: C:\Users\user\Desktop\smss (2).exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\smss (2).exe"Jump to behavior
                  Source: C:\Users\user\Desktop\smss (2).exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\smss (2).exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\smss (2).exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\smss (2).exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\smss (2).exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\smss (2).exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\smss (2).exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\smss (2).exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\smss (2).exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\smss (2).exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\smss (2).exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: smss (2).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: smss (2).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: smss (2).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: smss (2).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: smss (2).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: smss (2).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: smss (2).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: smss (2).exe, 00000000.00000003.1327321038.00000000040D0000.00000004.00001000.00020000.00000000.sdmp, smss (2).exe, 00000000.00000003.1327159958.0000000003F30000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: smss (2).exe, 00000000.00000003.1327321038.00000000040D0000.00000004.00001000.00020000.00000000.sdmp, smss (2).exe, 00000000.00000003.1327159958.0000000003F30000.00000004.00001000.00020000.00000000.sdmp
                  Source: smss (2).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: smss (2).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: smss (2).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: smss (2).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: smss (2).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00134B37 LoadLibraryA,GetProcAddress,0_2_00134B37
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00158945 push ecx; ret 0_2_00158958
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001348D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_001348D7
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001B5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_001B5376
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00153187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00153187
                  Source: C:\Users\user\Desktop\smss (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\smss (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\smss (2).exeAPI/Special instruction interceptor: Address: 1857EAC
                  Source: C:\Users\user\Desktop\smss (2).exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-102521
                  Source: C:\Users\user\Desktop\smss (2).exeAPI coverage: 5.1 %
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0019445A
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019C6D1 FindFirstFileW,FindClose,0_2_0019C6D1
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0019C75C
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0019EF95
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0019F0F2
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0019F3F3
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001937EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_001937EF
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00193B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00193B12
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0019BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0019BCBC
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001349A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001349A0
                  Source: RegSvcs.exe, 00000001.00000002.2568526699.0000000001176000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlly
                  Source: C:\Users\user\Desktop\smss (2).exeAPI call chain: ExitProcess graph end nodegraph_0-101309
                  Source: C:\Users\user\Desktop\smss (2).exeAPI call chain: ExitProcess graph end nodegraph_0-101536
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001A3F09 BlockInput,0_2_001A3F09
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00133B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00133B3A
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00165A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00165A7C
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00134B37 LoadLibraryA,GetProcAddress,0_2_00134B37
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_01858118 mov eax, dword ptr fs:[00000030h]0_2_01858118
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_01858178 mov eax, dword ptr fs:[00000030h]0_2_01858178
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_01856AC8 mov eax, dword ptr fs:[00000030h]0_2_01856AC8
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001880A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_001880A9
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0015A124 SetUnhandledExceptionFilter,0_2_0015A124
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0015A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0015A155
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: 0.2.smss (2).exe.3f10000.1.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                  Source: 0.2.smss (2).exe.3f10000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                  Source: 0.2.smss (2).exe.3f10000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
                  Source: C:\Users\user\Desktop\smss (2).exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\smss (2).exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: F0F008Jump to behavior
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001887B1 LogonUserW,0_2_001887B1
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00133B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00133B3A
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001348D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_001348D7
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00194C27 mouse_event,0_2_00194C27
                  Source: C:\Users\user\Desktop\smss (2).exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\smss (2).exe"Jump to behavior
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00187CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00187CAF
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0018874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0018874B
                  Source: smss (2).exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: smss (2).exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_0015862B cpuid 0_2_0015862B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00164E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00164E87
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00171E06 GetUserNameW,0_2_00171E06
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_00163F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00163F3A
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001349A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001349A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.smss (2).exe.3f10000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.smss (2).exe.3f10000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: smss (2).exe PID: 8184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7392, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.smss (2).exe.3f10000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.smss (2).exe.3f10000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: smss (2).exe PID: 8184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7392, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.smss (2).exe.3f10000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.smss (2).exe.3f10000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: smss (2).exe PID: 8184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7392, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: smss (2).exeBinary or memory string: WIN_81
                  Source: smss (2).exeBinary or memory string: WIN_XP
                  Source: smss (2).exeBinary or memory string: WIN_XPe
                  Source: smss (2).exeBinary or memory string: WIN_VISTA
                  Source: smss (2).exeBinary or memory string: WIN_7
                  Source: smss (2).exeBinary or memory string: WIN_8
                  Source: smss (2).exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                  Source: Yara matchFile source: 0.2.smss (2).exe.3f10000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.smss (2).exe.3f10000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2569009214.0000000003186000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: smss (2).exe PID: 8184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7392, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.smss (2).exe.3f10000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.smss (2).exe.3f10000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: smss (2).exe PID: 8184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7392, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.smss (2).exe.3f10000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.smss (2).exe.3f10000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: smss (2).exe PID: 8184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7392, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.smss (2).exe.3f10000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.smss (2).exe.3f10000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: smss (2).exe PID: 8184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7392, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001A6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_001A6283
                  Source: C:\Users\user\Desktop\smss (2).exeCode function: 0_2_001A6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_001A6747
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  12
                  Native API
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault AccountsScheduled Task/Job2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  3
                  Obfuscated Files or Information
                  Security Account Manager1
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS127
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  13
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets131
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  Fallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                  Access Token Manipulation
                  Cached Domain Credentials2
                  Process Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items212
                  Process Injection
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                  System Owner/User Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Network Configuration Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  smss (2).exe65%VirustotalBrowse
                  smss (2).exe64%ReversingLabsWin32.Trojan.Strab
                  SAMPLE100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  bg.microsoft.map.fastly.net
                  199.232.210.172
                  truefalse
                    high
                    reallyfreegeoip.org
                    104.21.96.1
                    truefalse
                      high
                      checkip.dyndns.com
                      193.122.130.0
                      truefalse
                        high
                        checkip.dyndns.org
                        unknown
                        unknownfalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          http://checkip.dyndns.org/false
                            high
                            https://reallyfreegeoip.org/xml/89.187.171.161false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://checkip.dyndns.comdRegSvcs.exe, 00000001.00000002.2569009214.00000000030B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://checkip.dyndns.org/qsmss (2).exe, 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                  high
                                  http://reallyfreegeoip.orgdRegSvcs.exe, 00000001.00000002.2569009214.00000000030CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.2569009214.00000000030CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.orgdRegSvcs.exe, 00000001.00000002.2569009214.00000000030B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.2569009214.00000000030B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.orgRegSvcs.exe, 00000001.00000002.2569009214.00000000030B0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2569009214.000000000309E000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://checkip.dyndns.comRegSvcs.exe, 00000001.00000002.2569009214.00000000030B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://reallyfreegeoip.org/xml/89.187.171.161dRegSvcs.exe, 00000001.00000002.2569009214.00000000030B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://checkip.dyndns.org/dRegSvcs.exe, 00000001.00000002.2569009214.00000000030B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.2569009214.0000000003031000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://api.telegram.org/bot-/sendDocument?chat_id=smss (2).exe, 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                      high
                                                      https://reallyfreegeoip.org/xml/89.187.171.161lRegSvcs.exe, 00000001.00000002.2569009214.00000000030B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://reallyfreegeoip.org/xml/smss (2).exe, 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2569009214.00000000030B0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                          high
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          104.21.96.1
                                                          reallyfreegeoip.orgUnited States
                                                          13335CLOUDFLARENETUSfalse
                                                          193.122.130.0
                                                          checkip.dyndns.comUnited States
                                                          31898ORACLE-BMC-31898USfalse
                                                          Joe Sandbox version:42.0.0 Malachite
                                                          Analysis ID:1664057
                                                          Start date and time:2025-04-13 10:57:29 +02:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 5m 45s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:6
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:smss (2).exe
                                                          Detection:MAL
                                                          Classification:mal100.troj.spyw.evad.winEXE@3/4@2/2
                                                          EGA Information:
                                                          • Successful, ratio: 50%
                                                          HCA Information:
                                                          • Successful, ratio: 100%
                                                          • Number of executed functions: 63
                                                          • Number of non-executed functions: 279
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                          • Excluded IPs from analysis (whitelisted): 23.53.13.85, 23.53.13.81, 23.76.34.6, 52.149.20.212, 150.171.27.254
                                                          • Excluded domains from analysis (whitelisted): c2a9c95e369881c67228a6591cac2686.clo.footprintdns.com, ax-ring.msedge.net, fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, c.pki.goog, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net
                                                          • Execution Graph export aborted for target RegSvcs.exe, PID 7392 because it is empty
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                          No simulations
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          104.21.96.1Samhwa Document #AWB00960667892.pdf.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • www.drgnmoney-98.buzz/k21f/
                                                          NEW PO.exeGet hashmaliciousFormBookBrowse
                                                          • www.uqcdnvgr.biz/z7hp/
                                                          0123-PAYMENT.exeGet hashmaliciousFormBookBrowse
                                                          • www.6644win.mom/hs6j/
                                                          vbnmghjkl.exeGet hashmaliciousFormBookBrowse
                                                          • www.uqcdnvgr.biz/veua/
                                                          ZPGRAHNY.msiGet hashmaliciousUnknownBrowse
                                                          • sonorous-horizon-cfd.cfd/c
                                                          Purchase_Order_1 x 40ft Container.exeGet hashmaliciousFormBookBrowse
                                                          • www.6644win.mom/hs6j/
                                                          SecuriteInfo.com.Win32.DropperX-gen.1559.13899.exeGet hashmaliciousFormBookBrowse
                                                          • www.roastroots.lol/hpwy/
                                                          vv161A72Jp.exeGet hashmaliciousFormBookBrowse
                                                          • www.auto-total.info/2yh2/
                                                          Rse8nMu1q0.exeGet hashmaliciousFormBookBrowse
                                                          • www.ampmplay5000.vip/hig1/?olPP=K5pALbXS91o7HW36wgjsXvdqbEplZlB5gxlRGCNQjV51jLgDXQj1QZDRH4ffdzT66fWBOucL7u/VhDFeaoZteHcjGezDOtaP11BFgcrJxVAtcmQVeg==&3pC=I0RLjRIX
                                                          zVLAGICBDE.exeGet hashmaliciousFormBookBrowse
                                                          • www.mulher777.info/7x8q/
                                                          193.122.130.01b3pICGT3V.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • checkip.dyndns.org/
                                                          TpDkwibRvg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • checkip.dyndns.org/
                                                          SecuriteInfo.com.Win32.MalwareX-gen.17302.21297.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • checkip.dyndns.org/
                                                          Facturas pagadas.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                          • checkip.dyndns.org/
                                                          Teklif Talebi Bilgileri.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • checkip.dyndns.org/
                                                          Teklif Eklidir.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • checkip.dyndns.org/
                                                          hesaphareketi-01.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • checkip.dyndns.org/
                                                          Comunicaci#U00f3n BBVA.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                          • checkip.dyndns.org/
                                                          5f8911mgZd9FLa2.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • checkip.dyndns.org/
                                                          PO# 3989201.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • checkip.dyndns.org/
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          reallyfreegeoip.orgKUzGUp4xs6.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • 104.21.32.1
                                                          Mi5cEY8M3R.htaGet hashmaliciousCobalt Strike, MSIL Logger, MassLogger RATBrowse
                                                          • 104.21.48.1
                                                          6pCmlKafCF.htaGet hashmaliciousCobalt Strike, MSIL Logger, MassLogger RATBrowse
                                                          • 104.21.48.1
                                                          1b3pICGT3V.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 104.21.64.1
                                                          TpDkwibRvg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 104.21.112.1
                                                          WTGK44DBns.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 104.21.48.1
                                                          New order.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • 104.21.80.1
                                                          Q202507200854.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • 104.21.112.1
                                                          SecuriteInfo.com.Win32.MalwareX-gen.17302.21297.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • 104.21.96.1
                                                          PROCESO.3.1.305884.20250207.2025020715301400000008.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                          • 104.21.48.1
                                                          checkip.dyndns.comKUzGUp4xs6.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • 158.101.44.242
                                                          Mi5cEY8M3R.htaGet hashmaliciousCobalt Strike, MSIL Logger, MassLogger RATBrowse
                                                          • 193.122.6.168
                                                          6pCmlKafCF.htaGet hashmaliciousCobalt Strike, MSIL Logger, MassLogger RATBrowse
                                                          • 193.122.6.168
                                                          1b3pICGT3V.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 193.122.130.0
                                                          TpDkwibRvg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 193.122.130.0
                                                          WTGK44DBns.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 132.226.247.73
                                                          New order.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • 193.122.6.168
                                                          Q202507200854.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • 132.226.8.169
                                                          SecuriteInfo.com.Win32.MalwareX-gen.17302.21297.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • 193.122.130.0
                                                          PROCESO.3.1.305884.20250207.2025020715301400000008.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                          • 132.226.247.73
                                                          bg.microsoft.map.fastly.netactivate.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 199.232.210.172
                                                          Imprimir_Entrada.exeGet hashmaliciousQuasar, StormKittyBrowse
                                                          • 199.232.210.172
                                                          3pzDxChUaP.exeGet hashmaliciousUnknownBrowse
                                                          • 199.232.210.172
                                                          SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeGet hashmaliciousScreenConnect Tool, XWormBrowse
                                                          • 199.232.214.172
                                                          Saturn.exeGet hashmaliciousUnknownBrowse
                                                          • 199.232.214.172
                                                          Setupx-64.exeGet hashmaliciousDCRatBrowse
                                                          • 199.232.214.172
                                                          SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exeGet hashmaliciousGhostRatBrowse
                                                          • 199.232.214.172
                                                          SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exeGet hashmaliciousDcRatBrowse
                                                          • 199.232.210.172
                                                          support.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                                                          • 199.232.210.172
                                                          support.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                                                          • 199.232.210.172
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          CLOUDFLARENETUSKUzGUp4xs6.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • 104.21.32.1
                                                          Mi5cEY8M3R.htaGet hashmaliciousCobalt Strike, MSIL Logger, MassLogger RATBrowse
                                                          • 104.21.48.1
                                                          6pCmlKafCF.htaGet hashmaliciousCobalt Strike, MSIL Logger, MassLogger RATBrowse
                                                          • 104.21.48.1
                                                          1b3pICGT3V.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 104.21.64.1
                                                          TpDkwibRvg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 104.21.112.1
                                                          WTGK44DBns.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 104.21.48.1
                                                          activate.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 104.21.28.157
                                                          activate.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 104.22.68.199
                                                          FGiemTL26H.exeGet hashmaliciousUnknownBrowse
                                                          • 104.21.3.156
                                                          3pzDxChUaP.exeGet hashmaliciousUnknownBrowse
                                                          • 172.67.185.246
                                                          ORACLE-BMC-31898USKUzGUp4xs6.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • 158.101.44.242
                                                          Mi5cEY8M3R.htaGet hashmaliciousCobalt Strike, MSIL Logger, MassLogger RATBrowse
                                                          • 193.122.6.168
                                                          6pCmlKafCF.htaGet hashmaliciousCobalt Strike, MSIL Logger, MassLogger RATBrowse
                                                          • 193.122.6.168
                                                          1b3pICGT3V.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 193.122.130.0
                                                          TpDkwibRvg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 193.122.130.0
                                                          mirai.mips.elfGet hashmaliciousMiraiBrowse
                                                          • 144.25.120.64
                                                          New order.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • 193.122.6.168
                                                          SecuriteInfo.com.Win32.MalwareX-gen.17302.21297.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • 193.122.130.0
                                                          Payment Swift-Copy MT103.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 158.101.44.242
                                                          Zam#U00f3wienie 2503447 - 24.04_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 193.122.6.168
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          54328bd36c14bd82ddaa0c04b25ed9adKUzGUp4xs6.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • 104.21.96.1
                                                          Mi5cEY8M3R.htaGet hashmaliciousCobalt Strike, MSIL Logger, MassLogger RATBrowse
                                                          • 104.21.96.1
                                                          6pCmlKafCF.htaGet hashmaliciousCobalt Strike, MSIL Logger, MassLogger RATBrowse
                                                          • 104.21.96.1
                                                          1b3pICGT3V.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 104.21.96.1
                                                          TpDkwibRvg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 104.21.96.1
                                                          WTGK44DBns.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 104.21.96.1
                                                          New order.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • 104.21.96.1
                                                          Q202507200854.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • 104.21.96.1
                                                          SecuriteInfo.com.Win32.MalwareX-gen.17302.21297.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                          • 104.21.96.1
                                                          PROCESO.3.1.305884.20250207.2025020715301400000008.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                          • 104.21.96.1
                                                          No context
                                                          Process:C:\Users\user\Desktop\smss (2).exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):11414
                                                          Entropy (8bit):7.632684147231715
                                                          Encrypted:false
                                                          SSDEEP:192:8JWqkAkpDQTiOXd10nnGnTlE7FrOy3gC8FrrGtVIrzc4:8/344zN10nngTlAVOjVpGWzf
                                                          MD5:FD88DBE40D3662D01DD320E04B91424C
                                                          SHA1:57E6F1E422F5A1146B5920134A5138925A4349A5
                                                          SHA-256:C67747DDB5069AE955B3E66D3FAB0C3E9E2D494E715E154926B8CFC6772D3E23
                                                          SHA-512:DF0779694A20F24A846AC11D20CEBCAEED39F079B43C3A6B34E239FDB523751E1A7024A0905DA58A73870A101FF6891D9DF4898356F17D696ED8D3B99F7974C8
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:EA06.....^&3...c4..'3I..i4.Lg3...B...f3... .....n..M..0."o4.....7..'3...j...f.......$.&.P.,M&.....#....$...h....&.....P....4 .....lfS..O..............lg....e3.........b.V..>....->...N@6?I.......@........T}3......M....a..O.....@..7..............@$ ...C..0..$ .@.C.....$ @.C.....$....C....?.$. ....a..|.9...B|Sp.O.....2..... ......05O..:...........=..~@.D..S..$&@j...!4.T....5O......|...'..F.d.....l@.>.....yM..>.....!..z|`:...C..z|`....C..z|..!...A..:|.C.X..&.|.........................0...'..Y.)L..}`R...c .H...0......0..................g....=.. }`....fa..h.!4..........3. .l>...f....|.........hh...h~...F.....f~s ....}. ...z>.F.@i>.......l.F....L.6?P......o@.@.!7.h..6.p.%3 w..EA,... .(.@.34...%g..6....x.C.......XB?0....@}14.....@......"..B..&...........X@..0...1...!~..F.....'.....T.......a ..p.......#s....`.a..@S..Jf....fb.....nf.a.L.,> ......Yd.#S`!.......f`,....*..1S0...A.6....,>......).G....nr...L.,>.........`.....l41......T.....2....$.k.c....}.P...j..... .....!..G.4
                                                          Process:C:\Users\user\Desktop\smss (2).exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):70020
                                                          Entropy (8bit):7.922435218163944
                                                          Encrypted:false
                                                          SSDEEP:1536:gKaeY8VVOpX6p+dhZ4iGS9733nNPGkeB008iIcBUL7/kB7iB7vZ7amdrb:gI3iBTuiGU7H08FcBW/kBeB7vZ7Rh
                                                          MD5:4D2979916CF8D47A889EAC677CF0D437
                                                          SHA1:786831F4DB237EDCD53D60DDB24E989A9317C0A3
                                                          SHA-256:DF18CFB3E67878C5E7364D0740BBC4675649E5CEB85B00EB1AF36E4C5D699092
                                                          SHA-512:08205166DF9EEE0DAA85D0506534A2C4EF817B19B269366C803A2CBF819A40A54C8F90861E58EF3F26AD5BAD42EE6102166C6866718B48A37FB3847A697F55DC
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:EA06..n..Dt.j..B..&3...T.Ni.:..oG..*..r...R......_4...p@...s.6..._...g...".....1.U.....1T.IkS.dJa'...{T._t.]..9}^."..ku(...b.J...L.P.5....s]..".J..'4.=.q7..9...g6...18../.z=..\..\`....P.W.L.....Pf...6.B.I...D.R...D.?.n.....}TZ.Jz...a(.I.....).....K.W...\.Ni.......J.....V.:.`.\..\p..@..5$..& ...x..}'3.m..........s...+..D.iV....I...T.Ui..?..c9..\|}..`.........qK.../\.A.\,t.%.!....`....a...........G......J... ..y..,`....\.."....N..M..J...0..%@..............I.....R.](U.dFsJ.Po.jU..B.m...JW..P.|I..@.]...?..8......bq.Vh.ZU..A.n'....%m..9T...Y._&3........:.J#G..-...b.s.Lg[J...8.Y.4)....\....f.7.....d.C.n'.z\..F.^.5.$.'h.T....h.Rj`...ex.I.3..:.A.F.....y...b.|.F.Q#s....&.Mi.:.^.G.....J.q..).K].qG....YG....^/..e.sJ.Po....%...`.j...E........9.....x.)%.."..$......?J...7...j......'6(H.+e....=..V.M*V...c?.["uI...k..&..\z.X.^.....G._g..M..E..s0.Bsu.Lg.)..)....@.."....4..^s1..77...;......J.[.L..%eBu=.@(S....4.i..z.f.3.M.....w3.P....ziV.L(..x..`.W..[.6.C...@(E....
                                                          Process:C:\Users\user\Desktop\smss (2).exe
                                                          File Type:ASCII text, with very long lines (57350), with no line terminators
                                                          Category:dropped
                                                          Size (bytes):57350
                                                          Entropy (8bit):2.4411646206400683
                                                          Encrypted:false
                                                          SSDEEP:768:h6qLIWYmv7SvsY7OqSL79WWt6ZMJ+o5yJUcL0VuuSMzJeJ5Jei6EJJfJcQTcql:h6qGmv7QsY7OqSFWr
                                                          MD5:A95FB0F7E3BCB87983D72AF05587B108
                                                          SHA1:4BFB418103972BE2AFFBB1DA6254D176C485B6DD
                                                          SHA-256:A42BD684EFE9677C08219349FC504FC5F283E7F7F74CB758200843B0BE09E23D
                                                          SHA-512:6058DDABE14E18DD3E778662AC606361CB443F35C6290C39C3D67F612E156AA652F3743B0AF63982B4A68D9A20E0DDE0B80670FC3B5A02DF9B7BD9D5C4B9CEF9
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:0x11591414194344421910444242421113111111111417141643191743111111111111171719181514191543181714111111111111171719181545191743401613111111111111171719181414191943191744111111111111171719181514194043181714111111111111171719181545194243401742111111111111171719181414194443191212111111111111171719181514181143181213111111111111171719181545181343401344111111111111171719181414181543191715111111111111171719181514181743181742111111111111171719181545181943401742111111111111171719181414184012124211171719181514184243181744111111111111171719181945151547474747474743401615111111111111171719181814151747474747474743191715111111111111171719181914151947474747474743181742111111111111171719181945154047474747474743401742111111111111171719181814154247474747474743191344111111111111171719181914154447474747474743181715111111111111171719181945141147474747474743401742111111111111171719181814141347474747474743191742111111111111171719181914141547474747474712124218171719181945141747474747474743401614111111111111171719
                                                          Process:C:\Users\user\Desktop\smss (2).exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):93696
                                                          Entropy (8bit):6.906701359718243
                                                          Encrypted:false
                                                          SSDEEP:1536:HeALtQu9Z1h3s655VpJfppI4NDK1uXnkDGit33lHUHHQoSHH8HIH8NXA/DN:+AX9Z1Js65dDt3kntHlHUHHQoSHH8HI5
                                                          MD5:ADDFC35B07D6EEEC6F81D2B93BCDF061
                                                          SHA1:DB9718734AE4C8B19DD91724A4A134285BF88FD1
                                                          SHA-256:29D526DD07C0ECC52011D22CA37BA7297D1E4B36FF36A70B3C4F0EEE9AA7FCEE
                                                          SHA-512:77C7D1E63380914B164335B2DA479B4FC4C7C19024A24F53347390A6355434032F5FDF81DDC051760D6B6B73FAE584A6B7DA3CA49A47CB80ACF6936909483C1B
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:...V[2RB]D19..AT.9MCB87G.4VX2RBYD19JDAT89MCB87GK4VX2RBYD19JD.T89C\.67.B.w.3..x.YP9d1&W^?"/.T&%Z9,.0'y6DWj-/t|v.c/WS"e9[R.RBYD19J..T8uL@B.Y..4VX2RBYD.9HEJUh9M'C87OK4VX2R..E19jDAT.8MCBx7Gk4VX0RB]D19JDAT>9MCB87GK.WX2PBYD19JFA4.9MSB8'GK4VH2RRYD19JDQT89MCB87GK4..3R.YD19.EA.=9MCB87GK4VX2RBYD19J.@T49MCB87GK4VX2RBYD19JDAT89MCB87GK4VX2RBYD19JDAT89MCB87gK4^X2RBYD19JDA\.9M.B87GK4VX2RBw0TA>DAT.[LCB.7GKPWX2PBYD19JDAT89MCB.7G+.$+@1BYD.<JDA.99MEB87!J4VX2RBYD19JDA.89.m0][((4VT2RBY.09JFAT8ULCB87GK4VX2RBY.19.DAT89MCB87GK4VX2..XD19JD.T89OCG8K.K4..2RAYD1cJDG..9M.B87GK4VX2RBYD19JDAT89MCB87GK4VX2RBYD19JDAT8.0.M..."G..2RBYD18HGER01MCB87GK4(X2R.YD1yJDAc89MfB87*K4V|2RB'D194DAT\9MC087G*4VXuRBY+19J*AT8GMCB&5oT4VR.tB[l.9JNA~.JlCB2.FK4R+.RBS.39J@2w89G.A87C8.VX8.FYD5JoDA^.<MCF.mGH.@^2RY6|19@DB.-?MCY..GI.oX2XBsb1:.QGT8"gaB:.NK4Rrd!_YD7..DA^L0MC@.=GK0|F0z.YD;.h:RT8=fCh.ISK4Rs2x`'Q19NoA~.G[CB<.Ga.(O2RFrD.?`&A&.5M3AWVGK2~.2RHq.19LDkn8GCCB<5(.4VR.xxYla9JBA|i9MEB..G5.VX6~E'w19NoW*.9MG.>OGK2%.2RH|..9J@i.89GCh.7o.4V^2z.YD7
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):6.817836503201098
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:smss (2).exe
                                                          File size:950'784 bytes
                                                          MD5:a9a05d451c24858918183c1e7271a306
                                                          SHA1:e9ea72f8b86886be421da90c131659d6ebb9483f
                                                          SHA256:d878f6aa5cc41db62f6b2c3466cbec5d792eaf8f77b2ea1e779e7925f267be52
                                                          SHA512:ccd15a0fa3532c888845f05b392122fa64474434d9d34b5311e08c839b24a6740ff660c5224a23ad16681d20dac9d1112ecc1710835a516ef4adfc4f8874f715
                                                          SSDEEP:24576:Tu6J33O0c+JY5UZ+XC0kGso6FaiQ5PAWY:9u0c++OCvkGs9FaiQ57Y
                                                          TLSH:A615AE2273DDC360CB669173BF6AB7016EBF3C614630B85B2F980D7DA950162162D7A3
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                          Icon Hash:aaf3e3e3938382a0
                                                          Entrypoint:0x427dcd
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x67F604D0 [Wed Apr 9 05:25:36 2025 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:5
                                                          OS Version Minor:1
                                                          File Version Major:5
                                                          File Version Minor:1
                                                          Subsystem Version Major:5
                                                          Subsystem Version Minor:1
                                                          Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                          Instruction
                                                          call 00007F304882D4BAh
                                                          jmp 00007F3048820284h
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          push edi
                                                          push esi
                                                          mov esi, dword ptr [esp+10h]
                                                          mov ecx, dword ptr [esp+14h]
                                                          mov edi, dword ptr [esp+0Ch]
                                                          mov eax, ecx
                                                          mov edx, ecx
                                                          add eax, esi
                                                          cmp edi, esi
                                                          jbe 00007F304882040Ah
                                                          cmp edi, eax
                                                          jc 00007F304882076Eh
                                                          bt dword ptr [004C31FCh], 01h
                                                          jnc 00007F3048820409h
                                                          rep movsb
                                                          jmp 00007F304882071Ch
                                                          cmp ecx, 00000080h
                                                          jc 00007F30488205D4h
                                                          mov eax, edi
                                                          xor eax, esi
                                                          test eax, 0000000Fh
                                                          jne 00007F3048820410h
                                                          bt dword ptr [004BE324h], 01h
                                                          jc 00007F30488208E0h
                                                          bt dword ptr [004C31FCh], 00000000h
                                                          jnc 00007F30488205ADh
                                                          test edi, 00000003h
                                                          jne 00007F30488205BEh
                                                          test esi, 00000003h
                                                          jne 00007F304882059Dh
                                                          bt edi, 02h
                                                          jnc 00007F304882040Fh
                                                          mov eax, dword ptr [esi]
                                                          sub ecx, 04h
                                                          lea esi, dword ptr [esi+04h]
                                                          mov dword ptr [edi], eax
                                                          lea edi, dword ptr [edi+04h]
                                                          bt edi, 03h
                                                          jnc 00007F3048820413h
                                                          movq xmm1, qword ptr [esi]
                                                          sub ecx, 08h
                                                          lea esi, dword ptr [esi+08h]
                                                          movq qword ptr [edi], xmm1
                                                          lea edi, dword ptr [edi+08h]
                                                          test esi, 00000007h
                                                          je 00007F3048820465h
                                                          bt esi, 03h
                                                          jnc 00007F30488204B8h
                                                          Programming Language:
                                                          • [ASM] VS2013 build 21005
                                                          • [ C ] VS2013 build 21005
                                                          • [C++] VS2013 build 21005
                                                          • [ C ] VS2008 SP1 build 30729
                                                          • [IMP] VS2008 SP1 build 30729
                                                          • [ASM] VS2013 UPD4 build 31101
                                                          • [RES] VS2013 build 21005
                                                          • [LNK] VS2013 UPD4 build 31101
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x1f838.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xe70000x711c.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0xc70000x1f8380x1fa0025173cf3162544ac6de0e05a734e54eeFalse0.7889312623517787data7.505022401870191IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0xe70000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                          RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                          RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                          RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                          RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                          RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                          RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                          RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                          RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                          RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                          RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                          RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                          RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                          RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                          RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                          RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                          RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                          RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                          RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                          RT_RCDATA0xcf7b80x16b00data1.000387396694215
                                                          RT_GROUP_ICON0xe62b80x76dataEnglishGreat Britain0.6610169491525424
                                                          RT_GROUP_ICON0xe63300x14dataEnglishGreat Britain1.25
                                                          RT_GROUP_ICON0xe63440x14dataEnglishGreat Britain1.15
                                                          RT_GROUP_ICON0xe63580x14dataEnglishGreat Britain1.25
                                                          RT_VERSION0xe636c0xdcdataEnglishGreat Britain0.6181818181818182
                                                          RT_MANIFEST0xe64480x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                          DLLImport
                                                          WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                          VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                          COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                          MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                          WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                          PSAPI.DLLGetProcessMemoryInfo
                                                          IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                          USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                          UxTheme.dllIsThemeActive
                                                          KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                          USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                          GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                          COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                          ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                          SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                          OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                          DescriptionData
                                                          Translation0x0809 0x04b0
                                                          Language of compilation systemCountry where language is spokenMap
                                                          EnglishGreat Britain
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2025-04-13T10:58:29.242684+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549692193.122.130.080TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 13, 2025 10:58:28.820667028 CEST4969280192.168.2.5193.122.130.0
                                                          Apr 13, 2025 10:58:28.940154076 CEST8049692193.122.130.0192.168.2.5
                                                          Apr 13, 2025 10:58:28.940272093 CEST4969280192.168.2.5193.122.130.0
                                                          Apr 13, 2025 10:58:28.940526962 CEST4969280192.168.2.5193.122.130.0
                                                          Apr 13, 2025 10:58:29.060107946 CEST8049692193.122.130.0192.168.2.5
                                                          Apr 13, 2025 10:58:29.062354088 CEST8049692193.122.130.0192.168.2.5
                                                          Apr 13, 2025 10:58:29.065884113 CEST4969280192.168.2.5193.122.130.0
                                                          Apr 13, 2025 10:58:29.188179016 CEST8049692193.122.130.0192.168.2.5
                                                          Apr 13, 2025 10:58:29.242683887 CEST4969280192.168.2.5193.122.130.0
                                                          Apr 13, 2025 10:58:29.299506903 CEST49693443192.168.2.5104.21.96.1
                                                          Apr 13, 2025 10:58:29.299561024 CEST44349693104.21.96.1192.168.2.5
                                                          Apr 13, 2025 10:58:29.299627066 CEST49693443192.168.2.5104.21.96.1
                                                          Apr 13, 2025 10:58:29.306260109 CEST49693443192.168.2.5104.21.96.1
                                                          Apr 13, 2025 10:58:29.306274891 CEST44349693104.21.96.1192.168.2.5
                                                          Apr 13, 2025 10:58:29.539294004 CEST44349693104.21.96.1192.168.2.5
                                                          Apr 13, 2025 10:58:29.539386034 CEST49693443192.168.2.5104.21.96.1
                                                          Apr 13, 2025 10:58:29.544615030 CEST49693443192.168.2.5104.21.96.1
                                                          Apr 13, 2025 10:58:29.544634104 CEST44349693104.21.96.1192.168.2.5
                                                          Apr 13, 2025 10:58:29.545130968 CEST44349693104.21.96.1192.168.2.5
                                                          Apr 13, 2025 10:58:29.586467981 CEST49693443192.168.2.5104.21.96.1
                                                          Apr 13, 2025 10:58:29.589809895 CEST49693443192.168.2.5104.21.96.1
                                                          Apr 13, 2025 10:58:29.632317066 CEST44349693104.21.96.1192.168.2.5
                                                          Apr 13, 2025 10:58:29.795994997 CEST44349693104.21.96.1192.168.2.5
                                                          Apr 13, 2025 10:58:29.796168089 CEST44349693104.21.96.1192.168.2.5
                                                          Apr 13, 2025 10:58:29.796222925 CEST49693443192.168.2.5104.21.96.1
                                                          Apr 13, 2025 10:58:29.803592920 CEST49693443192.168.2.5104.21.96.1
                                                          Apr 13, 2025 10:59:34.187776089 CEST8049692193.122.130.0192.168.2.5
                                                          Apr 13, 2025 10:59:34.187978029 CEST4969280192.168.2.5193.122.130.0
                                                          Apr 13, 2025 11:00:09.196650982 CEST4969280192.168.2.5193.122.130.0
                                                          Apr 13, 2025 11:00:09.318857908 CEST8049692193.122.130.0192.168.2.5
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 13, 2025 10:58:28.707523108 CEST5063853192.168.2.51.1.1.1
                                                          Apr 13, 2025 10:58:28.814640999 CEST53506381.1.1.1192.168.2.5
                                                          Apr 13, 2025 10:58:29.189456940 CEST5921153192.168.2.51.1.1.1
                                                          Apr 13, 2025 10:58:29.298947096 CEST53592111.1.1.1192.168.2.5
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Apr 13, 2025 10:58:28.707523108 CEST192.168.2.51.1.1.10x5cefStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                          Apr 13, 2025 10:58:29.189456940 CEST192.168.2.51.1.1.10x830cStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Apr 13, 2025 10:58:24.091594934 CEST1.1.1.1192.168.2.50x2c4dNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                          Apr 13, 2025 10:58:24.091594934 CEST1.1.1.1192.168.2.50x2c4dNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                          Apr 13, 2025 10:58:28.814640999 CEST1.1.1.1192.168.2.50x5cefNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                          Apr 13, 2025 10:58:28.814640999 CEST1.1.1.1192.168.2.50x5cefNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                          Apr 13, 2025 10:58:28.814640999 CEST1.1.1.1192.168.2.50x5cefNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                          Apr 13, 2025 10:58:28.814640999 CEST1.1.1.1192.168.2.50x5cefNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                          Apr 13, 2025 10:58:28.814640999 CEST1.1.1.1192.168.2.50x5cefNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                          Apr 13, 2025 10:58:28.814640999 CEST1.1.1.1192.168.2.50x5cefNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                          Apr 13, 2025 10:58:29.298947096 CEST1.1.1.1192.168.2.50x830cNo error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                          Apr 13, 2025 10:58:29.298947096 CEST1.1.1.1192.168.2.50x830cNo error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                          Apr 13, 2025 10:58:29.298947096 CEST1.1.1.1192.168.2.50x830cNo error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                          Apr 13, 2025 10:58:29.298947096 CEST1.1.1.1192.168.2.50x830cNo error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                          Apr 13, 2025 10:58:29.298947096 CEST1.1.1.1192.168.2.50x830cNo error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                          Apr 13, 2025 10:58:29.298947096 CEST1.1.1.1192.168.2.50x830cNo error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                          Apr 13, 2025 10:58:29.298947096 CEST1.1.1.1192.168.2.50x830cNo error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                          • reallyfreegeoip.org
                                                          • checkip.dyndns.org
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.549692193.122.130.0807392C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                          TimestampBytes transferredDirectionData
                                                          Apr 13, 2025 10:58:28.940526962 CEST151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Apr 13, 2025 10:58:29.062354088 CEST323INHTTP/1.1 200 OK
                                                          Date: Sun, 13 Apr 2025 08:58:29 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 106
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          X-Request-ID: 5dfd032413d87e31ad40f89ce96610cf
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 39 2e 31 38 37 2e 31 37 31 2e 31 36 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 89.187.171.161</body></html>
                                                          Apr 13, 2025 10:58:29.065884113 CEST127OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Apr 13, 2025 10:58:29.188179016 CEST323INHTTP/1.1 200 OK
                                                          Date: Sun, 13 Apr 2025 08:58:29 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 106
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          X-Request-ID: 7b85d292a72790fe1541904467f54be0
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 39 2e 31 38 37 2e 31 37 31 2e 31 36 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 89.187.171.161</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.549693104.21.96.14437392C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                          TimestampBytes transferredDirectionData
                                                          2025-04-13 08:58:29 UTC87OUTGET /xml/89.187.171.161 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2025-04-13 08:58:29 UTC882INHTTP/1.1 200 OK
                                                          Date: Sun, 13 Apr 2025 08:58:29 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 158443
                                                          Last-Modified: Fri, 11 Apr 2025 12:57:46 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=v4UvGIUVskU4dh705A9txD8sI5d%2FM6LEFUMzze1Dsi9C15xHr3hxwVMAG9L4lXltce4pXZOehbJWiZHWHTxzHd8A0Dh%2BHNGBPik7%2FY%2BHPs948ax2KQJxAzw78SDsvrFvEQfIOzKs"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 92f9c30fc934b03d-ATL
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=106106&min_rtt=106082&rtt_var=22398&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2848&recv_bytes=701&delivery_rate=38042&cwnd=252&unsent_bytes=0&cid=5c41e60abb829941&ts=276&x=0"
                                                          2025-04-13 08:58:29 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 39 2e 31 38 37 2e 31 37 31 2e 31 36 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 47 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 47 65 6f 72 67 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 41 74 6c 61 6e 74 61 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 33 30 33 30 31 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>89.187.171.161</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>GA</RegionCode><RegionName>Georgia</RegionName><City>Atlanta</City><ZipCode>30301</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:04:58:25
                                                          Start date:13/04/2025
                                                          Path:C:\Users\user\Desktop\smss (2).exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\smss (2).exe"
                                                          Imagebase:0x130000
                                                          File size:950'784 bytes
                                                          MD5 hash:A9A05D451C24858918183C1E7271A306
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_MSILLogger, Description: Yara detected MSIL Logger, Source: 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.1339327896.0000000003F10000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:1
                                                          Start time:04:58:26
                                                          Start date:13/04/2025
                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\smss (2).exe"
                                                          Imagebase:0xc50000
                                                          File size:45'984 bytes
                                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_MSILLogger, Description: Yara detected MSIL Logger, Source: 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.2568148003.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2569009214.0000000003186000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:high
                                                          Has exited:false

                                                          Reset < >