Summary | ZeroBOX

sservc.exe

Hide_EXE Malicious Library UPX AntiDebug PE File OS Processor Check PE32 AntiVM
Category Machine Started Completed
FILE s1_win7_x6403_us Nov. 25, 2023, 5:53 p.m. Nov. 25, 2023, 5:58 p.m.
Size 1.9MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 4f17e0e8d7f6931d86bcef776619a2b5
SHA256 92f3c06a0ba8bc92f1a39521ad2979b86ce409fe9892e5f578e23a48fd8aef46
CRC32 2A55294B
ssdeep 49152:lu1Cicgvix2ooeL/DIk40DHN1Bl7BclwqyW:lusGIUeLhzxRyBv
PDB Path C:\lozuzovenahihe\pamelareyoy_xutemenuzud muyefiyo.pdb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
colaborativa.etc.br
aspmx2.googlemail.com 142.250.141.26
gspnet.it
MX mx.gspnet.it
89.46.105.48
gmp.br
71d5094d4da04584ea07f8dad8876a.mail.outlook.com 52.101.40.1
h1studio.com
MX mail.h1studio.com
103.15.235.138
gosmart.id
MX gosmart.id
103.131.51.10
blueil.com 34.205.242.146
hotmail.comnisdubai.ae
mi.unc.edu.ar 200.16.16.57
mail.gmaicloud.com
mail.blueyonderres.com
victorysvg.ccom
spokgmail.com
domain-cn-1.cuiqiu.net 82.156.150.164
email.cde
outlook.ausd.org
restajet.com
MX alt4.aspmx.l.google.com
MX alt3.aspmx.l.google.com
MX aspmx.l.google.com
MX alt1.aspmx.l.google.com
MX alt2.aspmx.l.google.com
104.22.57.191
paslo.de
MX smtpin.rzone.de
81.169.145.158
live.lkqcorp.com
live.nail.com
yahoo.cmx.de
mx1.simplelogin.co 176.119.200.136
yahlook.com
MX domain-cn-1.cuiqiu.net
MX domain-us-1.cuiqiu.net
gmail.coe.com
westendsolution.com 107.180.1.10
colaborativa.etc.br
simplelogin.io 176.119.200.11
wena.be 162.241.252.227
unipanamericantmail.com
gmaicloud.com
gmailley.net
pvic.pl
ntlwoil.com
mail.doc.mux
ntlwoil.com
outloove.nl
alt3.aspmx.l.google.com 64.233.171.26
gmaicloud.com
wena.be
MX wena.be
MX mail.wena.be
162.241.252.227
gmail.penny-arcade.com
freecycle.com.br
MX alt4.aspmx.l.google.com
MX alt3.aspmx.l.google.com
MX alt2.aspmx.l.google.com
MX alt1.aspmx.l.google.com
MX aspmx.l.google.com
54.232.92.235
mx2.titan.email 35.168.179.133
yahoo.com.arail.com
MX mail.mailerhost.net
45.33.23.183
fastmail.cmail.ru
aspmx4.googlemail.com 64.233.171.27
mx03b.anti-spam-premium.com 209.59.183.18
yahoo.cmx.de
live.nail.com
abv.bgo.uk
aleeas.com
MX mx2.simplelogin.co
MX mx1.simplelogin.co
172.67.155.39
ftp.gmail.penny-arcade.com
outlook.ausd.org
gmail.coive.com 52.71.57.184
www.hugedomains.com 172.67.70.191
o2.co.uk.com
hushmail.l.com
isise.edu.pe
MX isise-edu-pe.mail.protection.outlook.com
MX mail.protection.outlook.com
bamboo.cr 104.21.88.58
gorina.cat 217.76.156.252
0.0.0.0
transformadoresvictory.com.mx 35.215.101.188
doc.mux
gmail.l.edu.co
unab.edu.pe
MX alt4.aspmx.l.google.com
MX alt3.aspmx.l.google.com
MX aspmx.l.google.com
MX alt1.aspmx.l.google.com
MX alt2.aspmx.l.google.com
192.124.249.103
bamboo.cr
MX mail.bamboocoding.com
MX alt1.aspmx.l.google.com
MX mxb.mailgun.org
MX aspmx.l.google.com
MX mxa.mailgun.org
MX alt4.aspmx.l.google.com
MX alt3.aspmx.l.google.com
MX alt2.aspmx.l.google.com
104.21.88.58
butteredtoast.iomail.com
lna.com.mx 67.225.236.47
frontaggmail.com
bakerisroofing.com
MX bakerisroofing-com.mail.protection.outlook.com
216.81.136.20
gspnet.it 89.46.105.48
inboxgmx.de
aspmx.l.google.com 173.194.174.27
gmafreenet.de
mail.gmail.l.edu.co
telefonica.nl.com
gmail.coroxat.com
mail.jpsc.co.za
myschool.hail.com
o2.co.um
ftp.abv.bgo.uk
mail.redifr.cl
bseb.com
MX smtp.getontheweb.com
209.61.212.154
enexumhotmail.com
mx2.emailsrvr.com 184.106.54.2
pvic.pl
spokgmail.com
gmx.dem.br
volvo.ctps
1away.top
www.freecycle.com.br 18.64.8.47
blueil.com 34.205.242.146
ftp.webbero.it
ohsjd.fr 213.186.33.5
telefonica.nl.com
victorysvg.ccom
gmailahoo.at
seap.com
MX ah105.wadax.ne.jp
email.cde
jpsc.co.za
xs4.com
webbero.it
nojesevent.se 194.9.94.85
aleeas.com 172.67.155.39
freecycle.com.br 54.232.92.235
eru.edu.eg 104.21.44.179
ftp.live.nail.com
nvrinc.coml.com
MX mail.h-email.net
99.83.248.67
bakerisroofing-com.mail.protection.outlook.com 104.47.74.10
hotmail.nde
itisgiovannixxiii.email.com 204.74.99.100
brazilianl.com
gmail.cve.com
starmarkshipping.cocom
ohsjd-fr.mail.protection.outlook.com 104.47.25.36
restajet.com 104.22.57.191
istitutocomprensivorosate.edu.it 15.188.65.152
westendsolution.com
MX westendsolution-com.mail.protection.outlook.com
107.180.1.10
gmail.coive.com 52.71.57.184
gmail.coon.gob.ec
ah105.wadax.ne.jp 211.1.224.155
qroo.nuevaescuela.mx 34.70.211.130
tre.com.ng
salemarketwave.c
cobaep.edu.mx
MX 71d5094d4da04584ea07f8dad8876a.mail.outlook.com
172.16.42.2
bakerisroofing.com 216.81.136.20
cook.de 192.166.192.19
vo.de
MX mail.customhost.de
91.223.145.55
alt2.aspmx.l.google.com 142.250.115.26
autenticar.unc.edu.ar 200.16.16.171
alt4.aspmx.l.google.com 142.250.152.27
quimifen.com
MX quimifen.com
66.198.240.40
steamlogic.org 3.0.11.115
gmai.vus.edu.vn
hushmail.l.com
fbsdigitalstore.pk 104.16.159.43
t-online.d.com
blueyonderres.com
awartany.com 74.208.236.160
builtbybamboo.com 104.21.92.188
redifr.cl
gmail.tps
nvhrw.com 103.224.212.212
student.fullo.za
gmp.br
frigonor.cl 23.227.38.65
mx.gspnet.it 62.149.128.157
smtp.getontheweb.com 35.236.231.204
gmail.range.es
redifr.cl
gmail.cve.com
protl.com 13.248.169.48
btopenworlgmail.com
live.lkqcorp.com
unab.edu.pe 192.124.249.103
freemail.hm
mail.customhost.de 202.61.249.4
egst.edu.et
MX alt4.aspmx.l.google.com
MX alt3.aspmx.l.google.com
MX alt2.aspmx.l.google.com
MX alt1.aspmx.l.google.com
MX aspmx.l.google.com
162.221.189.186
alt1.aspmx.l.google.com 142.250.141.27
egst.edu.et 162.221.189.186
vo.de 91.223.145.55
freemail.hm
cobaep.edu.mx 172.16.42.2
t-online.d.com
seap.com
salemarketwave.c
gmail.range.es
h1studio.com 103.15.235.138
ohsjd.fr
MX ohsjd-fr.mail.protection.outlook.com
213.186.33.5
ftp.o2.co.uk.com
jpsc.co.za
transformadoresvictory.com.mx
MX mx30.antispam.mailspamprotection.com
MX mx10.antispam.mailspamprotection.com
MX mx20.antispam.mailspamprotection.com
35.215.101.188
gmx.dem.br
ftp.freemail.hm
inboxgmx.de
mail.email.cde
btopenworlgmail.com
blueyonderres.com
hotmail.nde
awartany.com
MX mx.zoho.com
MX mx2.zoho.com
MX mx3.zoho.com
74.208.236.160
smtpin.rzone.de 81.169.145.97
eru.edu.eg
MX alt4.aspmx.l.google.com
MX alt3.aspmx.l.google.com
MX aspmx.l.google.com
MX alt1.aspmx.l.google.com
MX alt2.aspmx.l.google.com
104.21.44.179
fbsdigitalstore.pk
MX mx2.titan.email
MX mx1.titan.email
104.16.159.43
westendsolution-com.mail.protection.outlook.com 52.101.9.2
o2.co.um
gmail.tps
isise-edu-pe.mail.protection.outlook.com 52.101.11.9
mail.abv.bgo.uk
mail.1away.top 8.219.60.166
gmafreenet.de
protl.com
MX
13.248.169.48
qroo.nuevaescuela.mx
MX alt4.aspmx.l.google.com
MX alt3.aspmx.l.google.com
MX alt2.aspmx.l.google.com
MX alt1.aspmx.l.google.com
MX aspmx.l.google.com
34.70.211.130
mail.h-email.net 5.161.194.135
cook.de 192.166.192.19
starmarkshipping.cocom
hotmail.comnisdubai.ae
msnt.cat
lna.com.mx
MX mx03b.anti-spam-premium.com
MX mx03a.anti-spam-premium.com
67.225.236.47
volvo.ctps
nvhrw.com
MX park-mx.above.com
103.224.212.212
enexumhotmail.com
student.fullo.za
nvrinc.coml.com 99.83.248.67
gorina.cat
MX alt2.aspmx.l.google.com
MX aspmx2.googlemail.com
MX alt1.aspmx.l.google.com
MX aspmx3.googlemail.com
MX aspmx.l.google.com
217.76.156.252
quimifen.com 66.198.240.40
msnt.cat
gmai.vus.edu.vn
brazilianl.com
yahlook.com
webbero.it
gmail.coroxat.com
steamlogic.org
MX mx2.emailsrvr.com
MX mx1.emailsrvr.com
3.0.11.115
park-mx.above.com 103.224.212.34
jomaroil.com.br
MX jomaroil.com.br
128.201.75.205
itisgiovannixxiii.email.com 204.74.99.100
abv.bgo.uk
mail.wena.be 162.241.252.227
gmailahoo.at
gmail.coon.gob.ec
fastmail.cmail.ru
frontaggmail.com
istitutocomprensivorosate.edu.it
MX aspmx2.googlemail.com
MX alt1.aspmx.l.google.com
MX aspmx4.googlemail.com
MX aspmx3.googlemail.com
MX aspmx5.googlemail.com
MX aspmx.l.google.com
MX alt2.aspmx.l.google.com
15.188.65.152
1away.top
MX mail.1away.top
ftp.starmarkshipping.cocom
gmail.l.edu.co
gmail.penny-arcade.com
doc.mux
o2.co.uk.com
ftp.telefonica.nl.com
tre.com.ng
mail.outloove.nl
isise.edu.pe
gmailley.net
nojesevent.se 194.9.94.85
unipanamericantmail.com
mx20.antispam.mailspamprotection.com 34.120.156.61
mail.mailerhost.net 161.35.84.83
www.saintjeandedieu.com 213.186.33.5
kpnmail.il.com
xs4.com
MX
mail.gmailley.net
ww25.nvhrw.com 199.59.243.225
www.restajet.com 20.40.209.181
rbowprems.ga
yahoo.com.arail.com 45.33.23.183
alu.iismunari.it
MX alt2.aspmx.l.google.com
MX alt1.aspmx.l.google.com
MX aspmx2.googlemail.com
MX aspmx.l.google.com
62.149.128.40
paslo.de 81.169.145.158
gmail.coe.com
butteredtoast.iomail.com
mx.zoho.com 204.141.33.44
outloove.nl
bseb.com 209.61.212.154
mail.telefonica.nl.com
mi.unc.edu.ar
MX aspmx2.googlemail.com
MX alt1.aspmx.l.google.com
MX aspmx4.googlemail.com
MX aspmx3.googlemail.com
MX aspmx5.googlemail.com
MX aspmx.l.google.com
MX alt2.aspmx.l.google.com
200.16.16.57
kpnmail.il.com
myschool.hail.com
jomaroil.com.br 128.201.75.205
mail.btopenworlgmail.com
IP Address Status Action
103.224.212.212 Active Moloch
103.224.212.34 Active Moloch
104.16.159.43 Active Moloch
104.17.9.99 Active Moloch
104.21.44.179 Active Moloch
104.21.6.144 Active Moloch
104.21.88.58 Active Moloch
104.21.92.188 Active Moloch
104.22.57.191 Active Moloch
104.26.7.37 Active Moloch
104.47.24.36 Active Moloch
104.47.25.36 Active Moloch
104.47.74.10 Active Moloch
107.180.1.10 Active Moloch
128.201.75.205 Active Moloch
13.248.169.48 Active Moloch
139.162.210.252 Active Moloch
142.250.115.26 Active Moloch
142.250.141.26 Active Moloch
142.250.141.27 Active Moloch
142.250.152.26 Active Moloch
15.188.65.152 Active Moloch
161.35.84.83 Active Moloch
162.221.189.186 Active Moloch
162.241.252.227 Active Moloch
164.124.101.2 Active Moloch
172.67.155.39 Active Moloch
172.67.173.78 Active Moloch
172.67.202.98 Active Moloch
172.67.9.103 Active Moloch
173.203.187.2 Active Moloch
176.119.200.11 Active Moloch
176.119.200.136 Active Moloch
18.64.8.47 Active Moloch
185.205.70.136 Active Moloch
192.124.249.103 Active Moloch
192.166.192.19 Active Moloch
194.9.94.85 Active Moloch
194.9.94.86 Active Moloch
198.58.118.167 Active Moloch
199.59.243.225 Active Moloch
20.40.209.181 Active Moloch
200.16.16.57 Active Moloch
202.61.249.4 Active Moloch
204.141.33.44 Active Moloch
204.74.99.100 Active Moloch
209.61.212.154 Active Moloch
211.1.224.155 Active Moloch
213.186.33.5 Active Moloch
216.81.136.20 Active Moloch
217.76.156.252 Active Moloch
223.120.1.10 Active Moloch
3.0.11.115 Active Moloch
3.130.204.160 Active Moloch
3.130.253.23 Active Moloch
3.18.7.81 Active Moloch
3.94.41.167 Active Moloch
34.120.156.61 Active Moloch
34.70.211.130 Active Moloch
35.215.101.188 Active Moloch
35.236.231.204 Active Moloch
45.136.244.187 Active Moloch
49.13.4.90 Active Moloch
5.161.98.212 Active Moloch
50.21.186.234 Active Moloch
50.7.8.141 Active Moloch
52.101.11.2 Active Moloch
52.101.40.6 Active Moloch
52.101.42.10 Active Moloch
52.101.42.13 Active Moloch
52.101.42.6 Active Moloch
52.101.8.34 Active Moloch
52.55.70.181 Active Moloch
52.71.57.184 Active Moloch
52.86.6.113 Active Moloch
54.209.32.212 Active Moloch
54.232.92.235 Active Moloch
64.233.171.26 Active Moloch
64.233.171.27 Active Moloch
66.198.240.40 Active Moloch
67.225.236.47 Active Moloch
67.227.237.112 Active Moloch
74.125.23.26 Active Moloch
74.208.236.160 Active Moloch
8.219.60.166 Active Moloch
81.169.145.158 Active Moloch
81.169.145.97 Active Moloch
82.156.150.164 Active Moloch
89.46.105.48 Active Moloch
91.107.214.206 Active Moloch
91.121.160.6 Active Moloch
91.223.145.55 Active Moloch
99.83.248.67 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 50.7.8.141:443 -> 192.168.56.103:49167 2522748 ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 749 Misc Attack
TCP 50.21.186.234:9003 -> 192.168.56.103:49171 2522746 ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 747 Misc Attack
TCP 45.136.244.187:443 -> 192.168.56.103:49170 2522718 ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 719 Misc Attack
TCP 50.21.186.234:9003 -> 192.168.56.103:49171 2018789 ET POLICY TLS possible TOR SSL traffic Misc activity
TCP 139.162.210.252:443 -> 192.168.56.103:49168 2522185 ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 186 Misc Attack
TCP 50.21.186.234:9003 -> 192.168.56.103:49173 2018789 ET POLICY TLS possible TOR SSL traffic Misc activity
TCP 192.168.56.103:50454 -> 99.83.248.67:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
TCP 192.168.56.103:50386 -> 3.130.204.160:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
TCP 192.168.56.103:50506 -> 3.0.11.115:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
TCP 192.168.56.103:50688 -> 128.201.75.205:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
TCP 81.169.145.158:443 -> 192.168.56.103:50922 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:51711 -> 15.188.65.152:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
UDP 192.168.56.103:60984 -> 164.124.101.2:53 2023883 ET DNS Query to a *.top domain - Likely Hostile Potentially Bad Traffic
TCP 192.168.56.103:50453 -> 104.21.88.58:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
TCP 192.168.56.103:50650 -> 200.16.16.57:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
TCP 192.168.56.103:50172 -> 74.208.236.160:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
TCP 192.168.56.103:50490 -> 104.17.9.99:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
TCP 192.168.56.103:53064 -> 172.67.9.103:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
TCP 192.168.56.103:51933 -> 67.225.236.47:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
UDP 192.168.56.103:49160 -> 8.8.8.8:53 2025105 ET INFO DNS Query for Suspicious .ga Domain Misc activity
TCP 192.168.56.103:52151 -> 128.201.75.205:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
TCP 192.168.56.103:52570 -> 162.221.189.186:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
TCP 192.168.56.103:52793 -> 194.9.94.86:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
TCP 192.168.56.103:50650 -> 200.16.16.57:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
TCP 192.168.56.103:50454 -> 99.83.248.67:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
TCP 192.168.56.103:52923 -> 104.21.6.144:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
TCP 192.168.56.103:52269 -> 35.215.101.188:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
TCP 192.168.56.103:50653 -> 216.81.136.20:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak
TCP 192.168.56.103:52768 -> 104.16.159.43:22 2003068 ET SCAN Potential SSH Scan OUTBOUND Attempted Information Leak

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.103:49167
50.7.8.141:443
CN=www.3t2mhx5q3xt.com CN=www.pn3n4uizzmr6cgb.net 59:ef:94:5c:4e:c4:72:be:0e:49:39:e1:81:35:1d:f6:03:75:62:50
TLS 1.2
192.168.56.103:49170
45.136.244.187:443
CN=www.wbf3pmovvd45z.com CN=www.upsoui2ly.net 60:cf:41:b3:47:4c:c0:ab:d9:f2:fc:df:6b:be:25:41:79:b8:83:94
TLS 1.2
192.168.56.103:49171
50.21.186.234:9003
CN=www.sqtrtm5u2kal26hkpe57.com CN=www.25m63mipz4h.net 9f:11:8d:15:0c:1c:aa:40:6a:af:d6:60:2f:f5:8a:3b:90:a9:fa:5e
TLS 1.2
192.168.56.103:49168
139.162.210.252:443
CN=www.4apu4tthwhhcyp.com CN=www.pj2zcjz3c6unlac3.net cf:a9:32:e7:65:6b:1d:5d:f2:13:1d:91:93:f8:68:86:c4:81:d2:13
TLS 1.2
192.168.56.103:49175
45.136.244.187:443
CN=www.wbf3pmovvd45z.com CN=www.upsoui2ly.net 60:cf:41:b3:47:4c:c0:ab:d9:f2:fc:df:6b:be:25:41:79:b8:83:94
TLS 1.2
192.168.56.103:49173
50.21.186.234:9003
CN=www.sqtrtm5u2kal26hkpe57.com CN=www.25m63mipz4h.net 9f:11:8d:15:0c:1c:aa:40:6a:af:d6:60:2f:f5:8a:3b:90:a9:fa:5e
TLS 1.2
192.168.56.103:50510
104.16.159.43:443
C=US, O=Let's Encrypt, CN=E1 CN=fbsdigitalstore.pk 30:65:af:6f:16:5b:60:fc:cc:8c:21:d4:15:5b:8f:04:af:00:fd:41
TLS 1.2
192.168.56.103:50428
74.208.236.160:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=Encryption Everywhere DV TLS CA - G2 CN=*.awartany.com 25:e8:70:37:d7:d2:78:57:a2:f0:72:95:a2:6c:cd:e1:b1:30:97:9c
TLS 1.2
192.168.56.103:50446
107.180.1.10:443
C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., OU=http://certs.godaddy.com/repository/, CN=Go Daddy Secure Certificate Authority - G2 CN=westendsolution.com 55:05:d6:ae:9e:89:f7:04:4d:c5:c8:00:95:32:d7:d8:62:71:af:75
TLS 1.2
192.168.56.103:50439
103.224.212.212:443
C=US, O=Let's Encrypt, CN=R3 CN=jhvidatabase.info ba:c4:7e:58:b4:b0:f2:61:28:49:fe:02:5a:d9:f2:82:e3:a0:80:8b
TLS 1.2
192.168.56.103:50496
172.67.155.39:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=aleeas.com 4a:cd:e7:b6:c7:89:3e:72:03:82:a2:fb:8a:e2:54:66:e4:5a:50:b6
TLS 1.2
192.168.56.103:50544
104.21.88.58:443
C=US, O=Let's Encrypt, CN=E1 CN=bamboo.cr 40:df:3c:b4:32:c7:3f:45:c6:ab:8e:19:d9:d2:a0:f5:53:e9:a9:78
TLS 1.2
192.168.56.103:51308
104.26.7.37:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com ca:c3:42:89:f7:39:82:c9:63:e5:4e:fe:df:25:dd:7f:6d:83:a8:ef
TLS 1.2
192.168.56.103:51122
200.16.16.57:443
C=US, O=Let's Encrypt, CN=R3 CN=unc.edu.ar f0:c5:d2:6f:71:f1:06:c5:48:38:2e:1c:b7:32:7f:f2:06:60:50:9d
TLS 1.2
192.168.56.103:51557
104.21.92.188:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 3b:cc:94:d9:0a:8a:7b:08:18:99:64:09:14:0e:35:e1:08:3e:8d:2e
TLS 1.2
192.168.56.103:51165
176.119.200.11:443
C=US, O=Let's Encrypt, CN=R3 CN=*.8alias.com e6:d1:35:d6:0b:7d:4f:07:f7:95:8f:84:79:5e:19:db:d8:c8:bb:94
TLS 1.2
192.168.56.103:51853
18.64.8.47:443
C=US, O=Let's Encrypt, CN=R3 CN=www.freecycle.com.br 12:47:7b:ba:1a:39:32:a7:39:01:8b:3c:2a:31:65:71:10:c1:56:0f
TLS 1.2
192.168.56.103:51948
162.221.189.186:443
C=US, O=Let's Encrypt, CN=R3 CN=egst.edu.et 8c:44:fb:94:6d:d9:ea:15:dc:4a:81:67:df:af:8a:ef:37:e7:28:92
TLS 1.2
192.168.56.103:50614
128.201.75.205:443
C=US, O=Let's Encrypt, CN=R3 CN=*.jomaroil.com.br af:0c:85:f9:6e:85:ef:93:88:91:53:7c:66:b4:a6:00:09:d7:15:01
TLS 1.2
192.168.56.103:52050
104.21.92.188:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 3b:cc:94:d9:0a:8a:7b:08:18:99:64:09:14:0e:35:e1:08:3e:8d:2e
TLS 1.2
192.168.56.103:50871
172.67.155.39:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=aleeas.com 4a:cd:e7:b6:c7:89:3e:72:03:82:a2:fb:8a:e2:54:66:e4:5a:50:b6
TLS 1.2
192.168.56.103:50864
67.225.236.47:443
C=US, O=Let's Encrypt, CN=R3 CN=lna.com.mx d3:dd:d4:6c:c4:32:eb:a1:3b:6c:2f:5b:71:ba:73:e8:e6:58:f0:d5
TLS 1.2
192.168.56.103:51932
15.188.65.152:443
C=US, O=Let's Encrypt, CN=R3 CN=istitutocomprensivorosate.edu.it 3e:c2:96:5e:30:cb:3f:3c:c8:a9:8c:a7:41:c0:41:c7:e8:72:0e:b2
TLS 1.2
192.168.56.103:52184
13.248.169.48:443
C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., OU=http://certs.godaddy.com/repository/, CN=Go Daddy Secure Certificate Authority - G2 CN=protl.com 9f:e5:ee:96:9e:6f:34:50:cd:d5:4e:68:39:bc:c4:5e:1f:6b:47:82
TLS 1.2
192.168.56.103:51400
3.0.11.115:443
C=US, O=Let's Encrypt, CN=R3 CN=steamlogic.org 19:a9:a5:59:c6:ec:fb:05:95:2f:89:28:0c:ff:0a:95:9a:c3:1f:91
TLS 1.2
192.168.56.103:52276
104.26.7.37:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com ca:c3:42:89:f7:39:82:c9:63:e5:4e:fe:df:25:dd:7f:6d:83:a8:ef
TLS 1.2
192.168.56.103:51433
162.221.189.186:443
C=US, O=Let's Encrypt, CN=R3 CN=egst.edu.et 8c:44:fb:94:6d:d9:ea:15:dc:4a:81:67:df:af:8a:ef:37:e7:28:92
TLS 1.2
192.168.56.103:51920
216.81.136.20:443
C=US, O=Let's Encrypt, CN=R3 CN=iowaroof.com fc:1a:07:5c:2a:04:fb:13:ad:eb:2e:49:90:11:23:05:66:e2:d7:57
TLS 1.2
192.168.56.103:52363
66.198.240.40:443
C=US, ST=TX, L=Houston, O=cPanel, Inc., CN=cPanel, Inc. Certification Authority CN=quimifen.com b3:f0:05:75:82:5c:1a:dc:3a:c5:19:89:26:50:90:7b:ac:b1:00:56
TLS 1.2
192.168.56.103:52520
176.119.200.11:443
C=US, O=Let's Encrypt, CN=R3 CN=*.8alias.com e6:d1:35:d6:0b:7d:4f:07:f7:95:8f:84:79:5e:19:db:d8:c8:bb:94
TLS 1.2
192.168.56.103:52745
13.248.169.48:443
C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., OU=http://certs.godaddy.com/repository/, CN=Go Daddy Secure Certificate Authority - G2 CN=protl.com 9f:e5:ee:96:9e:6f:34:50:cd:d5:4e:68:39:bc:c4:5e:1f:6b:47:82
TLS 1.2
192.168.56.103:53055
35.215.101.188:443
C=US, O=Let's Encrypt, CN=R3 CN=*.transformadoresvictory.com.mx 88:f0:cd:6f:87:c9:f5:88:19:e1:6a:b7:36:a9:f6:b5:14:fe:27:25
TLS 1.2
192.168.56.103:53088
162.241.252.227:443
C=US, O=Let's Encrypt, CN=R3 CN=autodiscover.erv.pit.mybluehost.me cf:38:bd:02:b5:11:09:a6:8c:78:30:01:1f:94:b7:c6:6b:85:0e:cd
TLS 1.2
192.168.56.103:50450
104.21.88.58:443
C=US, O=Let's Encrypt, CN=E1 CN=bamboo.cr 40:df:3c:b4:32:c7:3f:45:c6:ab:8e:19:d9:d2:a0:f5:53:e9:a9:78
TLS 1.2
192.168.56.103:50577
104.22.57.191:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=restajet.com c2:e7:fd:57:b8:9a:ba:53:23:b6:11:1f:04:f9:4d:08:2c:25:19:d2
TLS 1.2
192.168.56.103:52771
104.21.44.179:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=eru.edu.eg fb:42:07:69:21:79:96:5c:98:65:43:6d:03:47:2d:29:77:5f:b6:f1
TLS 1.2
192.168.56.103:50636
162.221.189.186:443
C=US, O=Let's Encrypt, CN=R3 CN=egst.edu.et 8c:44:fb:94:6d:d9:ea:15:dc:4a:81:67:df:af:8a:ef:37:e7:28:92
TLS 1.2
192.168.56.103:52748
89.46.105.48:443
C=IT, ST=Bergamo, L=Ponte San Pietro, O=Actalis S.p.A., CN=Actalis Domain Validation Server CA G3 CN=*.gspnet.it bf:07:8c:95:16:fa:ef:2a:f2:88:85:3b:f2:8f:ea:03:b0:78:2b:3e

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
pdb_path C:\lozuzovenahihe\pamelareyoy_xutemenuzud muyefiyo.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

bind

ip_address: 127.0.0.1
socket: 652
port: 0
1 0 0

listen

socket: 652
backlog: 1
1 0 0

accept

ip_address: 127.0.0.1
socket: 652
port: 49165
1 656 0

bind

ip_address: 127.0.0.1
socket: 652
port: 33925
1 0 0

listen

socket: 652
backlog: 2147483647
1 0 0

accept

ip_address: 127.0.0.1
socket: 652
port: 49174
1 732 0

accept

ip_address: 127.0.0.1
socket: 652
port: 49177
1 724 0

accept

ip_address: 127.0.0.1
socket: 652
port: 49178
1 808 0

bind

ip_address: 127.0.0.1
socket: 1004
port: 0
1 0 0

listen

socket: 1004
backlog: 1
1 0 0

accept

ip_address:
socket: 1004
port: 0
1 1032 0

bind

ip_address: 127.0.0.1
socket: 1068
port: 0
1 0 0

listen

socket: 1068
backlog: 1
1 0 0

bind

ip_address: 127.0.0.1
socket: 1044
port: 0
1 0 0

listen

socket: 1044
backlog: 1
1 0 0

bind

ip_address: 127.0.0.1
socket: 1020
port: 0
1 0 0

listen

socket: 1020
backlog: 1
1 0 0

bind

ip_address: 127.0.0.1
socket: 1268
port: 0
1 0 0

listen

socket: 1268
backlog: 1
1 0 0

accept

ip_address:
socket: 1268
port: 0
1 1280 0

bind

ip_address: 127.0.0.1
socket: 1296
port: 0
1 0 0

listen

socket: 1296
backlog: 1
1 0 0

accept

ip_address:
socket: 1068
port: 0
1 1240 0

bind

ip_address: 127.0.0.1
socket: 1352
port: 0
1 0 0

listen

socket: 1352
backlog: 1
1 0 0

bind

ip_address: 127.0.0.1
socket: 1348
port: 0
1 0 0

listen

socket: 1348
backlog: 1
1 0 0

accept

ip_address:
socket: 1352
port: 0
1 1468 0

accept

ip_address:
socket: 1296
port: 0
1 1304 0

bind

ip_address: 127.0.0.1
socket: 1376
port: 0
1 0 0

listen

socket: 1376
backlog: 1
1 0 0

bind

ip_address: 127.0.0.1
socket: 1360
port: 0
1 0 0

listen

socket: 1360
backlog: 1
1 0 0

accept

ip_address:
socket: 1360
port: 0
1 1484 0

bind

ip_address: 127.0.0.1
socket: 1392
port: 0
1 0 0

listen

socket: 1392
backlog: 1
1 0 0

bind

ip_address: 127.0.0.1
socket: 1624
port: 0
1 0 0

listen

socket: 1624
backlog: 1
1 0 0

bind

ip_address: 127.0.0.1
socket: 1504
port: 0
1 0 0

listen

socket: 1504
backlog: 1
1 0 0

bind

ip_address: 127.0.0.1
socket: 1404
port: 0
1 0 0

listen

socket: 1404
backlog: 1
1 0 0

bind

ip_address: 127.0.0.1
socket: 1588
port: 0
1 0 0

listen

socket: 1588
backlog: 1
1 0 0

accept

ip_address:
socket: 1348
port: 0
1 1748 0

accept

ip_address:
socket: 1376
port: 0
1 1352 0

accept

ip_address:
socket: 1392
port: 0
1 1488 0

accept

ip_address:
socket: 1020
port: 0
1 1580 0

accept

ip_address:
socket: 1044
port: 0
1 1924 0

accept

ip_address:
socket: 1624
port: 0
1 1808 0
request GET http://fbsdigitalstore.pk/administrator/
request GET http://bamboo.cr/administrator/
request GET http://gmail.coive.com/administrator/
request GET http://westendsolution.com/administrator/
request GET http://cook.de/administrator/
request GET http://nojesevent.se/administrator/
request GET http://egst.edu.et/administrator/
request GET http://aleeas.com/administrator/
request GET http://freecycle.com.br/administrator/
request GET http://bseb.com/administrator/
request GET http://cook.de/administrator/index.php
request GET http://bseb.com/administrator/index.php
request GET http://nojesevent.se/administrator/index.php
request GET http://jomaroil.com.br/administrator/
request GET http://nvhrw.com/administrator/
request GET http://steamlogic.org/administrator/
request GET http://ohsjd.fr/administrator/
request GET http://awartany.com/administrator/
request GET http://ww25.nvhrw.com/phpmyadmin/?subid1=20231125-1957-27f5-b954-dc376cf569f6
request GET http://steamlogic.org/administrator/index.php
request GET http://blueil.com/administrator/
request GET http://ohsjd.fr/phpmyadmin/
request GET http://jomaroil.com.br/administrator/index.php
request GET http://cook.de/wp-login.php
request GET http://nvrinc.coml.com/administrator/
request GET http://nojesevent.se/wp-login.php
request GET http://egst.edu.et/phpmyadmin/
request GET http://gmail.coive.com/administrator/index.php
request GET http://paslo.de/administrator/
request GET http://lna.com.mx/administrator/
request GET http://nvrinc.coml.com/administrator/index.php
request GET http://cook.de/wp-admin/
request GET http://jomaroil.com.br/phpmyadmin/
request GET http://bseb.com/wp-login.php
request GET http://steamlogic.org/wp-login.php
request GET http://awartany.com/administrator/index.php
request GET http://paslo.de/administrator/index.php
request GET http://steamlogic.org/wp-admin/
request GET http://bakerisroofing.com/administrator/
request GET http://www.saintjeandedieu.com/administrator
request GET http://nojesevent.se/wp-admin/
request GET http://www.restajet.com/phpmyadmin/
request GET http://paslo.de/phpmyadmin/
request GET http://bseb.com/wp-admin/
request GET http://gmail.coive.com/wp-login.php
request GET http://freecycle.com.br/administrator/index.php
request GET http://ww25.nvhrw.com/administrator/?subid1=20231125-1957-2885-9232-b36a0c77a1c5
request GET http://bseb.com/phpmyadmin/
request GET http://egst.edu.et/administrator/index.php
request GET http://transformadoresvictory.com.mx/administrator/
domain fastmail.cmail.ru description Russian Federation domain TLD
domain 1away.top description Generic top level domain TLD
domain mail.1away.top description Generic top level domain TLD
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1608
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 1802240
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x020e0000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1608
region_size: 1798144
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x022a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2136
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
process_handle: 0xffffffff
1 0 0
file C:\ProgramData\Drivers\csrss.exe
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 14
family: 2
1 0 0
section {u'size_of_data': u'0x001d2600', u'virtual_address': u'0x00001000', u'entropy': 7.9579465829035385, u'name': u'.text', u'virtual_size': u'0x001d24b2'} entropy 7.9579465829 description A section with a high entropy has been found
entropy 0.968336361277 description Overall entropy of this PE file is high
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
buffer Buffer with sha1: 0c50ede4a76153165b5be1dbec9fc9d2f4a97416
host 139.162.210.252
host 45.136.244.187
host 50.21.186.234
host 50.7.8.141
host 91.121.160.6
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2136
region_size: 4489216
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000080
1 0 0
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS reg_value "C:\ProgramData\Drivers\csrss.exe"
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: @
base_address: 0x7efde008
process_identifier: 2136
process_handle: 0x00000080
1 1 0
Process injection Process 1608 called NtSetContextThread to modify thread in remote process 2136
Time & API Arguments Status Return Repeated

NtSetContextThread

registers.eip: 2005598660
registers.esp: 1638384
registers.edi: 0
registers.eax: 8673008
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x0000007c
process_identifier: 2136
1 0 0
Process injection Process 1608 resumed a thread in remote process 2136
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x0000007c
suspend_count: 1
process_identifier: 2136
1 0 0
file C:\Users\test22\AppData\Roaming\tor\geoip
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2140
thread_handle: 0x0000007c
process_identifier: 2136
current_directory:
filepath: C:\Users\test22\AppData\Local\Temp\sservc.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\sservc.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\sservc.exe
stack_pivoted: 0
creation_flags: 134217732 (CREATE_NO_WINDOW|CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x00000080
1 1 0

NtGetContextThread

thread_handle: 0x0000007c
1 0 0

NtUnmapViewOfSection

base_address: 0x00400000
region_size: 4096
process_identifier: 2136
process_handle: 0x00000080
1 0 0

NtAllocateVirtualMemory

process_identifier: 2136
region_size: 4489216
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000080
1 0 0

WriteProcessMemory

buffer: @
base_address: 0x7efde008
process_identifier: 2136
process_handle: 0x00000080
1 1 0

NtSetContextThread

registers.eip: 2005598660
registers.esp: 1638384
registers.edi: 0
registers.eax: 8673008
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x0000007c
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x0000007c
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000178
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x000001d4
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x000002cc
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x000002dc
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x000002f8
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000304
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000310
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000314
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000320
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x0000032c
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x0000033c
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000334
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000348
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000350
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000354
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x0000035c
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000364
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000378
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000380
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x0000038c
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000394
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x000003a4
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x000003b0
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x000003b8
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x000003bc
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x000003c4
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x000003e8
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x0000043c
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000440
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000450
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000458
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000460
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000474
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x0000047c
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x000004a0
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x0000044c
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x0000049c
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x000004c0
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x000004c8
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000434
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000490
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x000004a8
suspend_count: 1
process_identifier: 2136
1 0 0

NtResumeThread

thread_handle: 0x00000520
suspend_count: 1
process_identifier: 2136
1 0 0
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Chapak.4!c
tehtris Generic.Malware
FireEye Generic.mg.4f17e0e8d7f6931d
Skyhigh BehavesLike.Win32.Lockbit.tc
Malwarebytes MachineLearning/Anomalous.97%
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 005ace911 )
K7GW Trojan ( 005ace911 )
CrowdStrike win/malicious_confidence_100% (W)
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
APEX Malicious
ClamAV Win.Packer.pkr_ce1a-9980177-0
Kaspersky UDS:DangerousObject.Multi.Generic
Avast PWSX-gen [Trj]
Tencent Trojan.Win32.Obfuscated.gen
Trapmine malicious.high.ml.score
Sophos Troj/Krypt-VK
SentinelOne Static AI - Malicious PE
Google Detected
Kingsoft malware.kb.a.1000
Microsoft Trojan:Win32/Recordbreaker.RPY!MTB
ZoneAlarm UDS:DangerousObject.Multi.Generic
Cynet Malicious (score: 100)
McAfee Artemis!4F17E0E8D7F6
VBA32 BScope.Trojan.Chapak
Cylance unsafe
Rising Trojan.SmokeLoader!1.EF01 (CLASSIC)
Ikarus Trojan-Spy.Agent
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/Kryptik.HHTS!tr
AVG PWSX-gen [Trj]
Cybereason malicious.f5b2ab
DeepInstinct MALICIOUS
dead_host 204.74.99.100:443
dead_host 142.250.115.26:143
dead_host 173.203.187.2:995
dead_host 192.168.56.103:51157
dead_host 103.224.212.34:143
dead_host 192.168.56.103:51280
dead_host 192.168.56.103:53053
dead_host 5.161.98.212:143
dead_host 103.224.212.212:22
dead_host 54.232.92.235:443
dead_host 204.141.33.44:995
dead_host 173.203.187.2:143
dead_host 74.125.23.26:465
dead_host 192.168.56.103:50641
dead_host 192.166.192.19:21
dead_host 192.168.56.103:50887
dead_host 204.141.33.44:465
dead_host 81.169.145.97:143
dead_host 54.232.92.235:21
dead_host 142.250.141.26:995
dead_host 13.248.169.48:21
dead_host 192.168.56.103:52151
dead_host 192.168.56.103:51244
dead_host 91.107.214.206:143
dead_host 81.169.145.97:995
dead_host 161.35.84.83:995
dead_host 209.61.212.154:443
dead_host 54.209.32.212:21
dead_host 49.13.4.90:465
dead_host 192.166.192.19:465
dead_host 209.61.212.154:21
dead_host 91.107.214.206:465
dead_host 91.121.160.6:9001
dead_host 91.223.145.55:80
dead_host 54.232.92.235:22
dead_host 192.168.56.103:51040
dead_host 52.71.57.184:465
dead_host 64.233.171.26:995
dead_host 35.236.231.204:995
dead_host 192.168.56.103:50766
dead_host 52.71.57.184:995
dead_host 91.107.214.206:995
dead_host 74.125.23.26:995
dead_host 74.125.23.26:143
dead_host 81.169.145.158:22
dead_host 91.223.145.55:443
dead_host 192.168.56.103:51933
dead_host 192.168.56.103:51359
dead_host 192.168.56.103:50549
dead_host 99.83.248.67:443