Edit tour

Windows Analysis Report
Ro4bYKEVnD.exe

Overview

General Information

Sample name:Ro4bYKEVnD.exe
renamed because original name is a hash value
Original sample name:3b364ba7695b8ca0faccb7f3559a7e42.exe
Analysis ID:1675398
MD5:3b364ba7695b8ca0faccb7f3559a7e42
SHA1:08a9024a29f6ccb63a21570e3a94f1cd7c5acf76
SHA256:00d14c2ab7420b99c6525b077abd2864d6db21053635c59531ef7aa0cd0e600e
Tags:exeOffLoaderuser-abuse_ch
Infos:

Detection

Score:48
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Drops PE files
Found dropped PE file which has not been started or loaded
JA3 SSL client fingerprint seen in connection with other malware
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • Ro4bYKEVnD.exe (PID: 2960 cmdline: "C:\Users\user\Desktop\Ro4bYKEVnD.exe" MD5: 3B364BA7695B8CA0FACCB7F3559A7E42)
    • Ro4bYKEVnD.tmp (PID: 4040 cmdline: "C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmp" /SL5="$2043E,934334,844800,C:\Users\user\Desktop\Ro4bYKEVnD.exe" MD5: 4A66BFB87A90F5CE57AE24992CF676C5)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Ro4bYKEVnD.exeVirustotal: Detection: 51%Perma Link
Source: Ro4bYKEVnD.exeReversingLabs: Detection: 36%
Source: Ro4bYKEVnD.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 104.21.30.99:443 -> 192.168.2.6:49687 version: TLS 1.2
Source: Ro4bYKEVnD.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: f:\mydev\inno-download-plugin\unicode\idp.pdb source: Ro4bYKEVnD.tmp, 00000001.00000003.1340197766.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, idp.dll.1.dr
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /bin.php?e=392&sis=6a62knm2gfs&pid=4034&tid=&a=4034&cc=DE&t=1741702687 HTTP/1.1Accept: */*User-Agent: InnoDownloadPlugin/1.5Host: battlesummer.icuConnection: Keep-AliveCache-Control: no-cache
Source: global trafficDNS traffic detected: DNS query: battlesummer.icu
Source: Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drString found in binary or memory: http://battlesummer.icu/ron.php?sis=6a62knm2gfs&d=inno&msg=&r=offer_exists&ko=no&o=1662&a=2778&dn=42
Source: Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drString found in binary or memory: http://battlesummer.icu/ron.php?sis=6a62knm2gfs&d=inno&msg=&r=offer_exists&ko=no&o=1700&a=2778&dn=47
Source: Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drString found in binary or memory: http://battlesummer.icu/ron.php?sis=6a62knm2gfs&d=inno&msg=&r=offer_exists&ko=no&o=1706&a=2778&dn=48
Source: Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drString found in binary or memory: http://battlesummer.icu/ron.php?sis=6a62knm2gfs&d=inno&msg=&r=offer_exists&ko=no&o=1707&a=2778&dn=&s
Source: Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drString found in binary or memory: http://battlesummer.icu/ron.php?sis=6a62knm2gfs&d=inno&msg=&r=offer_exists&ko=no&o=365&a=2778&dn=310
Source: Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drString found in binary or memory: http://battlesummer.icu/ron.php?sis=6a62knm2gfs&fz=
Source: Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drString found in binary or memory: http://battlesummer.icu/son.php?sis=6a62knm2gfs&paw=287351&spot=3&a=2778&on=487&o=1706&cr=
Source: Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drString found in binary or memory: http://battlesummer.icu/son.php?sis=6a62knm2gfs&paw=614679&spot=5&a=2778&on=&o=1707&cr=
Source: Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drString found in binary or memory: http://battlesummer.icu/son.php?sis=6a62knm2gfs&paw=802303&spot=1&a=2778&on=420&o=1662&cr=
Source: Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drString found in binary or memory: http://battlesummer.icu/son.php?sis=6a62knm2gfs&paw=962182&spot=2&a=2778&on=310&o=365&cr=
Source: Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drString found in binary or memory: http://battlesummer.icu/son.php?sis=6a62knm2gfs&paw=994730&spot=4&a=2778&on=479&o=1700&cr=
Source: Ro4bYKEVnD.tmp, 00000001.00000003.1340197766.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1343379360.00000000011EF000.00000004.00000010.00020000.00000000.sdmp, idp.dll.1.drString found in binary or memory: http://bitbucket.org/mitrich_k/inno-download-plugin
Source: Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1340492495.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1344922599.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1340753950.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1342281458.0000000001481000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000188D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1343414667.0000000001438000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://goo.gl/fxTiKZ
Source: Ro4bYKEVnD.tmp, 00000001.00000003.1340197766.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1343379360.00000000011EF000.00000004.00000010.00020000.00000000.sdmp, idp.dll.1.drString found in binary or memory: http://mitrichsoftware.wordpress.comB
Source: Ro4bYKEVnD.tmp, 00000001.00000003.1299091557.00000000014FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://battlesummer.icu/
Source: Ro4bYKEVnD.tmp, 00000001.00000003.1342281458.00000000014C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://battlesummer.icu/8_
Source: Ro4bYKEVnD.tmp, 00000001.00000003.1299091557.00000000014FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://battlesummer.icu/P
Source: Ro4bYKEVnD.tmp, 00000001.00000003.1342281458.00000000014C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://battlesummer.icu/_
Source: Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1340149195.00000000038C5000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000190B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1343989196.00000000014DC000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1342281458.00000000014ED000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1299190434.00000000014D0000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1299190434.00000000014DF000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1342281458.00000000014DB000.00000004.00000020.00020000.00000000.sdmp, unins000.dat.1.drString found in binary or memory: https://battlesummer.icu/bin.php?e=392&sis=6a62knm2gfs&pid=4034&tid=&a=4034&cc=DE&t=1741702687
Source: Ro4bYKEVnD.exeString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1340492495.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1340753950.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1342281458.0000000001481000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000188D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1343414667.0000000001438000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://legal.opera.com/eula/computers/
Source: Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1340492495.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1344922599.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1340753950.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1342281458.0000000001481000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000188D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1343414667.0000000001438000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://legal.opera.com/privacy/
Source: Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1340492495.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1344922599.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1340753950.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1342281458.0000000001481000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000188D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1343414667.0000000001438000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://statistics.prolnter.ba/Privacy.txt
Source: Ro4bYKEVnD.exe, 00000000.00000003.1199300980.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1199700107.000000007EECB000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000000.1201056000.0000000000D91000.00000020.00000001.01000000.00000004.sdmp, is-4RQLM.tmp.1.dr, Ro4bYKEVnD.tmp.0.drString found in binary or memory: https://www.innosetup.com/
Source: Ro4bYKEVnD.exe, 00000000.00000003.1199300980.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1199700107.000000007EECB000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000000.1201056000.0000000000D91000.00000020.00000001.01000000.00000004.sdmp, is-4RQLM.tmp.1.dr, Ro4bYKEVnD.tmp.0.drString found in binary or memory: https://www.remobjects.com/ps
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49688
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49687
Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
Source: unknownHTTPS traffic detected: 104.21.30.99:443 -> 192.168.2.6:49687 version: TLS 1.2
Source: Ro4bYKEVnD.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: is-4RQLM.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: Ro4bYKEVnD.tmp.0.drStatic PE information: Number of sections : 11 > 10
Source: is-4RQLM.tmp.1.drStatic PE information: Number of sections : 11 > 10
Source: Ro4bYKEVnD.exeStatic PE information: Number of sections : 11 > 10
Source: Ro4bYKEVnD.exe, 00000000.00000003.1199700107.000000007F1EF000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs Ro4bYKEVnD.exe
Source: Ro4bYKEVnD.exe, 00000000.00000000.1197651687.0000000000299000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs Ro4bYKEVnD.exe
Source: Ro4bYKEVnD.exe, 00000000.00000003.1199300980.0000000002CF3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs Ro4bYKEVnD.exe
Source: Ro4bYKEVnD.exeBinary or memory string: OriginalFileName vs Ro4bYKEVnD.exe
Source: Ro4bYKEVnD.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal48.winEXE@3/7@1/1
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpFile created: C:\Program Files (x86)\SetupJump to behavior
Source: C:\Users\user\Desktop\Ro4bYKEVnD.exeFile created: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmpJump to behavior
Source: C:\Users\user\Desktop\Ro4bYKEVnD.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\Ro4bYKEVnD.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\Ro4bYKEVnD.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: Ro4bYKEVnD.exeVirustotal: Detection: 51%
Source: Ro4bYKEVnD.exeReversingLabs: Detection: 36%
Source: Ro4bYKEVnD.exeString found in binary or memory: /LOADINF="filename"
Source: C:\Users\user\Desktop\Ro4bYKEVnD.exeFile read: C:\Users\user\Desktop\Ro4bYKEVnD.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Ro4bYKEVnD.exe "C:\Users\user\Desktop\Ro4bYKEVnD.exe"
Source: C:\Users\user\Desktop\Ro4bYKEVnD.exeProcess created: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmp "C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmp" /SL5="$2043E,934334,844800,C:\Users\user\Desktop\Ro4bYKEVnD.exe"
Source: C:\Users\user\Desktop\Ro4bYKEVnD.exeProcess created: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmp "C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmp" /SL5="$2043E,934334,844800,C:\Users\user\Desktop\Ro4bYKEVnD.exe" Jump to behavior
Source: C:\Users\user\Desktop\Ro4bYKEVnD.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Ro4bYKEVnD.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: msftedit.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: windows.globalization.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: globinputhost.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: windows.ui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: inputhost.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpWindow found: window name: TWizardFormJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpAutomated click: Next
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpAutomated click: Next
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpAutomated click: I accept the agreement
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpFile opened: C:\Windows\SysWOW64\MSFTEDIT.DLLJump to behavior
Source: Ro4bYKEVnD.exeStatic file information: File size 1914433 > 1048576
Source: Ro4bYKEVnD.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: f:\mydev\inno-download-plugin\unicode\idp.pdb source: Ro4bYKEVnD.tmp, 00000001.00000003.1340197766.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, idp.dll.1.dr
Source: Ro4bYKEVnD.exeStatic PE information: section name: .didata
Source: Ro4bYKEVnD.tmp.0.drStatic PE information: section name: .didata
Source: is-4RQLM.tmp.1.drStatic PE information: section name: .didata
Source: C:\Users\user\Desktop\Ro4bYKEVnD.exeFile created: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpFile created: C:\Users\user\AppData\Local\Temp\is-85HPG.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpFile created: C:\Program Files (x86)\Setup\is-4RQLM.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpFile created: C:\Users\user\AppData\Local\Temp\is-85HPG.tmp\idp.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpFile created: C:\Program Files (x86)\Setup\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\Desktop\Ro4bYKEVnD.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpDropped PE file which has not been started: C:\Program Files (x86)\Setup\is-4RQLM.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-85HPG.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpDropped PE file which has not been started: C:\Program Files (x86)\Setup\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-85HPG.tmp\idp.dllJump to dropped file
Source: Ro4bYKEVnD.tmp, 00000001.00000003.1299190434.00000000014DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWO
Source: Ro4bYKEVnD.tmp, 00000001.00000003.1342281458.0000000001481000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1299190434.00000000014DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory2
System Owner/User Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1675398 Sample: Ro4bYKEVnD.exe Startdate: 27/04/2025 Architecture: WINDOWS Score: 48 24 battlesummer.icu 2->24 28 Multi AV Scanner detection for submitted file 2->28 7 Ro4bYKEVnD.exe 2 2->7         started        signatures3 process4 file5 14 C:\Users\user\AppData\...\Ro4bYKEVnD.tmp, PE32 7->14 dropped 10 Ro4bYKEVnD.tmp 21 14 7->10         started        process6 dnsIp7 26 battlesummer.icu 104.21.30.99, 443, 49687, 49688 CLOUDFLARENETUS United States 10->26 16 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 10->16 dropped 18 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 10->18 dropped 20 C:\...\unins000.exe (copy), PE32 10->20 dropped 22 C:\Program Files (x86)\Setup\is-4RQLM.tmp, PE32 10->22 dropped file8

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Ro4bYKEVnD.exe51%VirustotalBrowse
Ro4bYKEVnD.exe36%ReversingLabsWin32.Trojan.Generic
SourceDetectionScannerLabelLink
C:\Program Files (x86)\Setup\is-4RQLM.tmp0%ReversingLabs
C:\Program Files (x86)\Setup\unins000.exe (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-85HPG.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-85HPG.tmp\idp.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmp0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://battlesummer.icu/0%Avira URL Cloudsafe
http://battlesummer.icu/ron.php?sis=6a62knm2gfs&d=inno&msg=&r=offer_exists&ko=no&o=365&a=2778&dn=3100%Avira URL Cloudsafe
https://battlesummer.icu/bin.php?e=392&sis=6a62knm2gfs&pid=4034&tid=&a=4034&cc=DE&t=17417026870%Avira URL Cloudsafe
http://battlesummer.icu/son.php?sis=6a62knm2gfs&paw=994730&spot=4&a=2778&on=479&o=1700&cr=0%Avira URL Cloudsafe
https://statistics.prolnter.ba/Privacy.txt0%Avira URL Cloudsafe
http://battlesummer.icu/ron.php?sis=6a62knm2gfs&d=inno&msg=&r=offer_exists&ko=no&o=1700&a=2778&dn=470%Avira URL Cloudsafe
http://battlesummer.icu/son.php?sis=6a62knm2gfs&paw=962182&spot=2&a=2778&on=310&o=365&cr=0%Avira URL Cloudsafe
https://battlesummer.icu/_0%Avira URL Cloudsafe
http://battlesummer.icu/son.php?sis=6a62knm2gfs&paw=287351&spot=3&a=2778&on=487&o=1706&cr=0%Avira URL Cloudsafe
http://battlesummer.icu/ron.php?sis=6a62knm2gfs&d=inno&msg=&r=offer_exists&ko=no&o=1662&a=2778&dn=420%Avira URL Cloudsafe
http://battlesummer.icu/ron.php?sis=6a62knm2gfs&fz=0%Avira URL Cloudsafe
https://legal.opera.com/eula/computers/0%Avira URL Cloudsafe
https://battlesummer.icu/P0%Avira URL Cloudsafe
http://battlesummer.icu/ron.php?sis=6a62knm2gfs&d=inno&msg=&r=offer_exists&ko=no&o=1706&a=2778&dn=480%Avira URL Cloudsafe
http://battlesummer.icu/son.php?sis=6a62knm2gfs&paw=614679&spot=5&a=2778&on=&o=1707&cr=0%Avira URL Cloudsafe
https://battlesummer.icu/8_0%Avira URL Cloudsafe
http://battlesummer.icu/ron.php?sis=6a62knm2gfs&d=inno&msg=&r=offer_exists&ko=no&o=1707&a=2778&dn=&s0%Avira URL Cloudsafe
http://battlesummer.icu/son.php?sis=6a62knm2gfs&paw=802303&spot=1&a=2778&on=420&o=1662&cr=0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
battlesummer.icu
104.21.30.99
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://battlesummer.icu/bin.php?e=392&sis=6a62knm2gfs&pid=4034&tid=&a=4034&cc=DE&t=1741702687false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupURo4bYKEVnD.exefalse
      high
      http://battlesummer.icu/ron.php?sis=6a62knm2gfs&d=inno&msg=&r=offer_exists&ko=no&o=365&a=2778&dn=310Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drfalse
      • Avira URL Cloud: safe
      unknown
      https://battlesummer.icu/Ro4bYKEVnD.tmp, 00000001.00000003.1299091557.00000000014FA000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://battlesummer.icu/son.php?sis=6a62knm2gfs&paw=287351&spot=3&a=2778&on=487&o=1706&cr=Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drfalse
      • Avira URL Cloud: safe
      unknown
      http://battlesummer.icu/son.php?sis=6a62knm2gfs&paw=994730&spot=4&a=2778&on=479&o=1700&cr=Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drfalse
      • Avira URL Cloud: safe
      unknown
      https://statistics.prolnter.ba/Privacy.txtRo4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1340492495.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1344922599.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1340753950.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1342281458.0000000001481000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000188D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1343414667.0000000001438000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://battlesummer.icu/ron.php?sis=6a62knm2gfs&d=inno&msg=&r=offer_exists&ko=no&o=1662&a=2778&dn=42Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drfalse
      • Avira URL Cloud: safe
      unknown
      http://goo.gl/fxTiKZRo4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1340492495.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1344922599.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1340753950.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1342281458.0000000001481000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000188D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1343414667.0000000001438000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        https://www.remobjects.com/psRo4bYKEVnD.exe, 00000000.00000003.1199300980.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1199700107.000000007EECB000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000000.1201056000.0000000000D91000.00000020.00000001.01000000.00000004.sdmp, is-4RQLM.tmp.1.dr, Ro4bYKEVnD.tmp.0.drfalse
          high
          https://battlesummer.icu/_Ro4bYKEVnD.tmp, 00000001.00000003.1342281458.00000000014C6000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://battlesummer.icu/son.php?sis=6a62knm2gfs&paw=962182&spot=2&a=2778&on=310&o=365&cr=Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drfalse
          • Avira URL Cloud: safe
          unknown
          https://www.innosetup.com/Ro4bYKEVnD.exe, 00000000.00000003.1199300980.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1199700107.000000007EECB000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000000.1201056000.0000000000D91000.00000020.00000001.01000000.00000004.sdmp, is-4RQLM.tmp.1.dr, Ro4bYKEVnD.tmp.0.drfalse
            high
            http://battlesummer.icu/ron.php?sis=6a62knm2gfs&d=inno&msg=&r=offer_exists&ko=no&o=1700&a=2778&dn=47Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://battlesummer.icu/ron.php?sis=6a62knm2gfs&fz=Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://bitbucket.org/mitrich_k/inno-download-pluginRo4bYKEVnD.tmp, 00000001.00000003.1340197766.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1343379360.00000000011EF000.00000004.00000010.00020000.00000000.sdmp, idp.dll.1.drfalse
              high
              https://legal.opera.com/eula/computers/Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1340492495.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1340753950.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1342281458.0000000001481000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000188D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1343414667.0000000001438000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://battlesummer.icu/ron.php?sis=6a62knm2gfs&d=inno&msg=&r=offer_exists&ko=no&o=1706&a=2778&dn=48Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drfalse
              • Avira URL Cloud: safe
              unknown
              https://legal.opera.com/privacy/Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1340492495.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1344922599.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1340753950.000000000152E000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1342281458.0000000001481000.00000004.00000020.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000188D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1343414667.0000000001438000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://battlesummer.icu/son.php?sis=6a62knm2gfs&paw=614679&spot=5&a=2778&on=&o=1707&cr=Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drfalse
                • Avira URL Cloud: safe
                unknown
                https://battlesummer.icu/8_Ro4bYKEVnD.tmp, 00000001.00000003.1342281458.00000000014C6000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://battlesummer.icu/PRo4bYKEVnD.tmp, 00000001.00000003.1299091557.00000000014FA000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://mitrichsoftware.wordpress.comBRo4bYKEVnD.tmp, 00000001.00000003.1340197766.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000002.1343379360.00000000011EF000.00000004.00000010.00020000.00000000.sdmp, idp.dll.1.drfalse
                  high
                  http://battlesummer.icu/son.php?sis=6a62knm2gfs&paw=802303&spot=1&a=2778&on=420&o=1662&cr=Ro4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://battlesummer.icu/ron.php?sis=6a62knm2gfs&d=inno&msg=&r=offer_exists&ko=no&o=1707&a=2778&dn=&sRo4bYKEVnD.exe, 00000000.00000003.1349348828.00000000026A1000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.exe, 00000000.00000003.1197934743.0000000002BB0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003A1B000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1203353268.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341528559.000000000186D000.00000004.00001000.00020000.00000000.sdmp, Ro4bYKEVnD.tmp, 00000001.00000003.1341099067.0000000003AB1000.00000004.00001000.00020000.00000000.sdmp, unins000.dat.1.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  104.21.30.99
                  battlesummer.icuUnited States
                  13335CLOUDFLARENETUSfalse
                  Joe Sandbox version:42.0.0 Malachite
                  Analysis ID:1675398
                  Start date and time:2025-04-27 09:52:13 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 5m 29s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:13
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:Ro4bYKEVnD.exe
                  renamed because original name is a hash value
                  Original Sample Name:3b364ba7695b8ca0faccb7f3559a7e42.exe
                  Detection:MAL
                  Classification:mal48.winEXE@3/7@1/1
                  EGA Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 184.29.183.29, 172.202.163.200
                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  No simulations
                  No context
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  CLOUDFLARENETUSTilecheiristirio.exeGet hashmaliciousUnknownBrowse
                  • 104.21.112.1
                  Tilecheiristirio.exeGet hashmaliciousUnknownBrowse
                  • 104.21.16.1
                  stage6.exeGet hashmaliciousLummaC, PureLog Stealer, zgRATBrowse
                  • 104.21.32.1
                  Oblivora Setup.msiGet hashmaliciousUnknownBrowse
                  • 172.64.41.3
                  svchost.exeGet hashmaliciousAsyncRAT, XWormBrowse
                  • 104.22.69.199
                  InstallerV1.exeGet hashmaliciousLummaC StealerBrowse
                  • 172.67.205.184
                  250426-1adwksztb1.bin.exeGet hashmaliciousPython Stealer, Blank Grabber, Exela Stealer, Umbral StealerBrowse
                  • 162.159.138.232
                  https://newsletter-editor.poweredbyintegra.dk/?NewsLetterTracker=true&bio=holstebrony&newsletter_ID=1&Text=Eget%20billede%20(ingen%20mellemrum)&Code=106&utcmabite=f9d0de3f-59af-46e8-b932-e8ab5db62f67&biocode=holstebrony&RedirectUrl=artisanglobaltour.com/fcrfr6/505388/bXRvcnJlc0B3YXRlcndvcmtzLmNvbQ==Get hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                  • 104.21.33.142
                  Invio Ordine accompagnatorio n. 20250425-70611 del 04252025 - C.E.F. Srl.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                  • 104.26.13.205
                  SecuriteInfo.com.FileRepMalware.29861.29138.msiGet hashmaliciousUnknownBrowse
                  • 172.64.41.3
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  37f463bf4616ecd445d4a1937da06e19WA72.85107.1.exeGet hashmaliciousUnknownBrowse
                  • 104.21.30.99
                  DeltaV3.61.exeGet hashmaliciousXWormBrowse
                  • 104.21.30.99
                  RFQ#84839PRODUCT_SAMPLES_INQUIRY.exeGet hashmaliciousDiscord Token StealerBrowse
                  • 104.21.30.99
                  file.exeGet hashmaliciousVidarBrowse
                  • 104.21.30.99
                  Liberiansk.exeGet hashmaliciousGuLoaderBrowse
                  • 104.21.30.99
                  ADJUNTOS_22042025.htaGet hashmaliciousUnknownBrowse
                  • 104.21.30.99
                  Remmitance_copy_bank_ref#67272.exeGet hashmaliciousGuLoaderBrowse
                  • 104.21.30.99
                  emf-PO49382.exeGet hashmaliciousGuLoaderBrowse
                  • 104.21.30.99
                  uBOounfByy.exeGet hashmaliciousUnknownBrowse
                  • 104.21.30.99
                  uBOounfByy.exeGet hashmaliciousUnknownBrowse
                  • 104.21.30.99
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  C:\Users\user\AppData\Local\Temp\is-85HPG.tmp\_isetup\_setup64.tmpsougou.exeGet hashmaliciousUnknownBrowse
                    sogou_pinyin-ut_12.13.exeGet hashmaliciousUnknownBrowse
                      DeepL-Setups-v3.6.1.exeGet hashmaliciousUnknownBrowse
                        DeepL-Setups-v3.6.1.exeGet hashmaliciousUnknownBrowse
                          random.exeGet hashmaliciousAmadey, CryptOne, LummaC StealerBrowse
                            ZnXNf4k3DK.exeGet hashmaliciousUnknownBrowse
                              rV3dFf91cQ.exeGet hashmaliciousUnknownBrowse
                                ToDesk_Daas_v1.1.0.1.exeGet hashmaliciousUnknownBrowse
                                  ToDesk_Daas_v1.1.0.1.exeGet hashmaliciousUnknownBrowse
                                    Factura A - 033613.pdf.exeGet hashmaliciousUnknownBrowse
                                      Process:C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmp
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):3543383
                                      Entropy (8bit):6.522099560567718
                                      Encrypted:false
                                      SSDEEP:49152:4uAKxvISKIJhNRQSJ3MhjxIXhEzAWig8l1sXyKFz0ool5+UKL5333TBD:4uAK6XMXhKAWwLsXa0333TV
                                      MD5:88DD74E56BE69E607B79A3B8CB3A7DCA
                                      SHA1:3742C9A9403B6FA1490BA1A426ED5BE8C79B6ED5
                                      SHA-256:D1BE3E4E4A8288F3EF5E1F0AE1C0315F91CDC0FDAE0D341FEC53389852D9574A
                                      SHA-512:5B9B5B2B0932823E6E7285ED7BB30FDEF84081F1BB441ABE6A0C687EC97B0D15C76BDA8D0E217F2AC9034C7790CB69A2F6FBB255FBE5D7BB4C8A6F4971426578
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:low
                                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...L7.g..................,...........,.......-...@...........................6...........@......@......................n....P...:....2..............................................................................Z..........(....................text....N,......P,................. ..`.itext......`,......T,............. ..`.data.........-.......,.............@....bss....t.....-..........................idata...:...P...<....-.............@....didata.(.............-.............@....edata..n.............-.............@..@.tls....X................................rdata..].............-.............@..@.reloc................-.............@..B.rsrc.........2.......1.............@..@..............6.......5.............@..@................
                                      Process:C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmp
                                      File Type:InnoSetup Log Kiddion Modest Menu.exe, version 0x418, 47001 bytes, DESKTOP-J\user\, C:\Program Files (x86)\Setup\376\377\377\0
                                      Category:dropped
                                      Size (bytes):47001
                                      Entropy (8bit):3.9097203460528447
                                      Encrypted:false
                                      SSDEEP:384:WzZxgY8eg74F9XA7LBy7sb7IPA1AN9JD/VmzVm9bPIHTvTehH4:WjiI90LBy7s3mXN9tUzVcbYTvKC
                                      MD5:4BD5790B9F83539F8EF5F547E79460B0
                                      SHA1:7606C6B46B4645410A3500EAAFA6AA3EC329F1D0
                                      SHA-256:1B5ADE31F5EC154143942E4750432A24675CBDE772D1DD9E893CFFD8E294BB24
                                      SHA-512:A7B9B1BF458E76E34B049BC6D8C04D297922089E260682A6B330FA88826887C777FB49BEBE7E066686EF693740E94A3375F270455C760922669DF8E2D842E613
                                      Malicious:false
                                      Reputation:low
                                      Preview:Inno Setup Uninstall Log (b)....................................Kiddion Modest Menu.exe.........................................................................................................Kiddion Modest Menu.exe..................................................................................................................................................................................................................................................P.................D.E.S.K.T.O.P.-.J.B.E.5.8.0......e.n.g.i.n.e.e.r......C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.S.e.t.u.p................5...... ..........z^..IFPS....6...m....................................................................................................ANYMETHOD.....................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TUNINSTALLPROGRESSFORM....TUNINSTALLPROGRESSFORM.........TWIZARDPAGE....TWIZARDPAGE.........TNEWPROGRESSBAR....TNEWPROGRESSBAR.....
                                      Process:C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmp
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):3543383
                                      Entropy (8bit):6.522099560567718
                                      Encrypted:false
                                      SSDEEP:49152:4uAKxvISKIJhNRQSJ3MhjxIXhEzAWig8l1sXyKFz0ool5+UKL5333TBD:4uAK6XMXhKAWwLsXa0333TV
                                      MD5:88DD74E56BE69E607B79A3B8CB3A7DCA
                                      SHA1:3742C9A9403B6FA1490BA1A426ED5BE8C79B6ED5
                                      SHA-256:D1BE3E4E4A8288F3EF5E1F0AE1C0315F91CDC0FDAE0D341FEC53389852D9574A
                                      SHA-512:5B9B5B2B0932823E6E7285ED7BB30FDEF84081F1BB441ABE6A0C687EC97B0D15C76BDA8D0E217F2AC9034C7790CB69A2F6FBB255FBE5D7BB4C8A6F4971426578
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:low
                                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...L7.g..................,...........,.......-...@...........................6...........@......@......................n....P...:....2..............................................................................Z..........(....................text....N,......P,................. ..`.itext......`,......T,............. ..`.data.........-.......,.............@....bss....t.....-..........................idata...:...P...<....-.............@....didata.(.............-.............@....edata..n.............-.............@..@.tls....X................................rdata..].............-.............@..@.reloc................-.............@..B.rsrc.........2.......1.............@..@..............6.......5.............@..@................
                                      Process:C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmp
                                      File Type:PE32+ executable (console) x86-64, for MS Windows
                                      Category:dropped
                                      Size (bytes):6144
                                      Entropy (8bit):4.720366600008286
                                      Encrypted:false
                                      SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                      MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                      SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                      SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                      SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Joe Sandbox View:
                                      • Filename: sougou.exe, Detection: malicious, Browse
                                      • Filename: sogou_pinyin-ut_12.13.exe, Detection: malicious, Browse
                                      • Filename: DeepL-Setups-v3.6.1.exe, Detection: malicious, Browse
                                      • Filename: DeepL-Setups-v3.6.1.exe, Detection: malicious, Browse
                                      • Filename: random.exe, Detection: malicious, Browse
                                      • Filename: ZnXNf4k3DK.exe, Detection: malicious, Browse
                                      • Filename: rV3dFf91cQ.exe, Detection: malicious, Browse
                                      • Filename: ToDesk_Daas_v1.1.0.1.exe, Detection: malicious, Browse
                                      • Filename: ToDesk_Daas_v1.1.0.1.exe, Detection: malicious, Browse
                                      • Filename: Factura A - 033613.pdf.exe, Detection: malicious, Browse
                                      Reputation:high, very likely benign file
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmp
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):2
                                      Entropy (8bit):1.0
                                      Encrypted:false
                                      SSDEEP:3:+:+
                                      MD5:7FA3B767C460B54A2BE4D49030B349C7
                                      SHA1:FD1286353570C5703799BA76999323B7C7447B06
                                      SHA-256:9390298F3FB0C5B160498935D79CB139AEF28E1C47358B4BBBA61862B9C26E59
                                      SHA-512:22494AF556A0782623729D0B5A9878F80AA6C21A6F51D346771842D613F51073C3B02FAB211BAFF42FB1998F38B77250DC7A1C71DD98B4B00CAE9620A6102AD7
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:no
                                      Process:C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmp
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):237568
                                      Entropy (8bit):6.42067568634536
                                      Encrypted:false
                                      SSDEEP:3072:dnSx3lws+iWbUmJmE8dxMw7r+mjT5PbzEFwyGIyTcHY10tSB9j:IP0bUmQEUr+mRcbTx4N
                                      MD5:55C310C0319260D798757557AB3BF636
                                      SHA1:0892EB7ED31D8BB20A56C6835990749011A2D8DE
                                      SHA-256:54E7E0AD32A22B775131A6288F083ED3286A9A436941377FC20F85DD9AD983ED
                                      SHA-512:E0082109737097658677D7963CBF28D412DCA3FA8F5812C2567E53849336CE45EBAE2C0430DF74BFE16C0F3EEBB46961BC1A10F32CA7947692A900162128AE57
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:moderate, very likely benign file
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........)Wj.H99.H99.H99..D9.H99..W9.H99..T9-H99zGd9.H99.H894H99..K9.H99..C9.H99..E9.H99..A9.H99Rich.H99........................PE..L......W...........!................Nr..............................................0............................... ;......h/..d.......................................................................@............................................text...i........................... ..`.rdata...n.......p..................@..@.data....:...@... ...@..............@....rsrc................`..............@..@.reloc..b-.......0...p..............@..B................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\Ro4bYKEVnD.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):3518976
                                      Entropy (8bit):6.534669625234648
                                      Encrypted:false
                                      SSDEEP:49152:AuAKxvISKIJhNRQSJ3MhjxIXhEzAWig8l1sXyKFz0ool5+UKL5333TB:AuAK6XMXhKAWwLsXa0333T
                                      MD5:4A66BFB87A90F5CE57AE24992CF676C5
                                      SHA1:51309C6AAAE90F0D8D70A641A90092FE40D34ED0
                                      SHA-256:D779A9008F8A973DDCD80C1909F1F8C3BDAC4A84BC7C69ED857706E9790F1D03
                                      SHA-512:BCA74E2FC655FCBC701CDB12758523A00CD6757C151FE298DE8F920640DF82D5486F3CDFEC1284364E6E26B0BE0C05151D982787967380F316AE38F7B151C910
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...L7.g..................,...........,.......-...@...........................6...........@......@......................n....P...:....2..............................................................................Z..........(....................text....N,......P,................. ..`.itext......`,......T,............. ..`.data.........-.......,.............@....bss....t.....-..........................idata...:...P...<....-.............@....didata.(.............-.............@....edata..n.............-.............@..@.tls....X................................rdata..].............-.............@..@.reloc................-.............@..B.rsrc.........2.......1.............@..@..............6.......5.............@..@................
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):7.5696649517575905
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 98.04%
                                      • Inno Setup installer (109748/4) 1.08%
                                      • InstallShield setup (43055/19) 0.42%
                                      • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                      File name:Ro4bYKEVnD.exe
                                      File size:1'914'433 bytes
                                      MD5:3b364ba7695b8ca0faccb7f3559a7e42
                                      SHA1:08a9024a29f6ccb63a21570e3a94f1cd7c5acf76
                                      SHA256:00d14c2ab7420b99c6525b077abd2864d6db21053635c59531ef7aa0cd0e600e
                                      SHA512:e58d3f9de0141acba3145c72baba16ff563e3bc6fe326dff50b5efd8548812c388c0536d5dc4abe1fdc4eabbbc1143e9f5a35f7672118c7ef5d7a27a5afd4606
                                      SSDEEP:24576:waE+hTNrCHtLfTfuM7Djr5QpYrao2rupZdH13Nf+YH5JaFMWHIta3+8Fk86Y1olY:0+MRvHrv4Ju+ekQoEcB
                                      TLSH:A795CF23F2CBE03EE05E0B3705B2A15494FBAA256523AD5786ECB49CCF751601E3E647
                                      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                      Icon Hash:0c0c2d33ceec80aa
                                      Entrypoint:0x4a7f98
                                      Entrypoint Section:.itext
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x67AC374C [Wed Feb 12 05:53:16 2025 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:6
                                      OS Version Minor:1
                                      File Version Major:6
                                      File Version Minor:1
                                      Subsystem Version Major:6
                                      Subsystem Version Minor:1
                                      Import Hash:40ab50289f7ef5fae60801f88d4541fc
                                      Instruction
                                      push ebp
                                      mov ebp, esp
                                      add esp, FFFFFFA4h
                                      push ebx
                                      push esi
                                      push edi
                                      xor eax, eax
                                      mov dword ptr [ebp-3Ch], eax
                                      mov dword ptr [ebp-40h], eax
                                      mov dword ptr [ebp-5Ch], eax
                                      mov dword ptr [ebp-30h], eax
                                      mov dword ptr [ebp-38h], eax
                                      mov dword ptr [ebp-34h], eax
                                      mov dword ptr [ebp-2Ch], eax
                                      mov dword ptr [ebp-28h], eax
                                      mov dword ptr [ebp-14h], eax
                                      mov eax, 004A3274h
                                      call 00007F6434B99719h
                                      xor eax, eax
                                      push ebp
                                      push 004A869Dh
                                      push dword ptr fs:[eax]
                                      mov dword ptr fs:[eax], esp
                                      xor edx, edx
                                      push ebp
                                      push 004A8657h
                                      push dword ptr fs:[edx]
                                      mov dword ptr fs:[edx], esp
                                      mov eax, dword ptr [004B0634h]
                                      call 00007F6434C2B44Bh
                                      call 00007F6434C2AF9Eh
                                      lea edx, dword ptr [ebp-14h]
                                      xor eax, eax
                                      call 00007F6434C257F8h
                                      mov edx, dword ptr [ebp-14h]
                                      mov eax, 004B4214h
                                      call 00007F6434B937C7h
                                      push 00000002h
                                      push 00000000h
                                      push 00000001h
                                      mov ecx, dword ptr [004B4214h]
                                      mov dl, 01h
                                      mov eax, dword ptr [0049CCF4h]
                                      call 00007F6434C26BE7h
                                      mov dword ptr [004B4218h], eax
                                      xor edx, edx
                                      push ebp
                                      push 004A8603h
                                      push dword ptr fs:[edx]
                                      mov dword ptr fs:[edx], esp
                                      call 00007F6434C2B4D3h
                                      mov dword ptr [004B4220h], eax
                                      mov eax, dword ptr [004B4220h]
                                      cmp dword ptr [eax+0Ch], 01h
                                      jne 00007F6434C319EAh
                                      mov eax, dword ptr [004B4220h]
                                      mov edx, 00000028h
                                      call 00007F6434C27504h
                                      mov edx, dword ptr [004B4220h]
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0xb70000x71.edata
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xb50000xfec.idata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xcb0000x11200.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xba0000x10d80.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0xb90000x18.rdata
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0xb52d40x25c.idata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xb60000x1a4.didata
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000xa56a40xa5800463e3aaab99b053f2c4a2f67933c8e57False0.3625687429191843data6.379407961748755IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .itext0xa70000x17400x1800aabad89a99811463c0c9e4733f9929f6False0.5677083333333334data6.168310852607473IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .data0xa90000x38380x3a004daf07ad25de9a5fbce0e8bfa5bebf31False0.3537176724137931data4.9726577614511855IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .bss0xad0000x72780x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .idata0xb50000xfec0x1000627340dff539ef99048969aa4824fb2dFalse0.380615234375data5.020404933181373IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .didata0xb60000x1a40x200fd11c1109737963cc6cb7258063abfd6False0.34765625data2.729290535217263IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .edata0xb70000x710x2007de8ca0c7a61668a728fd3a88dc0942dFalse0.1796875data1.305578535725827IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .tls0xb80000x180x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rdata0xb90000x5d0x200d84006640084dc9f74a07c2ff9c7d656False0.189453125data1.3892750148744617IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xba0000x10d800x10e008871bb651f0d9a00a939ad4155039605False0.5829861111111111data6.713549988072992IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      .rsrc0xcb0000x112000x112001cad866f2579ff5d81649f04eb5e2586False0.1858747718978102data3.705099132450798IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0xcb6780xa68Device independent bitmap graphic, 64 x 128 x 4, image size 2048EnglishUnited States0.1174924924924925
                                      RT_ICON0xcc0e00x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.15792682926829268
                                      RT_ICON0xcc7480x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.23387096774193547
                                      RT_ICON0xcca300x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.39864864864864863
                                      RT_ICON0xccb580x1628Device independent bitmap graphic, 64 x 128 x 8, image size 4096, 256 important colorsEnglishUnited States0.08339210155148095
                                      RT_ICON0xce1800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.1023454157782516
                                      RT_ICON0xcf0280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.10649819494584838
                                      RT_ICON0xcf8d00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.10838150289017341
                                      RT_ICON0xcfe380x12e5PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.8712011577424024
                                      RT_ICON0xd11200x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.05668398677373642
                                      RT_ICON0xd53480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.08475103734439834
                                      RT_ICON0xd78f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.09920262664165103
                                      RT_ICON0xd89980x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.2047872340425532
                                      RT_STRING0xd8e000x3f8data0.3198818897637795
                                      RT_STRING0xd91f80x2dcdata0.36475409836065575
                                      RT_STRING0xd94d40x430data0.40578358208955223
                                      RT_STRING0xd99040x44cdata0.38636363636363635
                                      RT_STRING0xd9d500x2d4data0.39226519337016574
                                      RT_STRING0xda0240xb8data0.6467391304347826
                                      RT_STRING0xda0dc0x9cdata0.6410256410256411
                                      RT_STRING0xda1780x374data0.4230769230769231
                                      RT_STRING0xda4ec0x398data0.3358695652173913
                                      RT_STRING0xda8840x368data0.3795871559633027
                                      RT_STRING0xdabec0x2a4data0.4275147928994083
                                      RT_RCDATA0xdae900x10data1.5
                                      RT_RCDATA0xdaea00x354data0.5586854460093896
                                      RT_RCDATA0xdb1f40x2cdata1.1818181818181819
                                      RT_GROUP_ICON0xdb2200xbcdataEnglishUnited States0.6170212765957447
                                      RT_VERSION0xdb2dc0x584dataEnglishUnited States0.2613314447592068
                                      RT_MANIFEST0xdb8600x7a8XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3377551020408163
                                      DLLImport
                                      kernel32.dllGetACP, GetExitCodeProcess, CloseHandle, LocalFree, SizeofResource, VirtualProtect, QueryPerformanceFrequency, VirtualFree, GetFullPathNameW, GetProcessHeap, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVolumeInformationW, GetVersion, GetDriveTypeW, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetSystemWindowsDirectoryW, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetCommandLineW, GetSystemInfo, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, LCMapStringW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale
                                      comctl32.dllInitCommonControls
                                      user32.dllCreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharUpperBuffW, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW
                                      oleaut32.dllSysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate
                                      advapi32.dllConvertStringSecurityDescriptorToSecurityDescriptorW, OpenThreadToken, AdjustTokenPrivileges, LookupPrivilegeValueW, RegOpenKeyExW, OpenProcessToken, FreeSid, AllocateAndInitializeSid, EqualSid, RegQueryValueExW, GetTokenInformation, ConvertSidToStringSidW, RegCloseKey
                                      NameOrdinalAddress
                                      __dbk_fcall_wrapper20x40fc10
                                      dbkFCallWrapperAddr10x4b063c
                                      DescriptionData
                                      CommentsThis installation was built with Inno Setup.
                                      CompanyName
                                      FileDescriptionKiddion Modest Menu.exe Setup
                                      FileVersion1.0.0.0
                                      LegalCopyrightKiddion Modest Menu.exe
                                      OriginalFileName
                                      ProductNameKiddion Modest Menu.exe
                                      ProductVersion1.0.0.0
                                      Translation0x0000 0x04b0
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States

                                      Download Network PCAP: filteredfull

                                      • Total Packets: 22
                                      • 443 (HTTPS)
                                      • 53 (DNS)
                                      TimestampSource PortDest PortSource IPDest IP
                                      Apr 27, 2025 09:53:13.556087971 CEST49687443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:13.556138039 CEST44349687104.21.30.99192.168.2.6
                                      Apr 27, 2025 09:53:13.556233883 CEST49687443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:13.597615957 CEST49687443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:13.597632885 CEST44349687104.21.30.99192.168.2.6
                                      Apr 27, 2025 09:53:13.890146971 CEST44349687104.21.30.99192.168.2.6
                                      Apr 27, 2025 09:53:13.890259981 CEST49687443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:13.944462061 CEST49687443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:13.944483042 CEST44349687104.21.30.99192.168.2.6
                                      Apr 27, 2025 09:53:13.945108891 CEST44349687104.21.30.99192.168.2.6
                                      Apr 27, 2025 09:53:13.945188999 CEST49687443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:13.947810888 CEST49687443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:13.988274097 CEST44349687104.21.30.99192.168.2.6
                                      Apr 27, 2025 09:53:14.911812067 CEST44349687104.21.30.99192.168.2.6
                                      Apr 27, 2025 09:53:14.911874056 CEST44349687104.21.30.99192.168.2.6
                                      Apr 27, 2025 09:53:14.911879063 CEST49687443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:14.911916971 CEST49687443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:14.913628101 CEST49687443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:14.913651943 CEST44349687104.21.30.99192.168.2.6
                                      Apr 27, 2025 09:53:14.913662910 CEST49687443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:14.913702965 CEST49687443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:14.915987968 CEST49688443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:14.916028023 CEST44349688104.21.30.99192.168.2.6
                                      Apr 27, 2025 09:53:14.916110039 CEST49688443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:14.916434050 CEST49688443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:14.916449070 CEST44349688104.21.30.99192.168.2.6
                                      Apr 27, 2025 09:53:15.203181982 CEST44349688104.21.30.99192.168.2.6
                                      Apr 27, 2025 09:53:15.203252077 CEST49688443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:15.203839064 CEST49688443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:15.203849077 CEST44349688104.21.30.99192.168.2.6
                                      Apr 27, 2025 09:53:15.204673052 CEST49688443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:15.204679012 CEST44349688104.21.30.99192.168.2.6
                                      Apr 27, 2025 09:53:16.244218111 CEST44349688104.21.30.99192.168.2.6
                                      Apr 27, 2025 09:53:16.244311094 CEST44349688104.21.30.99192.168.2.6
                                      Apr 27, 2025 09:53:16.244350910 CEST49688443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:16.244663000 CEST49688443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:16.244904041 CEST49688443192.168.2.6104.21.30.99
                                      Apr 27, 2025 09:53:16.244919062 CEST44349688104.21.30.99192.168.2.6
                                      TimestampSource PortDest PortSource IPDest IP
                                      Apr 27, 2025 09:53:13.345904112 CEST6549353192.168.2.61.1.1.1
                                      Apr 27, 2025 09:53:13.546075106 CEST53654931.1.1.1192.168.2.6
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Apr 27, 2025 09:53:13.345904112 CEST192.168.2.61.1.1.10x1bcbStandard query (0)battlesummer.icuA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Apr 27, 2025 09:53:13.546075106 CEST1.1.1.1192.168.2.60x1bcbNo error (0)battlesummer.icu104.21.30.99A (IP address)IN (0x0001)false
                                      Apr 27, 2025 09:53:13.546075106 CEST1.1.1.1192.168.2.60x1bcbNo error (0)battlesummer.icu172.67.172.186A (IP address)IN (0x0001)false
                                      • battlesummer.icu
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.649687104.21.30.994434040C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmp
                                      TimestampBytes transferredDirectionData
                                      2025-04-27 07:53:13 UTC210OUTHEAD /bin.php?e=392&sis=6a62knm2gfs&pid=4034&tid=&a=4034&cc=DE&t=1741702687 HTTP/1.1
                                      Accept: */*
                                      User-Agent: InnoDownloadPlugin/1.5
                                      Host: battlesummer.icu
                                      Connection: Keep-Alive
                                      Cache-Control: no-cache
                                      2025-04-27 07:53:14 UTC252INHTTP/1.1 200 OK
                                      Date: Sun, 27 Apr 2025 07:53:14 GMT
                                      Content-Type: text/plain
                                      Content-Length: 2
                                      Connection: close
                                      Server: cloudflare
                                      X-Powered-By: PHP/5.5.38
                                      Cf-Cache-Status: DYNAMIC
                                      CF-RAY: 936cbeb75cad9d47-PHX
                                      alt-svc: h3=":443"; ma=86400


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.649688104.21.30.994434040C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmp
                                      TimestampBytes transferredDirectionData
                                      2025-04-27 07:53:15 UTC209OUTGET /bin.php?e=392&sis=6a62knm2gfs&pid=4034&tid=&a=4034&cc=DE&t=1741702687 HTTP/1.1
                                      Accept: */*
                                      User-Agent: InnoDownloadPlugin/1.5
                                      Host: battlesummer.icu
                                      Connection: Keep-Alive
                                      Cache-Control: no-cache
                                      2025-04-27 07:53:16 UTC252INHTTP/1.1 200 OK
                                      Date: Sun, 27 Apr 2025 07:53:16 GMT
                                      Content-Type: text/plain
                                      Content-Length: 2
                                      Connection: close
                                      Server: cloudflare
                                      X-Powered-By: PHP/5.5.38
                                      Cf-Cache-Status: DYNAMIC
                                      CF-RAY: 936cbebf9c1eb829-PHX
                                      alt-svc: h3=":443"; ma=86400
                                      2025-04-27 07:53:16 UTC2INData Raw: 6e 6f
                                      Data Ascii: no


                                      050100s020406080100

                                      Click to jump to process

                                      050100s0.00102030MB

                                      Click to jump to process

                                      • File
                                      • Registry

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:03:53:05
                                      Start date:27/04/2025
                                      Path:C:\Users\user\Desktop\Ro4bYKEVnD.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\Ro4bYKEVnD.exe"
                                      Imagebase:0x1e0000
                                      File size:1'914'433 bytes
                                      MD5 hash:3B364BA7695B8CA0FACCB7F3559A7E42
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:Borland Delphi
                                      Reputation:low
                                      Has exited:true

                                      Target ID:1
                                      Start time:03:53:05
                                      Start date:27/04/2025
                                      Path:C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmp
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Local\Temp\is-EOPTJ.tmp\Ro4bYKEVnD.tmp" /SL5="$2043E,934334,844800,C:\Users\user\Desktop\Ro4bYKEVnD.exe"
                                      Imagebase:0xd90000
                                      File size:3'518'976 bytes
                                      MD5 hash:4A66BFB87A90F5CE57AE24992CF676C5
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:Borland Delphi
                                      Antivirus matches:
                                      • Detection: 0%, ReversingLabs
                                      Reputation:low
                                      Has exited:true
                                      There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                      There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                      There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                      There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                      There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                      There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                      No disassembly