Create Interactive Tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Mardom.MN.10.17168.22190

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.Mardom.MN.10.17168.22190 (renamed file extension from 22190 to exe)
Analysis ID:628657
MD5:29c19b486af12be2b5cd16d74105bf8e
SHA1:af1de887ba5eba69d72ea84020f1fba9a88d307b
SHA256:aaa959baa655fa3b2225252a1f8052bb189989911686d6482e45d6e0bdf1b829
Tags:exe
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
.NET source code references suspicious native API functions
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Binary or sample is protected by dotNetProtector
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Potential key logger detected (key state polling based)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe (PID: 7092 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe" MD5: 29C19B486AF12BE2B5CD16D74105BF8E)
    • cmd.exe (PID: 2904 cmdline: "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 1292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 492 cmdline: schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f MD5: 15FF7D8324231381BAD48A052F85DF04)
    • cmd.exe (PID: 1320 cmdline: cmd.exe" /C copy "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe" "C:\Users\user\AppData\Roaming\roaming\roaming.exe MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 1268 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • roaming.exe (PID: 6412 cmdline: C:\Users\user\AppData\Roaming\roaming\roaming.exe MD5: 29C19B486AF12BE2B5CD16D74105BF8E)
    • roaming.exe (PID: 4244 cmdline: C:\Users\user\AppData\Roaming\roaming\roaming.exe MD5: 29C19B486AF12BE2B5CD16D74105BF8E)
    • cmd.exe (PID: 3256 cmdline: "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 2304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 584 cmdline: schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f MD5: 15FF7D8324231381BAD48A052F85DF04)
    • cmd.exe (PID: 5340 cmdline: cmd.exe" /C copy "C:\Users\user\AppData\Roaming\roaming\roaming.exe" "C:\Users\user\AppData\Roaming\roaming\roaming.exe MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 2296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
27.0.roaming.exe.400000.7.unpackMALWARE_Win_CobianRATDetects CobianRAT, a fork of NjratditekSHen
  • 0x5c7a:$s1: 1.0.40.7
  • 0x6e88:$s1: 1.0.40.7
  • 0x6f68:$s1: 1.0.40.7
  • 0x6fa4:$s1: 1.0.40.7
  • 0x5d3c:$s2: DownloadData
  • 0x5d6e:$s3: Executed As
  • 0x5cea:$s4: \Plugins
  • 0x5c6a:$s5: LOGIN
  • 0x5afa:$s6: software\microsoft\windows\currentversion\run
  • 0x5edb:$s7: Hidden
0.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.272db30.2.unpackMALWARE_Win_CobianRATDetects CobianRAT, a fork of NjratditekSHen
  • 0x3e7a:$s1: 1.0.40.7
  • 0x5088:$s1: 1.0.40.7
  • 0x5168:$s1: 1.0.40.7
  • 0x51a4:$s1: 1.0.40.7
  • 0x3f3c:$s2: DownloadData
  • 0x3f6e:$s3: Executed As
  • 0x3eea:$s4: \Plugins
  • 0x3e6a:$s5: LOGIN
  • 0x3cfa:$s6: software\microsoft\windows\currentversion\run
  • 0x40db:$s7: Hidden
23.2.roaming.exe.297d974.2.unpackMALWARE_Win_CobianRATDetects CobianRAT, a fork of NjratditekSHen
  • 0x3e7a:$s1: 1.0.40.7
  • 0x5088:$s1: 1.0.40.7
  • 0x5168:$s1: 1.0.40.7
  • 0x51a4:$s1: 1.0.40.7
  • 0x3f3c:$s2: DownloadData
  • 0x3f6e:$s3: Executed As
  • 0x3eea:$s4: \Plugins
  • 0x3e6a:$s5: LOGIN
  • 0x3cfa:$s6: software\microsoft\windows\currentversion\run
  • 0x40db:$s7: Hidden
5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.6.unpackMALWARE_Win_CobianRATDetects CobianRAT, a fork of NjratditekSHen
  • 0x5c7a:$s1: 1.0.40.7
  • 0x6e88:$s1: 1.0.40.7
  • 0x6f68:$s1: 1.0.40.7
  • 0x6fa4:$s1: 1.0.40.7
  • 0x5d3c:$s2: DownloadData
  • 0x5d6e:$s3: Executed As
  • 0x5cea:$s4: \Plugins
  • 0x5c6a:$s5: LOGIN
  • 0x5afa:$s6: software\microsoft\windows\currentversion\run
  • 0x5edb:$s7: Hidden
0.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.2726144.1.unpackMALWARE_Win_CobianRATDetects CobianRAT, a fork of NjratditekSHen
  • 0x3e7a:$s1: 1.0.40.7
  • 0x5088:$s1: 1.0.40.7
  • 0x5168:$s1: 1.0.40.7
  • 0x51a4:$s1: 1.0.40.7
  • 0x3f3c:$s2: DownloadData
  • 0x3f6e:$s3: Executed As
  • 0x3eea:$s4: \Plugins
  • 0x3e6a:$s5: LOGIN
  • 0x3cfa:$s6: software\microsoft\windows\currentversion\run
  • 0x40db:$s7: Hidden
Click to see the 15 entries
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeReversingLabs: Detection: 41%
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeReversingLabs: Detection: 41%
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeJoe Sandbox ML: detected
Source: 27.0.roaming.exe.400000.7.unpackAvira: Label: TR/Dropper.MSIL.Gen
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen
Source: 27.0.roaming.exe.400000.13.unpackAvira: Label: TR/Dropper.MSIL.Gen
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen
Source: 27.0.roaming.exe.400000.5.unpackAvira: Label: TR/Dropper.MSIL.Gen
Source: 27.2.roaming.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen
Source: 5.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen
Source: 27.0.roaming.exe.400000.11.unpackAvira: Label: TR/Dropper.MSIL.Gen
Source: 27.0.roaming.exe.400000.9.unpackAvira: Label: TR/Dropper.MSIL.Gen
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 4x nop then mov eax, dword ptr [ebp-20h]
Source: global trafficTCP traffic: 192.168.2.6:49768 -> 104.250.238.66:5552
Source: unknownDNS traffic detected: queries for: anglekeys11.3utilities.com

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.6.unpack, LG.cs.Net Code: VKCodeToUnicode
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.12.unpack, LG.cs.Net Code: VKCodeToUnicode
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.10.unpack, LG.cs.Net Code: VKCodeToUnicode
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.4.unpack, LG.cs.Net Code: VKCodeToUnicode
Source: 5.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.0.unpack, LG.cs.Net Code: VKCodeToUnicode
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.8.unpack, LG.cs.Net Code: VKCodeToUnicode
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 5_2_0313BE31 GetKeyState,GetKeyState,GetKeyState,
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 5_2_0313BE40 GetKeyState,GetKeyState,GetKeyState,

System Summary

barindex
Source: 27.0.roaming.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 0.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.272db30.2.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 23.2.roaming.exe.297d974.2.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 0.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.2726144.1.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 27.0.roaming.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 0.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.2726144.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 27.0.roaming.exe.400000.13.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 27.2.roaming.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 5.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 23.2.roaming.exe.2975f88.1.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 27.0.roaming.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 27.0.roaming.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 23.2.roaming.exe.297d974.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 0.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.272db30.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: 23.2.roaming.exe.2975f88.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects CobianRAT, a fork of Njrat Author: ditekSHen
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: 27.0.roaming.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 0.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.272db30.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 23.2.roaming.exe.297d974.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 0.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.2726144.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 27.0.roaming.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 0.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.2726144.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 27.0.roaming.exe.400000.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 27.2.roaming.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 5.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 23.2.roaming.exe.2975f88.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 27.0.roaming.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 27.0.roaming.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 23.2.roaming.exe.297d974.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 0.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.272db30.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: 23.2.roaming.exe.2975f88.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobianRAT author = ditekSHen, description = Detects CobianRAT, a fork of Njrat
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 0_2_01072050
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 0_2_00B12C23
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 0_2_00B1DE48
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 0_2_04BF59C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 0_2_04BF0040
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 0_2_04BF5934
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 5_2_01072050
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 5_2_03136313
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 5_2_031381F8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 5_2_031324B8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 5_2_03136938
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 5_2_03135848
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 5_2_03139D48
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 5_2_03136F70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 5_2_031331F8
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_0006210F
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_00062050
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_02892CE0
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_0289DE48
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_04F259C0
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_04F20040
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_04F25934
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_04F30040
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_04F3B040
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_04F40040
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_04F45D88
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_04F45C81
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_04F45D77
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_04F40007
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_04F30006
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 27_2_0006210F
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 27_2_00062050
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 27_2_00D224C8
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 27_2_00D224B8
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 27_2_00D22930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 0_2_04BFCDE0 CreateProcessAsUserA,
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe, 00000000.00000002.413636991.00000000026B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameB.exe8 vs SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe, 00000005.00000000.401762367.000000000040A000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameB.exe8 vs SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: roaming.exe.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeReversingLabs: Detection: 41%
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe" "C:\Users\user\AppData\Roaming\roaming\roaming.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\user\AppData\Roaming\roaming\roaming.exe C:\Users\user\AppData\Roaming\roaming\roaming.exe
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess created: C:\Users\user\AppData\Roaming\roaming\roaming.exe C:\Users\user\AppData\Roaming\roaming\roaming.exe
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\AppData\Roaming\roaming\roaming.exe" "C:\Users\user\AppData\Roaming\roaming\roaming.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe" "C:\Users\user\AppData\Roaming\roaming\roaming.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess created: C:\Users\user\AppData\Roaming\roaming\roaming.exe C:\Users\user\AppData\Roaming\roaming\roaming.exe
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\AppData\Roaming\roaming\roaming.exe" "C:\Users\user\AppData\Roaming\roaming\roaming.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeFile created: C:\Users\user\AppData\Roaming\roamingJump to behavior
Source: classification engineClassification label: mal96.spyw.evad.winEXE@22/4@39/2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe, AbsoluteUri.csBase64 encoded string: 'h/2qvGmQ78O2RCocilezXi0mt+5Ft2HVQ2elpsN/mcfLyO0ogV2D6cY2eehuf2IQocgg2p3UZsU='
Source: 0.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.1070000.0.unpack, AbsoluteUri.csBase64 encoded string: 'h/2qvGmQ78O2RCocilezXi0mt+5Ft2HVQ2elpsN/mcfLyO0ogV2D6cY2eehuf2IQocgg2p3UZsU='
Source: 0.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.1070000.0.unpack, AbsoluteUri.csBase64 encoded string: 'h/2qvGmQ78O2RCocilezXi0mt+5Ft2HVQ2elpsN/mcfLyO0ogV2D6cY2eehuf2IQocgg2p3UZsU='
Source: 5.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.1070000.1.unpack, AbsoluteUri.csBase64 encoded string: 'h/2qvGmQ78O2RCocilezXi0mt+5Ft2HVQ2elpsN/mcfLyO0ogV2D6cY2eehuf2IQocgg2p3UZsU='
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.1070000.1.unpack, AbsoluteUri.csBase64 encoded string: 'h/2qvGmQ78O2RCocilezXi0mt+5Ft2HVQ2elpsN/mcfLyO0ogV2D6cY2eehuf2IQocgg2p3UZsU='
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.1070000.0.unpack, AbsoluteUri.csBase64 encoded string: 'h/2qvGmQ78O2RCocilezXi0mt+5Ft2HVQ2elpsN/mcfLyO0ogV2D6cY2eehuf2IQocgg2p3UZsU='
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.1070000.13.unpack, AbsoluteUri.csBase64 encoded string: 'h/2qvGmQ78O2RCocilezXi0mt+5Ft2HVQ2elpsN/mcfLyO0ogV2D6cY2eehuf2IQocgg2p3UZsU='
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.1070000.3.unpack, AbsoluteUri.csBase64 encoded string: 'h/2qvGmQ78O2RCocilezXi0mt+5Ft2HVQ2elpsN/mcfLyO0ogV2D6cY2eehuf2IQocgg2p3UZsU='
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.1070000.7.unpack, AbsoluteUri.csBase64 encoded string: 'h/2qvGmQ78O2RCocilezXi0mt+5Ft2HVQ2elpsN/mcfLyO0ogV2D6cY2eehuf2IQocgg2p3UZsU='
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.1070000.5.unpack, AbsoluteUri.csBase64 encoded string: 'h/2qvGmQ78O2RCocilezXi0mt+5Ft2HVQ2elpsN/mcfLyO0ogV2D6cY2eehuf2IQocgg2p3UZsU='
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.1070000.11.unpack, AbsoluteUri.csBase64 encoded string: 'h/2qvGmQ78O2RCocilezXi0mt+5Ft2HVQ2elpsN/mcfLyO0ogV2D6cY2eehuf2IQocgg2p3UZsU='
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.1070000.2.unpack, AbsoluteUri.csBase64 encoded string: 'h/2qvGmQ78O2RCocilezXi0mt+5Ft2HVQ2elpsN/mcfLyO0ogV2D6cY2eehuf2IQocgg2p3UZsU='
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.1070000.9.unpack, AbsoluteUri.csBase64 encoded string: 'h/2qvGmQ78O2RCocilezXi0mt+5Ft2HVQ2elpsN/mcfLyO0ogV2D6cY2eehuf2IQocgg2p3UZsU='
Source: roaming.exe.9.dr, AbsoluteUri.csBase64 encoded string: 'h/2qvGmQ78O2RCocilezXi0mt+5Ft2HVQ2elpsN/mcfLyO0ogV2D6cY2eehuf2IQocgg2p3UZsU='
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1292:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1268:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2304:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2296:120:WilError_01
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeMutant created: \Sessions\1\BaseNamedObjects\{AL7DOK6F-195901-HS7KVR-HS7KVR6MLF}
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

Data Obfuscation

barindex
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeString found in binary or memory: dotNetProtector
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe, 00000000.00000002.413424544.0000000001072000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: dotNetProtector
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe, 00000000.00000002.413424544.0000000001072000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: qMinHebrewYearWriteTinyHeaderMD5CryptoServiceProviderTripleDESCryptoServiceProviderMethodBuilderModuleBuilderTypeBuilderAssemblyBuilderSpecialFolderShfolderBufferlpBfdsdhsdsdsfufferResourceManagerDebuggerIsTrueQuantifierStringResultHandlerClassLayoutUserTypeNameParserFileStyleUriParserStreamWriterget_IsPointerRecursionCounterBitConverterNativeRegisterRegisterrpbAikrGetTokenForFloorset_RedirectStandardErrorCurrencyGroupSeparatorCreateFileInfoIterator.ctor.cctordotNetProtectorget_IsConstructorPropertyDescriptorCreateDecryptorIntPtr_strHaveHour
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe, 00000000.00000000.357811350.0000000001072000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: dotNetProtector
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe, 00000000.00000000.357811350.0000000001072000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: qMinHebrewYearWriteTinyHeaderMD5CryptoServiceProviderTripleDESCryptoServiceProviderMethodBuilderModuleBuilderTypeBuilderAssemblyBuilderSpecialFolderShfolderBufferlpBfdsdhsdsdsfufferResourceManagerDebuggerIsTrueQuantifierStringResultHandlerClassLayoutUserTypeNameParserFileStyleUriParserStreamWriterget_IsPointerRecursionCounterBitConverterNativeRegisterRegisterrpbAikrGetTokenForFloorset_RedirectStandardErrorCurrencyGroupSeparatorCreateFileInfoIterator.ctor.cctordotNetProtectorget_IsConstructorPropertyDescriptorCreateDecryptorIntPtr_strHaveHour
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeString found in binary or memory: dotNetProtector
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe, 00000005.00000002.624801276.0000000001072000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: dotNetProtector
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe, 00000005.00000002.624801276.0000000001072000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: qMinHebrewYearWriteTinyHeaderMD5CryptoServiceProviderTripleDESCryptoServiceProviderMethodBuilderModuleBuilderTypeBuilderAssemblyBuilderSpecialFolderShfolderBufferlpBfdsdhsdsdsfufferResourceManagerDebuggerIsTrueQuantifierStringResultHandlerClassLayoutUserTypeNameParserFileStyleUriParserStreamWriterget_IsPointerRecursionCounterBitConverterNativeRegisterRegisterrpbAikrGetTokenForFloorset_RedirectStandardErrorCurrencyGroupSeparatorCreateFileInfoIterator.ctor.cctordotNetProtectorget_IsConstructorPropertyDescriptorCreateDecryptorIntPtr_strHaveHour
Source: roaming.exeString found in binary or memory: dotNetProtector
Source: roaming.exe, 00000017.00000002.589559386.0000000000062000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: dotNetProtector
Source: roaming.exe, 00000017.00000002.589559386.0000000000062000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: qMinHebrewYearWriteTinyHeaderMD5CryptoServiceProviderTripleDESCryptoServiceProviderMethodBuilderModuleBuilderTypeBuilderAssemblyBuilderSpecialFolderShfolderBufferlpBfdsdhsdsdsfufferResourceManagerDebuggerIsTrueQuantifierStringResultHandlerClassLayoutUserTypeNameParserFileStyleUriParserStreamWriterget_IsPointerRecursionCounterBitConverterNativeRegisterRegisterrpbAikrGetTokenForFloorset_RedirectStandardErrorCurrencyGroupSeparatorCreateFileInfoIterator.ctor.cctordotNetProtectorget_IsConstructorPropertyDescriptorCreateDecryptorIntPtr_strHaveHour
Source: roaming.exe, 00000017.00000000.520236971.0000000000062000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: dotNetProtector
Source: roaming.exe, 00000017.00000000.520236971.0000000000062000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: qMinHebrewYearWriteTinyHeaderMD5CryptoServiceProviderTripleDESCryptoServiceProviderMethodBuilderModuleBuilderTypeBuilderAssemblyBuilderSpecialFolderShfolderBufferlpBfdsdhsdsdsfufferResourceManagerDebuggerIsTrueQuantifierStringResultHandlerClassLayoutUserTypeNameParserFileStyleUriParserStreamWriterget_IsPointerRecursionCounterBitConverterNativeRegisterRegisterrpbAikrGetTokenForFloorset_RedirectStandardErrorCurrencyGroupSeparatorCreateFileInfoIterator.ctor.cctordotNetProtectorget_IsConstructorPropertyDescriptorCreateDecryptorIntPtr_strHaveHour
Source: roaming.exeString found in binary or memory: dotNetProtector
Source: roaming.exe, 0000001B.00000000.575904436.0000000000062000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: dotNetProtector
Source: roaming.exe, 0000001B.00000000.575904436.0000000000062000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: qMinHebrewYearWriteTinyHeaderMD5CryptoServiceProviderTripleDESCryptoServiceProviderMethodBuilderModuleBuilderTypeBuilderAssemblyBuilderSpecialFolderShfolderBufferlpBfdsdhsdsdsfufferResourceManagerDebuggerIsTrueQuantifierStringResultHandlerClassLayoutUserTypeNameParserFileStyleUriParserStreamWriterget_IsPointerRecursionCounterBitConverterNativeRegisterRegisterrpbAikrGetTokenForFloorset_RedirectStandardErrorCurrencyGroupSeparatorCreateFileInfoIterator.ctor.cctordotNetProtectorget_IsConstructorPropertyDescriptorCreateDecryptorIntPtr_strHaveHour
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeString found in binary or memory: dotNetProtector
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeString found in binary or memory: qMinHebrewYearWriteTinyHeaderMD5CryptoServiceProviderTripleDESCryptoServiceProviderMethodBuilderModuleBuilderTypeBuilderAssemblyBuilderSpecialFolderShfolderBufferlpBfdsdhsdsdsfufferResourceManagerDebuggerIsTrueQuantifierStringResultHandlerClassLayoutUserTypeNameParserFileStyleUriParserStreamWriterget_IsPointerRecursionCounterBitConverterNativeRegisterRegisterrpbAikrGetTokenForFloorset_RedirectStandardErrorCurrencyGroupSeparatorCreateFileInfoIterator.ctor.cctordotNetProtectorget_IsConstructorPropertyDescriptorCreateDecryptorIntPtr_strHaveHour
Source: roaming.exe.9.drString found in binary or memory: dotNetProtector
Source: roaming.exe.9.drString found in binary or memory: qMinHebrewYearWriteTinyHeaderMD5CryptoServiceProviderTripleDESCryptoServiceProviderMethodBuilderModuleBuilderTypeBuilderAssemblyBuilderSpecialFolderShfolderBufferlpBfdsdhsdsdsfufferResourceManagerDebuggerIsTrueQuantifierStringResultHandlerClassLayoutUserTypeNameParserFileStyleUriParserStreamWriterget_IsPointerRecursionCounterBitConverterNativeRegisterRegisterrpbAikrGetTokenForFloorset_RedirectStandardErrorCurrencyGroupSeparatorCreateFileInfoIterator.ctor.cctordotNetProtectorget_IsConstructorPropertyDescriptorCreateDecryptorIntPtr_strHaveHour
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.6.unpack, B.cs.Net Code: PL System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.12.unpack, B.cs.Net Code: PL System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.10.unpack, B.cs.Net Code: PL System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.4.unpack, B.cs.Net Code: PL System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 5.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.0.unpack, B.cs.Net Code: PL System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.8.unpack, B.cs.Net Code: PL System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 0_2_01074BC1 push ebx; ret
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 0_2_00B190D5 pushad ; iretd
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 0_2_00B19077 push eax; iretd
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 0_2_04BF57A9 push edx; iretd
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 0_2_04BFDBFC push eax; ret
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 0_2_04BFB9F4 push ebp; retn 0041h
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 0_2_04BFB26B push ebx; ret
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 5_2_01074BC1 push ebx; ret
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_00064BC1 push ebx; ret
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_028990D5 pushad ; iretd
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_04E40894 push esp; iretd
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_04F2B9F4 push ebp; retn 0041h
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_04F2DBFC push eax; ret
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_04F2B26B push ebx; ret
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_04F257A9 push edx; iretd
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 23_2_04F4A9C5 pushad ; retf 0040h
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeCode function: 27_2_00064BC1 push ebx; ret
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\roaming\roaming.exeJump to dropped file

Boot Survival

barindex
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe TID: 7124Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe TID: 6636Thread sleep count: 4009 > 30
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exe TID: 6964Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exe TID: 5112Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeWindow / User API: threadDelayed 4009
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess token adjusted: Debug
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess queried: DebugPort
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess queried: DebugPort
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeCode function: 5_2_0313F318 LdrInitializeThunk,
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeMemory allocated: page read and write | page guard

HIPS / PFW / Operating System Protection Evasion

barindex
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.6.unpack, B.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.6.unpack, LG.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.12.unpack, B.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.12.unpack, LG.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.10.unpack, B.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.10.unpack, LG.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.4.unpack, B.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.4.unpack, LG.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
Source: 5.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.0.unpack, B.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
Source: 5.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.0.unpack, LG.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.8.unpack, B.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
Source: 5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.8.unpack, LG.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeMemory written: C:\Users\user\AppData\Roaming\roaming\roaming.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe" "C:\Users\user\AppData\Roaming\roaming\roaming.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess created: C:\Users\user\AppData\Roaming\roaming\roaming.exe C:\Users\user\AppData\Roaming\roaming\roaming.exe
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\AppData\Roaming\roaming\roaming.exe" "C:\Users\user\AppData\Roaming\roaming\roaming.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f
Source: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe, 00000005.00000002.626367009.000000000339A000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe, 00000005.00000002.626219605.0000000003332000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe VolumeInformation
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe VolumeInformation
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeQueries volume information: C:\Users\user\AppData\Roaming\roaming\roaming.exe VolumeInformation
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeQueries volume information: C:\Users\user\AppData\Roaming\roaming\roaming.exe VolumeInformation
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\AppData\Roaming\roaming\roaming.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
1
Valid Accounts
1
Scheduled Task/Job
1
Valid Accounts
1
Valid Accounts
1
Masquerading
11
Input Capture
11
Security Software Discovery
Remote Services11
Input Capture
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Native API
1
Scheduled Task/Job
1
Access Token Manipulation
1
Valid Accounts
LSASS Memory1
Process Discovery
Remote Desktop Protocol1
Archive Collected Data
Exfiltration Over Bluetooth1
Non-Standard Port
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)112
Process Injection
1
Access Token Manipulation
Security Account Manager31
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Non-Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)1
Scheduled Task/Job
1
Disable or Modify Tools
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer1
Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script31
Virtualization/Sandbox Evasion
LSA Secrets1
Remote System Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common112
Process Injection
Cached Domain Credentials12
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup Items21
Obfuscated Files or Information
DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job11
Software Packing
Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 628657 Sample: SecuriteInfo.com.Trojan.Mar... Startdate: 17/05/2022 Architecture: WINDOWS Score: 96 54 Malicious sample detected (through community Yara rule) 2->54 56 Multi AV Scanner detection for submitted file 2->56 58 .NET source code contains potential unpacker 2->58 60 4 other signatures 2->60 7 SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe 2 2->7         started        11 roaming.exe 1 2->11         started        process3 file4 40 SecuriteInfo.com.T...MN.10.17168.exe.log, ASCII 7->40 dropped 62 Injects a PE file into a foreign processes 7->62 13 cmd.exe 3 7->13         started        16 cmd.exe 1 7->16         started        19 SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe 2 2 7->19         started        42 C:\Users\user\AppData\...\roaming.exe.log, ASCII 11->42 dropped 64 Multi AV Scanner detection for dropped file 11->64 66 Machine Learning detection for dropped file 11->66 22 cmd.exe 1 11->22         started        24 cmd.exe 1 11->24         started        26 roaming.exe 11->26         started        signatures5 process6 dnsIp7 44 C:\Users\user\AppData\Roaming\...\roaming.exe, PE32 13->44 dropped 46 C:\Users\user\...\roaming.exe:Zone.Identifier, ASCII 13->46 dropped 28 conhost.exe 13->28         started        52 Uses schtasks.exe or at.exe to add and modify task schedules 16->52 30 conhost.exe 16->30         started        32 schtasks.exe 1 16->32         started        48 anglekeys11.3utilities.com 104.250.238.66, 49768, 49769, 49771 CLOUD-SOUTHUS Reserved 19->48 50 192.168.2.1 unknown unknown 19->50 34 conhost.exe 22->34         started        36 schtasks.exe 1 22->36         started        38 conhost.exe 24->38         started        file8 signatures9 process10

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe41%ReversingLabsWin32.Trojan.Woreflint
SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\roaming\roaming.exe100%Joe Sandbox ML
C:\Users\user\AppData\Roaming\roaming\roaming.exe41%ReversingLabsWin32.Trojan.Woreflint
SourceDetectionScannerLabelLinkDownload
27.0.roaming.exe.400000.7.unpack100%AviraTR/Dropper.MSIL.GenDownload File
5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.GenDownload File
27.0.roaming.exe.400000.13.unpack100%AviraTR/Dropper.MSIL.GenDownload File
5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.GenDownload File
5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.GenDownload File
5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.GenDownload File
27.0.roaming.exe.400000.5.unpack100%AviraTR/Dropper.MSIL.GenDownload File
27.2.roaming.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.GenDownload File
5.2.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.GenDownload File
27.0.roaming.exe.400000.11.unpack100%AviraTR/Dropper.MSIL.GenDownload File
27.0.roaming.exe.400000.9.unpack100%AviraTR/Dropper.MSIL.GenDownload File
5.0.SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.GenDownload File
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
anglekeys11.3utilities.com
104.250.238.66
truefalse
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    104.250.238.66
    anglekeys11.3utilities.comReserved
    13886CLOUD-SOUTHUSfalse
    IP
    192.168.2.1
    Joe Sandbox Version:34.0.0 Boulder Opal
    Analysis ID:628657
    Start date and time: 17/05/202220:47:422022-05-17 20:47:42 +02:00
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 11m 59s
    Hypervisor based Inspection enabled:false
    Report type:light
    Sample file name:SecuriteInfo.com.Trojan.Mardom.MN.10.17168.22190 (renamed file extension from 22190 to exe)
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:33
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal96.spyw.evad.winEXE@22/4@39/2
    EGA Information:
    • Successful, ratio: 75%
    HDC Information:
    • Successful, ratio: 1.8% (good quality ratio 1.6%)
    • Quality average: 68.4%
    • Quality standard deviation: 24.5%
    HCA Information:
    • Successful, ratio: 99%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
    • TCP Packets have been reduced to 100
    • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
    • Execution Graph export aborted for target roaming.exe, PID 4244 because it is empty
    • Not all processes where analyzed, report is missing behavior information
    • Report creation exceeded maximum time and may have missing disassembly code information.
    • Report size exceeded maximum capacity and may have missing behavior information.
    • Report size getting too big, too many NtDeviceIoControlFile calls found.
    • VT rate limit hit for: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe
    TimeTypeDescription
    20:49:12Task SchedulerRun new task: Nafifas path: "C:\Users\user\AppData\Roaming\roaming\roaming.exe"
    20:49:18API Interceptor38x Sleep call for process: SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):520
    Entropy (8bit):5.345981753770044
    Encrypted:false
    SSDEEP:12:Q3La/KDLI4MWuPk21rkvoDLI4MWuCOKbbDLI4MWuPJKiUrRZ9I0ZKhav:ML9E4Ks29E4KnKDE4KhK3VZ9pKhk
    MD5:CB16F02E4CEFD4F305114A67B4865184
    SHA1:7A481FAE100B554EB754816608A7776954863CFF
    SHA-256:0428AA69397DC9399FEBFB4293F8FD06202C8A3C2E9B3F841EBA2DE87DB9FC25
    SHA-512:1F96226886924B2F33578AB5F2B1306A77925FB86AC05615565C3F4EF7D93DB40F9ADD05CDA7F5435DEF58D1FEA1A33473EDDDAFFB0AF8161E73BC7CDBEAEF47
    Malicious:true
    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
    Process:C:\Users\user\AppData\Roaming\roaming\roaming.exe
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):520
    Entropy (8bit):5.345981753770044
    Encrypted:false
    SSDEEP:12:Q3La/KDLI4MWuPk21rkvoDLI4MWuCOKbbDLI4MWuPJKiUrRZ9I0ZKhav:ML9E4Ks29E4KnKDE4KhK3VZ9pKhk
    MD5:CB16F02E4CEFD4F305114A67B4865184
    SHA1:7A481FAE100B554EB754816608A7776954863CFF
    SHA-256:0428AA69397DC9399FEBFB4293F8FD06202C8A3C2E9B3F841EBA2DE87DB9FC25
    SHA-512:1F96226886924B2F33578AB5F2B1306A77925FB86AC05615565C3F4EF7D93DB40F9ADD05CDA7F5435DEF58D1FEA1A33473EDDDAFFB0AF8161E73BC7CDBEAEF47
    Malicious:true
    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
    Process:C:\Windows\SysWOW64\cmd.exe
    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
    Category:dropped
    Size (bytes):449536
    Entropy (8bit):5.347530705213381
    Encrypted:false
    SSDEEP:6144:KqTkAQke6JRA6nGojT5W4bsirKOVbvJdCG:KwNQkHm6nGXOg
    MD5:29C19B486AF12BE2B5CD16D74105BF8E
    SHA1:AF1DE887BA5EBA69D72EA84020F1FBA9A88D307B
    SHA-256:AAA959BAA655FA3B2225252A1F8052BB189989911686D6482E45D6E0BDF1B829
    SHA-512:D28DC17037DF45C078993C73FFDCBBE854AC7E1852AD1A1091A5175E2E50AE7552EEF89EA4628166CC197949A1F338A76B269C652647E06EE1F33BD2CBFC2F13
    Malicious:true
    Antivirus:
    • Antivirus: Joe Sandbox ML, Detection: 100%
    • Antivirus: ReversingLabs, Detection: 41%
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....b.................T...........s... ........@.. .......................@......2.....@..................................s..K.......^.................... ....................................................... ............... ..H............text....S... ...T.................. ..`.rsrc...^............V..............@..@.reloc....... ......................@..B.................s......H..................0....D...x............................................,.~&...(....&~'...r}C.p(....~'...r.C.p(....*..(....*..,.~(...(....&~'...r.C.p(....~'...r.D.p(....*..-.*(....&*2~{....(....*..(....*.*..{....*..{....*:~.......(....*..{....*..{....*:~.......(....*..{....*6~......(....*..{....*..{....*..{....*..{....*..{....*..(....... ...3 ;.@]aiZ.#....4..#........Y(i...Z}....*..{....*.~....(....*..{....*.~....(....*..{....*..{....*.~+...(....*..{....*..{....*...0..;...
    Process:C:\Windows\SysWOW64\cmd.exe
    File Type:ASCII text, with CRLF line terminators
    Category:modified
    Size (bytes):26
    Entropy (8bit):3.95006375643621
    Encrypted:false
    SSDEEP:3:ggPYV:rPYV
    MD5:187F488E27DB4AF347237FE461A079AD
    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
    Malicious:true
    Preview:[ZoneTransfer]....ZoneId=0
    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
    Entropy (8bit):5.347530705213381
    TrID:
    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    • Win32 Executable (generic) a (10002005/4) 49.78%
    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
    • Generic Win/DOS Executable (2004/3) 0.01%
    • DOS Executable Generic (2002/1) 0.01%
    File name:SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe
    File size:449536
    MD5:29c19b486af12be2b5cd16d74105bf8e
    SHA1:af1de887ba5eba69d72ea84020f1fba9a88d307b
    SHA256:aaa959baa655fa3b2225252a1f8052bb189989911686d6482e45d6e0bdf1b829
    SHA512:d28dc17037df45c078993c73ffdcbbe854ac7e1852ad1a1091a5175e2e50ae7552eef89ea4628166cc197949a1f338a76b269c652647e06ee1f33bd2cbfc2f13
    SSDEEP:6144:KqTkAQke6JRA6nGojT5W4bsirKOVbvJdCG:KwNQkHm6nGXOg
    TLSH:2DA4CDDC3A458962EE2E8C34CE04CBE56B93BE03214D75B75BEE11C6475E86398C5ACC
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b.................T...........s... ........@.. .......................@......2.....@................................
    Icon Hash:e8b0e06c6de8c4e8
    Entrypoint:0x4473ee
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0x628399C6 [Tue May 17 12:49:10 2022 UTC]
    TLS Callbacks:
    CLR (.Net) Version:v4.0.30319
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
    Instruction
    jmp dword ptr [00402000h]
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x473a00x4b.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x480000x2835e.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x720000xc.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x20000x453f40x45400False0.393977747067data5.44707584046IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    .rsrc0x480000x2835e0x28400False0.0654964091615data3.64922871351IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x720000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountry
    BMBMD0x486840xdASCII text, with no line terminatorsEnglishUnited States
    CFAGO0x486940xdASCII text, with no line terminatorsEnglishUnited States
    FMKDH0x486a40xdASCII text, with no line terminatorsEnglishUnited States
    IBDHE0x486b40xdASCII text, with no line terminatorsEnglishUnited States
    JKKFK0x486c40xdASCII text, with no line terminatorsEnglishUnited States
    JMNEM0x486d40xdASCII text, with no line terminatorsEnglishUnited States
    JNDIK0x486e40xdASCII text, with no line terminatorsEnglishUnited States
    JNHDK0x486f40xdASCII text, with no line terminatorsEnglishUnited States
    KFODF0x487040xdASCII text, with no line terminatorsEnglishUnited States
    PLHES0x487140xdASCII text, with no line terminatorsEnglishUnited States
    RFCDM0x487240xdASCII text, with no line terminatorsEnglishUnited States
    SANCI0x487340xdASCII text, with no line terminatorsEnglishUnited States
    RT_ICON0x487440x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0
    RT_ICON0x58f6c0x94a8data
    RT_ICON0x624140x5488data
    RT_ICON0x6789c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 64767, next used block 4282318848
    RT_ICON0x6bac40x25a8data
    RT_ICON0x6e06c0x10a8data
    RT_ICON0x6f1140x988data
    RT_ICON0x6fa9c0x468GLS_BINARY_LSB_FIRST
    RT_GROUP_ICON0x6ff040x76data
    RT_VERSION0x6ff7c0x1f8dataEnglishUnited States
    RT_MANIFEST0x701740x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
    DLLImport
    mscoree.dll_CorExeMain
    DescriptionData
    LegalCopyright
    FileVersion, , ,
    CompanyName
    Comments
    ProductName
    ProductVersion, , ,
    FileDescription
    Translation0x0409 0x04b0
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    • Total Packets: 89
    • 5552 undefined
    • 53 (DNS)
    TimestampSource PortDest PortSource IPDest IP
    May 17, 2022 20:49:17.073599100 CEST497685552192.168.2.6104.250.238.66
    May 17, 2022 20:49:17.265693903 CEST555249768104.250.238.66192.168.2.6
    May 17, 2022 20:49:17.775856972 CEST497685552192.168.2.6104.250.238.66
    May 17, 2022 20:49:17.967212915 CEST555249768104.250.238.66192.168.2.6
    May 17, 2022 20:49:18.479013920 CEST497685552192.168.2.6104.250.238.66
    May 17, 2022 20:49:18.671283960 CEST555249768104.250.238.66192.168.2.6
    May 17, 2022 20:49:18.821175098 CEST497695552192.168.2.6104.250.238.66
    May 17, 2022 20:49:19.014730930 CEST555249769104.250.238.66192.168.2.6
    May 17, 2022 20:49:19.557296991 CEST497695552192.168.2.6104.250.238.66
    May 17, 2022 20:49:19.749164104 CEST555249769104.250.238.66192.168.2.6
    May 17, 2022 20:49:20.354226112 CEST497695552192.168.2.6104.250.238.66
    May 17, 2022 20:49:20.549035072 CEST555249769104.250.238.66192.168.2.6
    May 17, 2022 20:49:20.762876034 CEST497715552192.168.2.6104.250.238.66
    May 17, 2022 20:49:20.954544067 CEST555249771104.250.238.66192.168.2.6
    May 17, 2022 20:49:21.604331017 CEST497715552192.168.2.6104.250.238.66
    May 17, 2022 20:49:21.796752930 CEST555249771104.250.238.66192.168.2.6
    May 17, 2022 20:49:22.401336908 CEST497715552192.168.2.6104.250.238.66
    May 17, 2022 20:49:22.595947027 CEST555249771104.250.238.66192.168.2.6
    May 17, 2022 20:49:22.788963079 CEST497745552192.168.2.6104.250.238.66
    May 17, 2022 20:49:22.984390020 CEST555249774104.250.238.66192.168.2.6
    May 17, 2022 20:49:23.557631016 CEST497745552192.168.2.6104.250.238.66
    May 17, 2022 20:49:23.750130892 CEST555249774104.250.238.66192.168.2.6
    May 17, 2022 20:49:24.354554892 CEST497745552192.168.2.6104.250.238.66
    May 17, 2022 20:49:24.546391010 CEST555249774104.250.238.66192.168.2.6
    May 17, 2022 20:49:26.083332062 CEST497755552192.168.2.6104.250.238.66
    May 17, 2022 20:49:26.274569035 CEST555249775104.250.238.66192.168.2.6
    May 17, 2022 20:49:26.799226999 CEST497755552192.168.2.6104.250.238.66
    May 17, 2022 20:49:26.990642071 CEST555249775104.250.238.66192.168.2.6
    May 17, 2022 20:49:27.604856014 CEST497755552192.168.2.6104.250.238.66
    May 17, 2022 20:49:27.795803070 CEST555249775104.250.238.66192.168.2.6
    May 17, 2022 20:49:27.939872026 CEST497765552192.168.2.6104.250.238.66
    May 17, 2022 20:49:28.131268024 CEST555249776104.250.238.66192.168.2.6
    May 17, 2022 20:49:28.792418957 CEST497765552192.168.2.6104.250.238.66
    May 17, 2022 20:49:28.983421087 CEST555249776104.250.238.66192.168.2.6
    May 17, 2022 20:49:29.605003119 CEST497765552192.168.2.6104.250.238.66
    May 17, 2022 20:49:29.796561003 CEST555249776104.250.238.66192.168.2.6
    May 17, 2022 20:49:30.044060946 CEST497775552192.168.2.6104.250.238.66
    May 17, 2022 20:49:30.235666037 CEST555249777104.250.238.66192.168.2.6
    May 17, 2022 20:49:30.745712996 CEST497775552192.168.2.6104.250.238.66
    May 17, 2022 20:49:30.940150976 CEST555249777104.250.238.66192.168.2.6
    May 17, 2022 20:49:31.558324099 CEST497775552192.168.2.6104.250.238.66
    May 17, 2022 20:49:31.751940012 CEST555249777104.250.238.66192.168.2.6
    May 17, 2022 20:49:31.884510994 CEST497785552192.168.2.6104.250.238.66
    May 17, 2022 20:49:32.076971054 CEST555249778104.250.238.66192.168.2.6
    May 17, 2022 20:49:32.745954037 CEST497785552192.168.2.6104.250.238.66
    May 17, 2022 20:49:32.939363956 CEST555249778104.250.238.66192.168.2.6
    May 17, 2022 20:49:33.558475018 CEST497785552192.168.2.6104.250.238.66
    May 17, 2022 20:49:33.750824928 CEST555249778104.250.238.66192.168.2.6
    May 17, 2022 20:49:33.983361959 CEST497815552192.168.2.6104.250.238.66
    May 17, 2022 20:49:34.175708055 CEST555249781104.250.238.66192.168.2.6
    May 17, 2022 20:49:34.746057034 CEST497815552192.168.2.6104.250.238.66
    May 17, 2022 20:49:34.938884020 CEST555249781104.250.238.66192.168.2.6
    May 17, 2022 20:49:35.558646917 CEST497815552192.168.2.6104.250.238.66
    May 17, 2022 20:49:35.751554966 CEST555249781104.250.238.66192.168.2.6
    May 17, 2022 20:49:35.883851051 CEST497825552192.168.2.6104.250.238.66
    May 17, 2022 20:49:36.076284885 CEST555249782104.250.238.66192.168.2.6
    May 17, 2022 20:49:36.668829918 CEST497825552192.168.2.6104.250.238.66
    May 17, 2022 20:49:36.861582994 CEST555249782104.250.238.66192.168.2.6
    May 17, 2022 20:49:37.558872938 CEST497825552192.168.2.6104.250.238.66
    May 17, 2022 20:49:37.754796028 CEST555249782104.250.238.66192.168.2.6
    May 17, 2022 20:49:37.999089003 CEST497855552192.168.2.6104.250.238.66
    May 17, 2022 20:49:38.194361925 CEST555249785104.250.238.66192.168.2.6
    May 17, 2022 20:49:38.746368885 CEST497855552192.168.2.6104.250.238.66
    May 17, 2022 20:49:38.938764095 CEST555249785104.250.238.66192.168.2.6
    May 17, 2022 20:49:39.558975935 CEST497855552192.168.2.6104.250.238.66
    May 17, 2022 20:49:39.751261950 CEST555249785104.250.238.66192.168.2.6
    May 17, 2022 20:49:39.883466959 CEST497895552192.168.2.6104.250.238.66
    May 17, 2022 20:49:40.079190016 CEST555249789104.250.238.66192.168.2.6
    May 17, 2022 20:49:40.746591091 CEST497895552192.168.2.6104.250.238.66
    May 17, 2022 20:49:40.937428951 CEST555249789104.250.238.66192.168.2.6
    May 17, 2022 20:49:41.559144020 CEST497895552192.168.2.6104.250.238.66
    May 17, 2022 20:49:41.750462055 CEST555249789104.250.238.66192.168.2.6
    May 17, 2022 20:49:42.244009018 CEST497905552192.168.2.6104.250.238.66
    May 17, 2022 20:49:42.435246944 CEST555249790104.250.238.66192.168.2.6
    May 17, 2022 20:49:43.059248924 CEST497905552192.168.2.6104.250.238.66
    May 17, 2022 20:49:43.250402927 CEST555249790104.250.238.66192.168.2.6
    May 17, 2022 20:49:43.856242895 CEST497905552192.168.2.6104.250.238.66
    May 17, 2022 20:49:44.047269106 CEST555249790104.250.238.66192.168.2.6
    May 17, 2022 20:49:45.033214092 CEST497915552192.168.2.6104.250.238.66
    May 17, 2022 20:49:45.226063967 CEST555249791104.250.238.66192.168.2.6
    May 17, 2022 20:49:45.762605906 CEST497915552192.168.2.6104.250.238.66
    May 17, 2022 20:49:45.954878092 CEST555249791104.250.238.66192.168.2.6
    May 17, 2022 20:49:46.465833902 CEST497915552192.168.2.6104.250.238.66
    May 17, 2022 20:49:46.657638073 CEST555249791104.250.238.66192.168.2.6
    May 17, 2022 20:49:46.871876955 CEST497935552192.168.2.6104.250.238.66
    May 17, 2022 20:49:47.063222885 CEST555249793104.250.238.66192.168.2.6
    May 17, 2022 20:49:47.653441906 CEST497935552192.168.2.6104.250.238.66
    May 17, 2022 20:49:47.845843077 CEST555249793104.250.238.66192.168.2.6
    May 17, 2022 20:49:48.363296032 CEST497935552192.168.2.6104.250.238.66
    May 17, 2022 20:49:48.560126066 CEST555249793104.250.238.66192.168.2.6
    May 17, 2022 20:49:48.696625948 CEST497945552192.168.2.6104.250.238.66
    May 17, 2022 20:49:48.888470888 CEST555249794104.250.238.66192.168.2.6
    May 17, 2022 20:49:49.470087051 CEST497945552192.168.2.6104.250.238.66
    May 17, 2022 20:49:49.661030054 CEST555249794104.250.238.66192.168.2.6
    May 17, 2022 20:49:50.263017893 CEST497945552192.168.2.6104.250.238.66
    May 17, 2022 20:49:50.454238892 CEST555249794104.250.238.66192.168.2.6
    May 17, 2022 20:49:50.721733093 CEST497995552192.168.2.6104.250.238.66
    May 17, 2022 20:49:50.913628101 CEST555249799104.250.238.66192.168.2.6
    May 17, 2022 20:49:51.450794935 CEST497995552192.168.2.6104.250.238.66
    May 17, 2022 20:49:51.642237902 CEST555249799104.250.238.66192.168.2.6
    TimestampSource PortDest PortSource IPDest IP
    May 17, 2022 20:49:17.045411110 CEST6035053192.168.2.68.8.8.8
    May 17, 2022 20:49:17.066694975 CEST53603508.8.8.8192.168.2.6
    May 17, 2022 20:49:18.798120975 CEST5174853192.168.2.68.8.8.8
    May 17, 2022 20:49:18.819116116 CEST53517488.8.8.8192.168.2.6
    May 17, 2022 20:49:20.737488031 CEST4969553192.168.2.68.8.8.8
    May 17, 2022 20:49:20.761272907 CEST53496958.8.8.8192.168.2.6
    May 17, 2022 20:49:22.740173101 CEST6160753192.168.2.68.8.8.8
    May 17, 2022 20:49:22.759896040 CEST53616078.8.8.8192.168.2.6
    May 17, 2022 20:49:26.062243938 CEST5655053192.168.2.68.8.8.8
    May 17, 2022 20:49:26.081792116 CEST53565508.8.8.8192.168.2.6
    May 17, 2022 20:49:27.918045998 CEST5285853192.168.2.68.8.8.8
    May 17, 2022 20:49:27.937510014 CEST53528588.8.8.8192.168.2.6
    May 17, 2022 20:49:30.022228003 CEST5002953192.168.2.68.8.8.8
    May 17, 2022 20:49:30.042073965 CEST53500298.8.8.8192.168.2.6
    May 17, 2022 20:49:31.865009069 CEST5987153192.168.2.68.8.8.8
    May 17, 2022 20:49:31.882610083 CEST53598718.8.8.8192.168.2.6
    May 17, 2022 20:49:33.961075068 CEST5703753192.168.2.68.8.8.8
    May 17, 2022 20:49:33.980600119 CEST53570378.8.8.8192.168.2.6
    May 17, 2022 20:49:35.863197088 CEST6060953192.168.2.68.8.8.8
    May 17, 2022 20:49:35.882124901 CEST53606098.8.8.8192.168.2.6
    May 17, 2022 20:49:37.977292061 CEST5401553192.168.2.68.8.8.8
    May 17, 2022 20:49:37.997297049 CEST53540158.8.8.8192.168.2.6
    May 17, 2022 20:49:39.862668037 CEST5448953192.168.2.68.8.8.8
    May 17, 2022 20:49:39.882005930 CEST53544898.8.8.8192.168.2.6
    May 17, 2022 20:49:42.221235991 CEST5269853192.168.2.68.8.8.8
    May 17, 2022 20:49:42.242500067 CEST53526988.8.8.8192.168.2.6
    May 17, 2022 20:49:45.007783890 CEST5382953192.168.2.68.8.8.8
    May 17, 2022 20:49:45.029057026 CEST53538298.8.8.8192.168.2.6
    May 17, 2022 20:49:46.850269079 CEST5868953192.168.2.68.8.8.8
    May 17, 2022 20:49:46.869879007 CEST53586898.8.8.8192.168.2.6
    May 17, 2022 20:49:48.675764084 CEST5008153192.168.2.68.8.8.8
    May 17, 2022 20:49:48.695035934 CEST53500818.8.8.8192.168.2.6
    May 17, 2022 20:49:50.698481083 CEST6552653192.168.2.68.8.8.8
    May 17, 2022 20:49:50.719392061 CEST53655268.8.8.8192.168.2.6
    May 17, 2022 20:49:52.503679037 CEST5296553192.168.2.68.8.8.8
    May 17, 2022 20:49:52.524297953 CEST53529658.8.8.8192.168.2.6
    May 17, 2022 20:49:54.507745028 CEST5212553192.168.2.68.8.8.8
    May 17, 2022 20:49:54.525068045 CEST53521258.8.8.8192.168.2.6
    May 17, 2022 20:49:56.378643990 CEST5508353192.168.2.68.8.8.8
    May 17, 2022 20:49:56.398061037 CEST53550838.8.8.8192.168.2.6
    May 17, 2022 20:49:58.252378941 CEST5607153192.168.2.68.8.8.8
    May 17, 2022 20:49:58.271869898 CEST53560718.8.8.8192.168.2.6
    May 17, 2022 20:50:00.619097948 CEST5317053192.168.2.68.8.8.8
    May 17, 2022 20:50:00.639024973 CEST53531708.8.8.8192.168.2.6
    May 17, 2022 20:50:04.856456995 CEST6454453192.168.2.68.8.8.8
    May 17, 2022 20:50:04.875591040 CEST53645448.8.8.8192.168.2.6
    May 17, 2022 20:50:06.865632057 CEST6377153192.168.2.68.8.8.8
    May 17, 2022 20:50:06.884969950 CEST53637718.8.8.8192.168.2.6
    May 17, 2022 20:50:08.928145885 CEST5534253192.168.2.68.8.8.8
    May 17, 2022 20:50:08.947736025 CEST53553428.8.8.8192.168.2.6
    May 17, 2022 20:50:24.891429901 CEST6499553192.168.2.68.8.8.8
    May 17, 2022 20:50:24.910933018 CEST53649958.8.8.8192.168.2.6
    May 17, 2022 20:50:26.781111002 CEST5762953192.168.2.68.8.8.8
    May 17, 2022 20:50:26.802314997 CEST53576298.8.8.8192.168.2.6
    May 17, 2022 20:50:29.143615007 CEST5045353192.168.2.68.8.8.8
    May 17, 2022 20:50:29.162911892 CEST53504538.8.8.8192.168.2.6
    May 17, 2022 20:50:30.952631950 CEST5574553192.168.2.68.8.8.8
    May 17, 2022 20:50:30.970324039 CEST53557458.8.8.8192.168.2.6
    May 17, 2022 20:50:32.951894045 CEST6437553192.168.2.68.8.8.8
    May 17, 2022 20:50:32.971400976 CEST53643758.8.8.8192.168.2.6
    May 17, 2022 20:50:34.972531080 CEST6384453192.168.2.68.8.8.8
    May 17, 2022 20:50:34.993850946 CEST53638448.8.8.8192.168.2.6
    May 17, 2022 20:50:36.942893028 CEST5726953192.168.2.68.8.8.8
    May 17, 2022 20:50:36.960410118 CEST53572698.8.8.8192.168.2.6
    May 17, 2022 20:50:38.766648054 CEST5164553192.168.2.68.8.8.8
    May 17, 2022 20:50:38.784041882 CEST53516458.8.8.8192.168.2.6
    May 17, 2022 20:50:40.801650047 CEST6501053192.168.2.68.8.8.8
    May 17, 2022 20:50:40.822791100 CEST53650108.8.8.8192.168.2.6
    May 17, 2022 20:50:44.063421965 CEST4928753192.168.2.68.8.8.8
    May 17, 2022 20:50:44.082752943 CEST53492878.8.8.8192.168.2.6
    May 17, 2022 20:50:46.110245943 CEST5188453192.168.2.68.8.8.8
    May 17, 2022 20:50:46.131514072 CEST53518848.8.8.8192.168.2.6
    May 17, 2022 20:50:47.974157095 CEST6444253192.168.2.68.8.8.8
    May 17, 2022 20:50:47.991703987 CEST53644428.8.8.8192.168.2.6
    May 17, 2022 20:50:49.827730894 CEST5614653192.168.2.68.8.8.8
    May 17, 2022 20:50:49.845042944 CEST53561468.8.8.8192.168.2.6
    May 17, 2022 20:50:51.770347118 CEST5786153192.168.2.68.8.8.8
    May 17, 2022 20:50:51.790035009 CEST53578618.8.8.8192.168.2.6
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
    May 17, 2022 20:49:17.045411110 CEST192.168.2.68.8.8.80xe96dStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:18.798120975 CEST192.168.2.68.8.8.80xfeb5Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:20.737488031 CEST192.168.2.68.8.8.80x1304Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:22.740173101 CEST192.168.2.68.8.8.80x9c7bStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:26.062243938 CEST192.168.2.68.8.8.80x6177Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:27.918045998 CEST192.168.2.68.8.8.80x7baStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:30.022228003 CEST192.168.2.68.8.8.80xf906Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:31.865009069 CEST192.168.2.68.8.8.80x96ddStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:33.961075068 CEST192.168.2.68.8.8.80x9abStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:35.863197088 CEST192.168.2.68.8.8.80x50bStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:37.977292061 CEST192.168.2.68.8.8.80x6e11Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:39.862668037 CEST192.168.2.68.8.8.80xc548Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:42.221235991 CEST192.168.2.68.8.8.80xe674Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:45.007783890 CEST192.168.2.68.8.8.80xba7cStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:46.850269079 CEST192.168.2.68.8.8.80xea6eStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:48.675764084 CEST192.168.2.68.8.8.80x5b4bStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:50.698481083 CEST192.168.2.68.8.8.80x10aStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:52.503679037 CEST192.168.2.68.8.8.80x9184Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:54.507745028 CEST192.168.2.68.8.8.80x6abcStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:56.378643990 CEST192.168.2.68.8.8.80xe8eeStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:49:58.252378941 CEST192.168.2.68.8.8.80x71edStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:50:00.619097948 CEST192.168.2.68.8.8.80xc0a3Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:50:04.856456995 CEST192.168.2.68.8.8.80x2517Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:50:06.865632057 CEST192.168.2.68.8.8.80xfe4fStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:50:08.928145885 CEST192.168.2.68.8.8.80xec7bStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:50:24.891429901 CEST192.168.2.68.8.8.80x93e5Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:50:26.781111002 CEST192.168.2.68.8.8.80xcae6Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:50:29.143615007 CEST192.168.2.68.8.8.80x137bStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:50:30.952631950 CEST192.168.2.68.8.8.80x8cf8Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:50:32.951894045 CEST192.168.2.68.8.8.80xd58dStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:50:34.972531080 CEST192.168.2.68.8.8.80x8fa7Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:50:36.942893028 CEST192.168.2.68.8.8.80x8683Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:50:38.766648054 CEST192.168.2.68.8.8.80x7d19Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:50:40.801650047 CEST192.168.2.68.8.8.80xd4eStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:50:44.063421965 CEST192.168.2.68.8.8.80x63e7Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:50:46.110245943 CEST192.168.2.68.8.8.80xf114Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:50:47.974157095 CEST192.168.2.68.8.8.80xd56fStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:50:49.827730894 CEST192.168.2.68.8.8.80xc3fdStandard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    May 17, 2022 20:50:51.770347118 CEST192.168.2.68.8.8.80x8b16Standard query (0)anglekeys11.3utilities.comA (IP address)IN (0x0001)
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
    May 17, 2022 20:49:17.066694975 CEST8.8.8.8192.168.2.60xe96dNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:18.819116116 CEST8.8.8.8192.168.2.60xfeb5No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:20.761272907 CEST8.8.8.8192.168.2.60x1304No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:22.759896040 CEST8.8.8.8192.168.2.60x9c7bNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:26.081792116 CEST8.8.8.8192.168.2.60x6177No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:27.937510014 CEST8.8.8.8192.168.2.60x7baNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:30.042073965 CEST8.8.8.8192.168.2.60xf906No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:31.882610083 CEST8.8.8.8192.168.2.60x96ddNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:33.980600119 CEST8.8.8.8192.168.2.60x9abNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:35.882124901 CEST8.8.8.8192.168.2.60x50bNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:37.997297049 CEST8.8.8.8192.168.2.60x6e11No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:39.882005930 CEST8.8.8.8192.168.2.60xc548No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:42.242500067 CEST8.8.8.8192.168.2.60xe674No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:45.029057026 CEST8.8.8.8192.168.2.60xba7cNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:46.869879007 CEST8.8.8.8192.168.2.60xea6eNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:48.695035934 CEST8.8.8.8192.168.2.60x5b4bNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:50.719392061 CEST8.8.8.8192.168.2.60x10aNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:52.524297953 CEST8.8.8.8192.168.2.60x9184No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:54.525068045 CEST8.8.8.8192.168.2.60x6abcNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:56.398061037 CEST8.8.8.8192.168.2.60xe8eeNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:49:58.271869898 CEST8.8.8.8192.168.2.60x71edNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:50:00.639024973 CEST8.8.8.8192.168.2.60xc0a3No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:50:04.875591040 CEST8.8.8.8192.168.2.60x2517No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:50:06.884969950 CEST8.8.8.8192.168.2.60xfe4fNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:50:08.947736025 CEST8.8.8.8192.168.2.60xec7bNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:50:24.910933018 CEST8.8.8.8192.168.2.60x93e5No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:50:26.802314997 CEST8.8.8.8192.168.2.60xcae6No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:50:29.162911892 CEST8.8.8.8192.168.2.60x137bNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:50:30.970324039 CEST8.8.8.8192.168.2.60x8cf8No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:50:32.971400976 CEST8.8.8.8192.168.2.60xd58dNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:50:34.993850946 CEST8.8.8.8192.168.2.60x8fa7No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:50:36.960410118 CEST8.8.8.8192.168.2.60x8683No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:50:38.784041882 CEST8.8.8.8192.168.2.60x7d19No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:50:40.822791100 CEST8.8.8.8192.168.2.60xd4eNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:50:44.082752943 CEST8.8.8.8192.168.2.60x63e7No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:50:46.131514072 CEST8.8.8.8192.168.2.60xf114No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:50:47.991703987 CEST8.8.8.8192.168.2.60xd56fNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:50:49.845042944 CEST8.8.8.8192.168.2.60xc3fdNo error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    May 17, 2022 20:50:51.790035009 CEST8.8.8.8192.168.2.60x8b16No error (0)anglekeys11.3utilities.com104.250.238.66A (IP address)IN (0x0001)
    Target ID:0
    Start time:20:48:48
    Start date:17/05/2022
    Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe"
    Imagebase:0x1070000
    File size:449536 bytes
    MD5 hash:29C19B486AF12BE2B5CD16D74105BF8E
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:.Net C# or VB.NET
    Reputation:low

    Target ID:5
    Start time:20:49:07
    Start date:17/05/2022
    Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe
    Wow64 process (32bit):true
    Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe
    Imagebase:0x1070000
    File size:449536 bytes
    MD5 hash:29C19B486AF12BE2B5CD16D74105BF8E
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:.Net C# or VB.NET
    Reputation:low

    Target ID:6
    Start time:20:49:10
    Start date:17/05/2022
    Path:C:\Windows\SysWOW64\cmd.exe
    Wow64 process (32bit):true
    Commandline:"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f
    Imagebase:0xed0000
    File size:232960 bytes
    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

    Target ID:7
    Start time:20:49:11
    Start date:17/05/2022
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff6406f0000
    File size:625664 bytes
    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:8
    Start time:20:49:11
    Start date:17/05/2022
    Path:C:\Windows\SysWOW64\schtasks.exe
    Wow64 process (32bit):true
    Commandline:schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f
    Imagebase:0x1c0000
    File size:185856 bytes
    MD5 hash:15FF7D8324231381BAD48A052F85DF04
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

    Target ID:9
    Start time:20:49:12
    Start date:17/05/2022
    Path:C:\Windows\SysWOW64\cmd.exe
    Wow64 process (32bit):true
    Commandline:cmd.exe" /C copy "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Mardom.MN.10.17168.exe" "C:\Users\user\AppData\Roaming\roaming\roaming.exe
    Imagebase:0xed0000
    File size:232960 bytes
    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:11
    Start time:20:49:13
    Start date:17/05/2022
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff6406f0000
    File size:625664 bytes
    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:23
    Start time:20:50:04
    Start date:17/05/2022
    Path:C:\Users\user\AppData\Roaming\roaming\roaming.exe
    Wow64 process (32bit):true
    Commandline:C:\Users\user\AppData\Roaming\roaming\roaming.exe
    Imagebase:0x60000
    File size:449536 bytes
    MD5 hash:29C19B486AF12BE2B5CD16D74105BF8E
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:.Net C# or VB.NET
    Antivirus matches:
    • Detection: 100%, Joe Sandbox ML
    • Detection: 41%, ReversingLabs
    Reputation:low

    Target ID:27
    Start time:20:50:29
    Start date:17/05/2022
    Path:C:\Users\user\AppData\Roaming\roaming\roaming.exe
    Wow64 process (32bit):true
    Commandline:C:\Users\user\AppData\Roaming\roaming\roaming.exe
    Imagebase:0x60000
    File size:449536 bytes
    MD5 hash:29C19B486AF12BE2B5CD16D74105BF8E
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:.Net C# or VB.NET
    Reputation:low

    Target ID:28
    Start time:20:50:32
    Start date:17/05/2022
    Path:C:\Windows\SysWOW64\cmd.exe
    Wow64 process (32bit):true
    Commandline:"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f
    Imagebase:0xed0000
    File size:232960 bytes
    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

    Target ID:29
    Start time:20:50:33
    Start date:17/05/2022
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff6406f0000
    File size:625664 bytes
    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:30
    Start time:20:50:33
    Start date:17/05/2022
    Path:C:\Windows\SysWOW64\schtasks.exe
    Wow64 process (32bit):true
    Commandline:schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\roaming\roaming.exe'" /f
    Imagebase:0x1c0000
    File size:185856 bytes
    MD5 hash:15FF7D8324231381BAD48A052F85DF04
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

    Target ID:31
    Start time:20:50:34
    Start date:17/05/2022
    Path:C:\Windows\SysWOW64\cmd.exe
    Wow64 process (32bit):true
    Commandline:cmd.exe" /C copy "C:\Users\user\AppData\Roaming\roaming\roaming.exe" "C:\Users\user\AppData\Roaming\roaming\roaming.exe
    Imagebase:0xed0000
    File size:232960 bytes
    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language

    Target ID:32
    Start time:20:50:36
    Start date:17/05/2022
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff6406f0000
    File size:625664 bytes
    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language

    No disassembly