Summary | ZeroBOX

Selap.exe

GhostCringe GhostRAT NSIS Malicious Library UPX PE File PE32
Category Machine Started Completed
FILE s1_win7_x6403_us Jan. 1, 2022, 7:48 p.m. Jan. 1, 2022, 7:53 p.m.
Size 223.4KB
Type PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5 aff7cf93b494c088fb991bebde49df9a
SHA256 ae5f6a5007c02c48f4bba3dd694c528f500f8e12ec106661149e4a3d1f678c8d
CRC32 F2617F78
ssdeep 6144:/QqaV8iAkW9+rk/BOtrgHyI/cXqUul/R0dPE1Nxw/:QVykk+YVy5hWRecPxw/
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
  • Win_Backdoor_GhostCringe_Zero - Win Backdoor GhostCringe
  • NSIS_Installer - Null Soft Installer

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
110.76.158.13 Active Moloch
110.76.158.75 Active Moloch

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
Host+0x14c @ 0x10002bfc

exception.instruction_r: 0f 3f 07 0b 85 db 0f 94 45 e4 5b eb 24 8b 45 ec
exception.exception_code: 0xc000001d
exception.symbol: Host-0x1307
exception.address: 0x100017a9
registers.esp: 1637528
registers.edi: 0
registers.eax: 1
registers.ebp: 1637580
registers.edx: 2130566132
registers.ebx: 0
registers.esi: 1988572373
registers.ecx: 2412
1 0 0

__exception__

stacktrace:
Host+0x155 @ 0x10002c05

exception.instruction_r: ed 81 fb 68 58 4d 56 0f 94 45 e4 5b 59 5a c7 45
exception.instruction: in eax, dx
exception.exception_code: 0xc0000096
exception.symbol: Host-0x1268
exception.address: 0x10001848
registers.esp: 1637528
registers.edi: 0
registers.eax: 1447909480
registers.ebp: 1637580
registers.edx: 22104
registers.ebx: 0
registers.esi: 1988572373
registers.ecx: 10
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2312
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73a01000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2312
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74d71000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2408
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x742d1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2408
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x742a1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2408
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74211000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2408
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75191000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2408
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75261000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2408
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74181000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2408
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74171000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2408
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74151000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2408
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73b11000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2408
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x10001000
process_handle: 0xffffffff
3221225713 0

NtProtectVirtualMemory

process_identifier: 2408
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 155648
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x100fa000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2408
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x10120000
process_handle: 0xffffffff
3221225713 0

NtAllocateVirtualMemory

process_identifier: 2408
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01d80000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72df1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x742d1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x742a1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74211000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74181000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74171000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74151000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73b11000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 942080
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x10001000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 217088
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x100e7000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 8982528
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x10000000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73b11000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 3653632
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x1011a000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 782336
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x10001000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00920000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00930000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00940000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00950000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00960000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c10000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 122880
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x10000000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
3221225496 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 122880
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c20000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72cd1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c20000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c50000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 45056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00f80000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00f80000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c50000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c50000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c50000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c50000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c50000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c50000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c50000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2636
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c50000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0
description server.exe tried to sleep 234 seconds, actually delayed analysis time by 234 seconds
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceExW

total_number_of_free_bytes: 10226057216
free_bytes_available: 10226057216
root_path: C:\
total_number_of_bytes: 34252779520
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 10226630656
free_bytes_available: 10226630656
root_path: C:\
total_number_of_bytes: 34252779520
1 1 0
file C:\Windows\Temp\Cacrk.exe
file C:\Program Files\Cacrk\Cacrk.dll
file C:\Windows\Temp\8848Diao.exe
file C:\Windows\Temp\server.exe
file C:\Windows\Temp\server.exe
file C:\Windows\Temp\Cacrk.exe
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2408
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 434176
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x10001000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@(º´ Í!¸LÍ!This program cannot be run in DOS mode. $LNáî ²î ²î ²gñ+²î ²gñ*²î ²>È*²Âî ²‹ò.²$î ²>È+²Tî ²sò,² î ²^ñ3²$î ²jñ3²î ²î!²¤ì ²‹æ}² î ²ôÎ2² î ²àñ+²iî ²àñ*²î ²î ²Sî ²Ïè&² î ²Richî ²PELóøß`à ðJ0`^Qp`Q@QԀQ`QÔ UPX0`€àUPX1ðJpðJ@à.rsrc0`Q$ôJ@À3.95UPX! v‡AåÃWöPòíJ@M&}
request_handle: 0x00cc000c
1 1 0
process server.exe
Time & API Arguments Status Return Repeated

Process32NextW

snapshot_handle: 0x00000144
process_name: Cacrk.exe
process_identifier: 6684769
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 7536688
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 3014768
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 7274573
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 5046390
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 6815859
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 6881397
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 7602277
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 6619235
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 4456552
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 7536758
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 6684769
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 4390992
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name:
process_identifier: 5439572
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 6619182
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 6553715
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 5046338
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 6619246
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 6750273
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 7471220
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 7733331
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 4980808
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 6619251
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 7864421
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 3342387
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 3014722
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name:
process_identifier: 7733362
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: 8848Diao.exe
process_identifier: 6553705
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 7602224
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 7536688
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 3014768
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 7274573
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 5046390
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 6815859
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 6881397
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 7602277
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 6619235
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 4456552
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 7536758
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 6684769
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 4390992
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name:
process_identifier: 5439572
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 6619182
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 6553715
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 5046338
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 6619246
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 6750273
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 7471220
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 7733331
0 0

Process32NextW

snapshot_handle: 0x00000358
process_name: pw.exe
process_identifier: 4980808
0 0
host 110.76.158.13
host 110.76.158.75
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXXE3539977 reg_value C:\Windows\XXXXXXE3539977\svchsot.exe
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
Host+0x155 @ 0x10002c05

exception.instruction_r: ed 81 fb 68 58 4d 56 0f 94 45 e4 5b 59 5a c7 45
exception.instruction: in eax, dx
exception.exception_code: 0xc0000096
exception.symbol: Host-0x1268
exception.address: 0x10001848
registers.esp: 1637528
registers.edi: 0
registers.eax: 1447909480
registers.ebp: 1637580
registers.edx: 22104
registers.ebx: 0
registers.esi: 1988572373
registers.ecx: 10
1 0 0
mutex AAAAAArq6vvbS1va6yp720sqmurq+xs58=
Lionic Trojan.Win32.Generic.luIV
Elastic malicious (high confidence)
Cynet Malicious (score: 99)
CAT-QuickHeal Trojan.Magania.18692
McAfee Artemis!AFF7CF93B494
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan-Downloader ( 0055e3da1 )
Alibaba Backdoor:Win32/Farfli.1b0b7f62
K7GW Trojan-Downloader ( 0055e3da1 )
CrowdStrike win/malicious_confidence_100% (W)
Arcabit Trojan.Generic.DA347
Baidu Win32.Trojan.Dialer.d
Cyren W32/Zegost.MYEI-4034
Symantec Backdoor.Trojan
ESET-NOD32 multiple detections
APEX Malicious
Paloalto generic.ml
ClamAV Win.Trojan.Farfli-9811912-0
Kaspersky Backdoor.Win32.Farfli.afgz
BitDefender MemScan:Trojan.GenericKDZ.41799
NANO-Antivirus Trojan.Win32.Dwn.eahibw
MicroWorld-eScan MemScan:Trojan.GenericKDZ.41799
Avast Win32:Malware-gen
Tencent Win32.Backdoor.Farfli.Lsvv
Ad-Aware MemScan:Trojan.GenericKDZ.41799
Sophos Mal/Generic-S
Comodo TrojWare.Win32.Agent.PDSB@4q3i1w
DrWeb Trojan.DownLoader19.23899
TrendMicro BKDR_ZEGOST.SM50
McAfee-GW-Edition BackDoor-EMA.gen.e
FireEye MemScan:Trojan.GenericKDZ.41799
Emsisoft MemScan:Trojan.GenericKDZ.41799 (B)
Ikarus Trojan.Win32.Farfli
Jiangmin Trojan/Dialer.mgr
eGambit Unsafe.AI_Score_99%
Avira HEUR/AGEN.1124319
Antiy-AVL Trojan/Generic.ASMalwS.17175DA
Kingsoft Win32.Heur.KVM005.a.(kcloud)
Microsoft Trojan:Win32/Farfli.MA!MTB
ViRobot Trojan.Win32.Z.Farfli.228777
GData Win32.Trojan-Downloader.Agent.WC
AhnLab-V3 Trojan/Win.Generic.R419237
BitDefenderTheta Gen:NN.ZexaF.34114.bq0@aOpfi5ob
ALYac MemScan:Trojan.GenericKDZ.41799
MAX malware (ai score=82)
VBA32 BScope.Trojan.Downloader
Malwarebytes Malware.AI.1781735438
TrendMicro-HouseCall BKDR_ZEGOST.SM50
Rising Trojan.Win32.Lebag.b (CLASSIC:mHprowbc8Vc29trPrwbMqQ)