Windows Analysis Report 9thuIDnsFV

Overview

General Information

Sample Name: 9thuIDnsFV (renamed file extension from none to exe)
Analysis ID: 452499
MD5: 0e715db2198ff670f4bf0e88e0e9b547
SHA1: 2de5030a9261655e5879e4faba7b5e79d1dd483e
SHA256: 4dc8cb12314311a3bf1b1afa5cc5483284fda573f18c15ab0fef18b7b9ef9f98
Tags: 32exetrojan
Infos:

Most interesting Screenshot:

Detection

FormBook
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Yara detected FormBook
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

AV Detection:

barindex
Found malware configuration
Source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp Malware Configuration Extractor: FormBook {"C2 list": ["www.containerflippers.com/np0c/"], "decoy": ["spartansurebets.com", "threelakestradingco.com", "metaspace.global", "zjenbao.com", "directlyincluded.press", "peterchadri.com", "learnhousebreaking.com", "wonobattle.online", "leadate.com", "shebafarmscali.com", "top4thejob.online", "awakeyourfaith.com", "bedford-st.com", "lolwhats.com", "cucurumbel.com", "lokalbazaar.com", "matter.pro", "eastcountyanimalrescue.com", "musesgirl.com", "noordinarydairy.com", "saigonstar2.com", "farmacias-aranda.com", "fjzzck.com", "createandelevate.solutions", "australiavapeoil.com", "imperfectlymassabella.com", "criminalmindeddesign.com", "silverstoneca.com", "scotlandpropertygroup.com", "3dvbuild.com", "privatebeautysuites.com", "driplockerstore.com", "rcdesigncompany.com", "2141cascaderdsw.com", "mybbblog.com", "bodyambrosia.com", "solitudeblog.com", "coworkingofficespaces.com", "9999cpa.com", "flipwo.com", "dynamicfitnesslife.store", "anandsharmah.com", "afyz-jf7y.net", "erikagrandstaff.com", "pumpfoil.com", "bodurm.com", "goldlifetime.com", "a1organ.com", "akomandr.com", "hsavvysupply.com", "dyvyn.com", "bizlikeabosslady.network", "livein.space", "helpafounderout.com", "orbmena.com", "mrrodgersrealty.com", "roxhomeswellington.com", "klimareporter.com", "1040fourthst405.com", "blackbuiltbusinesses.com", "solidswim.com", "lordetkinlik3.com", "gardencontainerbar.com", "viperporn.net"]}
Multi AV Scanner detection for dropped file
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe ReversingLabs: Detection: 23%
Multi AV Scanner detection for submitted file
Source: 9thuIDnsFV.exe Virustotal: Detection: 38% Perma Link
Source: 9thuIDnsFV.exe ReversingLabs: Detection: 23%
Yara detected FormBook
Source: Yara match File source: 10.2.9thuIDnsFV.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.9thuIDnsFV.exe.45b0350.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.9thuIDnsFV.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.9thuIDnsFV.exe.45140c8.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, type: MEMORY
Antivirus or Machine Learning detection for unpacked file
Source: 10.2.9thuIDnsFV.exe.400000.0.unpack Avira: Label: TR/Crypt.ZPACK.Gen

Cryptography:

barindex
Uses Microsoft's Enhanced Cryptographic Provider
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019CFDA0 BasepCopyEncryption, 10_2_019CFDA0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B7D72 BasepCopyEncryption, 10_2_019B7D72
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D8E00 BasepCopyEncryption, 10_2_019D8E00
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D2E3E BasepCopyEncryption, 10_2_019D2E3E
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B2250 BasepCopyEncryption, 10_2_019B2250

Compliance:

barindex
Uses 32bit PE files
Source: 9thuIDnsFV.exe Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
Source: 9thuIDnsFV.exe Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: wscui.pdbUGP source: explorer.exe, 0000000E.00000000.455604694.000000000DC20000.00000002.00000001.sdmp
Source: Binary string: wntdll.pdbUGP source: 9thuIDnsFV.exe, 0000000A.00000002.498187012.0000000001980000.00000040.00000001.sdmp
Source: Binary string: wlanext.pdb source: 9thuIDnsFV.exe, 0000000A.00000002.498749026.0000000001DB0000.00000040.00000001.sdmp
Source: Binary string: wntdll.pdb source: 9thuIDnsFV.exe, 0000000A.00000002.498187012.0000000001980000.00000040.00000001.sdmp
Source: Binary string: wlanext.pdbGCTL source: 9thuIDnsFV.exe, 0000000A.00000002.498749026.0000000001DB0000.00000040.00000001.sdmp
Source: Binary string: wscui.pdb source: explorer.exe, 0000000E.00000000.455604694.000000000DC20000.00000002.00000001.sdmp

Software Vulnerabilities:

barindex
Found inlined nop instructions (likely shell or obfuscated code)
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 4x nop then pop esi 10_2_004172CB
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 4x nop then pop ebx 10_2_00407AFA
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 4x nop then pop edi 10_2_00417D5B
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 4x nop then pop ebx 20_2_02F17AFB
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 4x nop then pop esi 20_2_02F272CB
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 4x nop then pop edi 20_2_02F27D5B

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.6:49756 -> 5.79.68.101:80
Source: Traffic Snort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.6:49756 -> 5.79.68.101:80
Source: Traffic Snort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.6:49756 -> 5.79.68.101:80
C2 URLs / IPs found in malware configuration
Source: Malware configuration extractor URLs: www.containerflippers.com/np0c/
HTTP GET or POST without a user agent
Source: global traffic HTTP traffic detected: GET /np0c/?iN=5jalxB&a0DTBtU=a9fK2iRL7rM/iNgaQ8e4NUwl6BbikcR8OekOj0TYIdin2efeiFW0Z5kC5Xa/O1Kzq37GlajMhw== HTTP/1.1Host: www.driplockerstore.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: LEASEWEB-NL-AMS-01NetherlandsNL LEASEWEB-NL-AMS-01NetherlandsNL
Source: global traffic HTTP traffic detected: GET /np0c/?iN=5jalxB&a0DTBtU=a9fK2iRL7rM/iNgaQ8e4NUwl6BbikcR8OekOj0TYIdin2efeiFW0Z5kC5Xa/O1Kzq37GlajMhw== HTTP/1.1Host: www.driplockerstore.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: unknown DNS traffic detected: queries for: www.driplockerstore.com
Source: 9thuIDnsFV.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: 9thuIDnsFV.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
Source: 9thuIDnsFV.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: 9thuIDnsFV.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: 9thuIDnsFV.exe String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: 9thuIDnsFV.exe String found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 9thuIDnsFV.exe String found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
Source: 9thuIDnsFV.exe String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: 9thuIDnsFV.exe String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: 9thuIDnsFV.exe String found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 9thuIDnsFV.exe String found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
Source: 9thuIDnsFV.exe String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: 9thuIDnsFV.exe, 00000001.00000003.330013890.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://en.w
Source: 9thuIDnsFV.exe, 00000001.00000003.329336409.000000000616B000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://fontfabrik.com
Source: 9thuIDnsFV.exe String found in binary or memory: http://ocsp.digicert.com0C
Source: 9thuIDnsFV.exe String found in binary or memory: http://ocsp.digicert.com0H
Source: 9thuIDnsFV.exe String found in binary or memory: http://ocsp.digicert.com0I
Source: 9thuIDnsFV.exe String found in binary or memory: http://ocsp.digicert.com0O
Source: wlanext.exe, 00000014.00000002.599683459.0000000003D9F000.00000004.00000001.sdmp String found in binary or memory: http://survey-smiles.com
Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: 9thuIDnsFV.exe, 00000001.00000003.336235888.0000000006173000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000003.336179079.0000000006173000.00000004.00000001.sdmp String found in binary or memory: http://www.ascendercorp.com/typedesigners.html
Source: explorer.exe, 0000000E.00000000.465503164.000000000095C000.00000004.00000020.sdmp String found in binary or memory: http://www.autoitscript.com/autoit3/J
Source: 9thuIDnsFV.exe, 00000001.00000003.334443520.000000000616D000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.com
Source: 9thuIDnsFV.exe, 00000001.00000003.333715053.000000000616D000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.com.
Source: 9thuIDnsFV.exe, 00000001.00000003.334802978.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.comTC
Source: 9thuIDnsFV.exe, 00000001.00000003.333788508.000000000616D000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.comaF
Source: 9thuIDnsFV.exe, 00000001.00000003.334955370.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.comal
Source: 9thuIDnsFV.exe, 00000001.00000003.334171892.000000000616D000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.comams
Source: 9thuIDnsFV.exe, 00000001.00000003.334802978.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.comc
Source: 9thuIDnsFV.exe, 00000001.00000003.334310160.000000000616D000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.comces
Source: 9thuIDnsFV.exe, 00000001.00000003.334802978.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.comcr
Source: 9thuIDnsFV.exe, 00000001.00000003.334264597.000000000616D000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.come
Source: 9thuIDnsFV.exe, 00000001.00000003.334171892.000000000616D000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.comes
Source: 9thuIDnsFV.exe, 00000001.00000003.333715053.000000000616D000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.comexc
Source: 9thuIDnsFV.exe, 00000001.00000003.334215573.000000000616D000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.comic
Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.carterandcone.coml
Source: 9thuIDnsFV.exe, 00000001.00000003.333715053.000000000616D000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.comlt
Source: 9thuIDnsFV.exe, 00000001.00000003.334443520.000000000616D000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.como.
Source: 9thuIDnsFV.exe, 00000001.00000003.334443520.000000000616D000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.comopsz
Source: 9thuIDnsFV.exe, 00000001.00000003.334955370.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.comroa
Source: 9thuIDnsFV.exe String found in binary or memory: http://www.digicert.com/CPS0
Source: 9thuIDnsFV.exe String found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com
Source: explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers
Source: 9thuIDnsFV.exe, 00000001.00000003.341157570.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers#
Source: 9thuIDnsFV.exe, 00000001.00000003.339414645.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers$
Source: 9thuIDnsFV.exe, 00000001.00000003.338972632.000000000616B000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000003.338849647.0000000006171000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/
Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/?
Source: 9thuIDnsFV.exe, 00000001.00000003.340799548.000000000618E000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: 9thuIDnsFV.exe, 00000001.00000003.339998468.000000000618E000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000003.339943360.000000000616B000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
Source: 9thuIDnsFV.exe, 00000001.00000003.339513065.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers5
Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000003.338914369.0000000006171000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers8
Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers?
Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designersG
Source: 9thuIDnsFV.exe, 00000001.00000003.339673222.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designersa
Source: 9thuIDnsFV.exe, 00000001.00000003.339673222.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designersers5
Source: 9thuIDnsFV.exe, 00000001.00000003.338914369.0000000006171000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designersp
Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.fonts.com
Source: 9thuIDnsFV.exe, 00000001.00000003.333344719.000000000616B000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn
Source: 9thuIDnsFV.exe, 00000001.00000003.331470049.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn/
Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: 9thuIDnsFV.exe, 00000001.00000003.333344719.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn6
Source: 9thuIDnsFV.exe, 00000001.00000003.332290487.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cnMic
Source: 9thuIDnsFV.exe, 00000001.00000003.332056051.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cnht
Source: 9thuIDnsFV.exe, 00000001.00000003.333344719.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cnld
Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: 9thuIDnsFV.exe, 00000001.00000003.342672431.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmm
Source: 9thuIDnsFV.exe, 00000001.00000003.331470049.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.goodfont.co.k)
Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.goodfont.co.kr
Source: 9thuIDnsFV.exe, 00000001.00000003.331326853.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.goodfont.co.kr-c(
Source: 9thuIDnsFV.exe, 00000001.00000003.331326853.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.goodfont.co.krtp
Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: 9thuIDnsFV.exe String found in binary or memory: http://www.opera.com0
Source: 9thuIDnsFV.exe, 00000001.00000003.328448785.0000000006152000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.com
Source: 9thuIDnsFV.exe, 00000001.00000003.328448785.0000000006152000.00000004.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.comG
Source: 9thuIDnsFV.exe, 00000001.00000003.328448785.0000000006152000.00000004.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.comM
Source: 9thuIDnsFV.exe, 00000001.00000003.336235888.0000000006173000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.sakkal.com
Source: 9thuIDnsFV.exe, 00000001.00000003.331470049.000000000616B000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.sandoll.co.kr
Source: 9thuIDnsFV.exe, 00000001.00000003.331326853.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.sandoll.co.krFc
Source: 9thuIDnsFV.exe, 00000001.00000003.331326853.000000000616B000.00000004.00000001.sdmp String found in binary or memory: http://www.sandoll.co.krs-czom
Source: explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.tiro.com
Source: 9thuIDnsFV.exe, 00000001.00000003.333190214.0000000006173000.00000004.00000001.sdmp String found in binary or memory: http://www.tiro.com-jpL
Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.typography.netD
Source: 9thuIDnsFV.exe, 00000001.00000003.338500432.0000000006171000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000003.341292306.0000000006177000.00000004.00000001.sdmp String found in binary or memory: http://www.urwpp.de
Source: 9thuIDnsFV.exe, 00000001.00000003.338500432.0000000006171000.00000004.00000001.sdmp String found in binary or memory: http://www.urwpp.de0
Source: 9thuIDnsFV.exe, 00000001.00000003.341330812.0000000006178000.00000004.00000001.sdmp String found in binary or memory: http://www.urwpp.de?
Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.urwpp.deDPlease
Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmp String found in binary or memory: http://www.zhongyicts.com.cn
Source: 9thuIDnsFV.exe, 00000001.00000003.333715053.000000000616D000.00000004.00000001.sdmp String found in binary or memory: http://www.zhongyicts.com.cncr
Source: 9thuIDnsFV.exe, 00000001.00000003.333587115.000000000616D000.00000004.00000001.sdmp String found in binary or memory: http://www.zhongyicts.com.cnr-fC
Source: 9thuIDnsFV.exe String found in binary or memory: https://www.digicert.com/CPS0

E-Banking Fraud:

barindex
Yara detected FormBook
Source: Yara match File source: 10.2.9thuIDnsFV.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.9thuIDnsFV.exe.45b0350.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.9thuIDnsFV.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.9thuIDnsFV.exe.45140c8.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, type: MEMORY

System Summary:

barindex
Malicious sample detected (through community Yara rule)
Source: 10.2.9thuIDnsFV.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 10.2.9thuIDnsFV.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 1.2.9thuIDnsFV.exe.45b0350.1.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 1.2.9thuIDnsFV.exe.45b0350.1.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 10.2.9thuIDnsFV.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 10.2.9thuIDnsFV.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 1.2.9thuIDnsFV.exe.45140c8.2.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 1.2.9thuIDnsFV.exe.45140c8.2.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Contains functionality to call native functions
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_00419D60 NtCreateFile, 10_2_00419D60
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_00419E10 NtReadFile, 10_2_00419E10
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_00419E90 NtClose, 10_2_00419E90
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_00419F40 NtAllocateVirtualMemory, 10_2_00419F40
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_00419D5A NtCreateFile, 10_2_00419D5A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_00419DB2 NtCreateFile, 10_2_00419DB2
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_00419E8A NtClose, 10_2_00419E8A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E99A0 NtCreateSection,LdrInitializeThunk, 10_2_019E99A0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E95D0 NtClose,LdrInitializeThunk, 10_2_019E95D0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9910 NtAdjustPrivilegesToken,LdrInitializeThunk, 10_2_019E9910
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9540 NtReadFile,LdrInitializeThunk, 10_2_019E9540
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E98F0 NtReadVirtualMemory,LdrInitializeThunk, 10_2_019E98F0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9840 NtDelayExecution,LdrInitializeThunk, 10_2_019E9840
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9860 NtQuerySystemInformation,LdrInitializeThunk, 10_2_019E9860
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9780 NtMapViewOfSection,LdrInitializeThunk, 10_2_019E9780
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E97A0 NtUnmapViewOfSection,LdrInitializeThunk, 10_2_019E97A0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9710 NtQueryInformationToken,LdrInitializeThunk, 10_2_019E9710
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E96E0 NtFreeVirtualMemory,LdrInitializeThunk, 10_2_019E96E0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9A00 NtProtectVirtualMemory,LdrInitializeThunk, 10_2_019E9A00
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9A20 NtResumeThread,LdrInitializeThunk, 10_2_019E9A20
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9A50 NtCreateFile,LdrInitializeThunk, 10_2_019E9A50
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9660 NtAllocateVirtualMemory,LdrInitializeThunk, 10_2_019E9660
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E99D0 NtCreateProcessEx, 10_2_019E99D0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E95F0 NtQueryInformationFile, 10_2_019E95F0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019EAD30 NtSetContextThread, 10_2_019EAD30
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9520 NtWaitForSingleObject, 10_2_019E9520
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9950 NtQueueApcThread, 10_2_019E9950
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9560 NtWriteFile, 10_2_019E9560
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E98A0 NtWriteVirtualMemory, 10_2_019E98A0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9820 NtEnumerateKey, 10_2_019E9820
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019EB040 NtSuspendThread, 10_2_019EB040
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019EA3B0 NtGetContextThread, 10_2_019EA3B0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9FE0 NtCreateMutant, 10_2_019E9FE0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019EA710 NtOpenProcessToken, 10_2_019EA710
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9B00 NtSetValueKey, 10_2_019E9B00
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9730 NtQueryVirtualMemory, 10_2_019E9730
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9770 NtSetInformationFile, 10_2_019E9770
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019EA770 NtOpenThread, 10_2_019EA770
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9760 NtOpenProcess, 10_2_019E9760
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9A80 NtOpenDirectoryObject, 10_2_019E9A80
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E96D0 NtCreateKey, 10_2_019E96D0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9610 NtEnumerateValueKey, 10_2_019E9610
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9A10 NtQuerySection, 10_2_019E9A10
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9650 NtQueryValueKey, 10_2_019E9650
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E9670 NtQueryInformationProcess, 10_2_019E9670
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F29E90 NtClose, 20_2_02F29E90
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F29E10 NtReadFile, 20_2_02F29E10
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F29F40 NtAllocateVirtualMemory, 20_2_02F29F40
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F29D60 NtCreateFile, 20_2_02F29D60
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F29E8A NtClose, 20_2_02F29E8A
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F29DB2 NtCreateFile, 20_2_02F29DB2
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F29D5A NtCreateFile, 20_2_02F29D5A
Detected potential crypto function
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Code function: 1_2_0322C224 1_2_0322C224
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Code function: 1_2_0322E5E2 1_2_0322E5E2
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Code function: 1_2_0322E5F0 1_2_0322E5F0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_0041E004 10_2_0041E004
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_00401027 10_2_00401027
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_00401030 10_2_00401030
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_0041D0C1 10_2_0041D0C1
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_0041D3B9 10_2_0041D3B9
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_00402D87 10_2_00402D87
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_00402D90 10_2_00402D90
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_00409E40 10_2_00409E40
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_00402FB0 10_2_00402FB0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D2581 10_2_019D2581
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019BD5E0 10_2_019BD5E0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019AF900 10_2_019AF900
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A0D20 10_2_019A0D20
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019C4120 10_2_019C4120
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A71D55 10_2_01A71D55
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019BB090 10_2_019BB090
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D20A0 10_2_019D20A0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B841F 10_2_019B841F
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A61002 10_2_01A61002
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019DEBB0 10_2_019DEBB0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019C6E30 10_2_019C6E30
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F2E004 20_2_02F2E004
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F19E40 20_2_02F19E40
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F12FB0 20_2_02F12FB0
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F12D90 20_2_02F12D90
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F12D87 20_2_02F12D87
Found potential string decryption / allocating functions
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: String function: 019AB150 appears 35 times
PE / OLE file has an invalid certificate
Source: 9thuIDnsFV.exe Static PE information: invalid certificate
PE file contains strange resources
Source: 9thuIDnsFV.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 9thuIDnsFV.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 9thuIDnsFV.exe.1.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 9thuIDnsFV.exe.1.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Sample file is different than original file name gathered from version info
Source: 9thuIDnsFV.exe Binary or memory string: OriginalFilename vs 9thuIDnsFV.exe
Source: 9thuIDnsFV.exe, 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameAucrorbejpjpqs.dll> vs 9thuIDnsFV.exe
Source: 9thuIDnsFV.exe, 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameElcbrjrgopuwq.dll" vs 9thuIDnsFV.exe
Source: 9thuIDnsFV.exe, 00000001.00000002.421855584.0000000000E82000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameAAXZConsoleApp9.exeB vs 9thuIDnsFV.exe
Source: 9thuIDnsFV.exe, 00000001.00000002.428503196.0000000006320000.00000002.00000001.sdmp Binary or memory string: OriginalFilenamenlsbres.dll.muij% vs 9thuIDnsFV.exe
Source: 9thuIDnsFV.exe Binary or memory string: OriginalFilename vs 9thuIDnsFV.exe
Source: 9thuIDnsFV.exe, 0000000A.00000000.421133231.0000000000F42000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameAAXZConsoleApp9.exeB vs 9thuIDnsFV.exe
Source: 9thuIDnsFV.exe, 0000000A.00000002.498789895.0000000001DC2000.00000040.00000001.sdmp Binary or memory string: OriginalFilenamewlanext.exej% vs 9thuIDnsFV.exe
Source: 9thuIDnsFV.exe, 0000000A.00000002.498552872.0000000001C2F000.00000040.00000001.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs 9thuIDnsFV.exe
Source: 9thuIDnsFV.exe Binary or memory string: OriginalFilenameAAXZConsoleApp9.exeB vs 9thuIDnsFV.exe
Uses 32bit PE files
Source: 9thuIDnsFV.exe Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
Yara signature match
Source: 10.2.9thuIDnsFV.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 10.2.9thuIDnsFV.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 1.2.9thuIDnsFV.exe.45b0350.1.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 1.2.9thuIDnsFV.exe.45b0350.1.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 10.2.9thuIDnsFV.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 10.2.9thuIDnsFV.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 1.2.9thuIDnsFV.exe.45140c8.2.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 1.2.9thuIDnsFV.exe.45140c8.2.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 9thuIDnsFV.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: 9thuIDnsFV.exe.1.dr Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: classification engine Classification label: mal100.troj.evad.winEXE@7/3@1/1
Source: C:\Users\user\Desktop\9thuIDnsFV.exe File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9thuIDnsFV.exe.log Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3860:120:WilError_01
Source: C:\Users\user\Desktop\9thuIDnsFV.exe File created: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Jump to behavior
Source: 9thuIDnsFV.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\explorer.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\explorer.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: 9thuIDnsFV.exe Virustotal: Detection: 38%
Source: 9thuIDnsFV.exe ReversingLabs: Detection: 23%
Source: C:\Users\user\Desktop\9thuIDnsFV.exe File read: C:\Users\user\Desktop\9thuIDnsFV.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\9thuIDnsFV.exe 'C:\Users\user\Desktop\9thuIDnsFV.exe'
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process created: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe vgyjnbhui
Source: C:\Windows\explorer.exe Process created: C:\Windows\SysWOW64\wlanext.exe C:\Windows\SysWOW64\wlanext.exe
Source: C:\Windows\SysWOW64\wlanext.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe'
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process created: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe vgyjnbhui Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe' Jump to behavior
Source: C:\Windows\explorer.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6C3EE638-B588-4D7D-B30A-E7E36759305D}\InprocServer32 Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll Jump to behavior
Source: 9thuIDnsFV.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: 9thuIDnsFV.exe Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: wscui.pdbUGP source: explorer.exe, 0000000E.00000000.455604694.000000000DC20000.00000002.00000001.sdmp
Source: Binary string: wntdll.pdbUGP source: 9thuIDnsFV.exe, 0000000A.00000002.498187012.0000000001980000.00000040.00000001.sdmp
Source: Binary string: wlanext.pdb source: 9thuIDnsFV.exe, 0000000A.00000002.498749026.0000000001DB0000.00000040.00000001.sdmp
Source: Binary string: wntdll.pdb source: 9thuIDnsFV.exe, 0000000A.00000002.498187012.0000000001980000.00000040.00000001.sdmp
Source: Binary string: wlanext.pdbGCTL source: 9thuIDnsFV.exe, 0000000A.00000002.498749026.0000000001DB0000.00000040.00000001.sdmp
Source: Binary string: wscui.pdb source: explorer.exe, 0000000E.00000000.455604694.000000000DC20000.00000002.00000001.sdmp

Data Obfuscation:

barindex
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_004168E0 push eax; iretd 10_2_004168E1
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_00416907 push ds; retf 10_2_00416908
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_004093D6 push es; retf 10_2_004093DD
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_00416CB4 pushfd ; retf 10_2_00416CBC
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_004176ED push ebx; iretd 10_2_004176EF
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_0041CEB5 push eax; ret 10_2_0041CF08
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_0041CF6C push eax; ret 10_2_0041CF72
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_0041CF02 push eax; ret 10_2_0041CF08
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_0041CF0B push eax; ret 10_2_0041CF72
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019FD0D1 push ecx; ret 10_2_019FD0E4
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F193D6 push es; retf 20_2_02F193DD
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F268E0 push eax; iretd 20_2_02F268E1
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F26907 push ds; retf 20_2_02F26908
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F276ED push ebx; iretd 20_2_02F276EF
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F2CEB5 push eax; ret 20_2_02F2CF08
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F2CF6C push eax; ret 20_2_02F2CF72
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F2CF02 push eax; ret 20_2_02F2CF08
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F2CF0B push eax; ret 20_2_02F2CF72
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 20_2_02F26CB4 pushfd ; retf 20_2_02F26CBC

Persistence and Installation Behavior:

barindex
Drops PE files
Source: C:\Users\user\Desktop\9thuIDnsFV.exe File created: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Jump to dropped file

Hooking and other Techniques for Hiding and Protection:

barindex
Modifies the prolog of user mode functions (user mode inline hooks)
Source: explorer.exe User mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x8B 0xBE 0xEB
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Source: 9thuIDnsFV.exe, 00000001.00000002.424675274.00000000033B6000.00000004.00000001.sdmp Binary or memory string: SBIEDLL.DLL0SELECT * FROM WIN32_BIOS8UNEXPECTED WMI QUERY FAILURE
Tries to detect virtualization through RDTSC time measurements
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe RDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe RDTSC instruction interceptor: First address: 0000000000409B5E second address: 0000000000409B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Windows\SysWOW64\wlanext.exe RDTSC instruction interceptor: First address: 0000000002F198E4 second address: 0000000002F198EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Windows\SysWOW64\wlanext.exe RDTSC instruction interceptor: First address: 0000000002F19B5E second address: 0000000002F19B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_00409A90 rdtsc 10_2_00409A90
Contains long sleeps (>= 3 min)
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Window / User API: threadDelayed 1778 Jump to behavior
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Users\user\Desktop\9thuIDnsFV.exe TID: 6368 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\explorer.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: explorer.exe, 0000000E.00000000.452463166.0000000008430000.00000004.00000001.sdmp Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
Source: explorer.exe, 0000000E.00000000.452393982.00000000083E9000.00000004.00000001.sdmp Binary or memory string: VMware SATA CD00dRom0
Source: 9thuIDnsFV.exe Binary or memory string: 3V97MjDwzNY10/CE3FdlPTc3QDRJmTHAfugGZ6zy6kRSVp+JZqpfk8Ffo9rd0+zrd2KPwKN3IwbD9bQLswwzDhyn4PdAUcVsBK5n\77208IwpEVv/3DMWkIIYr+GO0CgNtkcu/AzuJ1M8gweiCBUod5UYqcxkP0QAKl0hwizDJ5b4pZws5eikxSjRN4UuQgGFVmciINBjSJ\7NLLQdzKojxbpxogKKZWM8B1Zm8STIrPk9ANQxogWqeZZSr2a6ZmW+yC
Source: 9thuIDnsFV.exe, 00000001.00000002.424675274.00000000033B6000.00000004.00000001.sdmp Binary or memory string: 0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
Source: explorer.exe, 0000000E.00000000.445336091.0000000005D50000.00000002.00000001.sdmp Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: explorer.exe, 0000000E.00000000.447425630.00000000062E0000.00000004.00000001.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: 9thuIDnsFV.exe, 00000001.00000002.424675274.00000000033B6000.00000004.00000001.sdmp Binary or memory string: vmware
Source: explorer.exe, 0000000E.00000000.452393982.00000000083E9000.00000004.00000001.sdmp Binary or memory string: VMware SATA CD00
Source: explorer.exe, 0000000E.00000000.447425630.00000000062E0000.00000004.00000001.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: 9thuIDnsFV.exe Binary or memory string: drNC7TIZTDW2xdJg6023IiTjmTuQlBYEtkPt+T/Us4SLdWi2qlCcddJ8V\7R0tAT+wpPaK51PoqE0nSbQ8X0gIV1QeMUdu7fBCInEO6ADyk+Y6Pj50bA89PiZBRwnUO9K3Ns0/btgvn5n7ypGhhTP0mZCoNxZCnK\7nl3WEoY5NqGqiGi1R8cYbO9DuvgNpNPQlR0tOwm091GcDraPdworFfl+/7zsOq5SWDlDvKmIEUiEy8m9CKUXDLxi9/PJynX1DX
Source: explorer.exe, 0000000E.00000000.452004662.00000000082E2000.00000004.00000001.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
Source: 9thuIDnsFV.exe, 00000001.00000002.424675274.00000000033B6000.00000004.00000001.sdmp Binary or memory string: model0Microsoft|VMWare|Virtual
Source: explorer.exe, 0000000E.00000000.445336091.0000000005D50000.00000002.00000001.sdmp Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: explorer.exe, 0000000E.00000000.445336091.0000000005D50000.00000002.00000001.sdmp Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: explorer.exe, 0000000E.00000000.479950310.00000000045BE000.00000004.00000001.sdmp Binary or memory string: 8f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&
Source: explorer.exe, 0000000E.00000000.452004662.00000000082E2000.00000004.00000001.sdmp Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
Source: explorer.exe, 0000000E.00000000.452463166.0000000008430000.00000004.00000001.sdmp Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000-;
Source: 9thuIDnsFV.exe Binary or memory string: w9pCcvmCiBslevp3ENTZ7Gyl/KlvjcVV5O5tkWLNvHWw9ziuxOZ14kJmcS95b5CG53h40gwz2mI1prpmN63K34RqlKTfBw\782M5soaHLKwjrxjbF44wWMH/mXEYo9EtG3RCo8RZu8v2iOPMGsDtVxMtQ/RInns4u4kM+YSRbJmUomHt2yet9GjBmvzKjwGocN5e2\7S6Ai96HFLuDqu3p28Ouz3oupVo6bq9Tq4z84+QXrbm011Rn3/M4xD+nOhVufu
Source: explorer.exe, 0000000E.00000000.465503164.000000000095C000.00000004.00000020.sdmp Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}G
Source: explorer.exe, 0000000E.00000000.445336091.0000000005D50000.00000002.00000001.sdmp Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging:

barindex
Checks if the current process is being debugged
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Process queried: DebugPort Jump to behavior
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_00409A90 rdtsc 10_2_00409A90
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_0040ACD0 LdrLoadDll, 10_2_0040ACD0
Contains functionality to read the PEB
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A269A6 mov eax, dword ptr fs:[00000030h] 10_2_01A269A6
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019DFD9B mov eax, dword ptr fs:[00000030h] 10_2_019DFD9B
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019DFD9B mov eax, dword ptr fs:[00000030h] 10_2_019DFD9B
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D2990 mov eax, dword ptr fs:[00000030h] 10_2_019D2990
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A2D8A mov eax, dword ptr fs:[00000030h] 10_2_019A2D8A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A2D8A mov eax, dword ptr fs:[00000030h] 10_2_019A2D8A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A2D8A mov eax, dword ptr fs:[00000030h] 10_2_019A2D8A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A2D8A mov eax, dword ptr fs:[00000030h] 10_2_019A2D8A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A2D8A mov eax, dword ptr fs:[00000030h] 10_2_019A2D8A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019DA185 mov eax, dword ptr fs:[00000030h] 10_2_019DA185
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A251BE mov eax, dword ptr fs:[00000030h] 10_2_01A251BE
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A251BE mov eax, dword ptr fs:[00000030h] 10_2_01A251BE
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A251BE mov eax, dword ptr fs:[00000030h] 10_2_01A251BE
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A251BE mov eax, dword ptr fs:[00000030h] 10_2_01A251BE
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D2581 mov eax, dword ptr fs:[00000030h] 10_2_019D2581
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D2581 mov eax, dword ptr fs:[00000030h] 10_2_019D2581
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D2581 mov eax, dword ptr fs:[00000030h] 10_2_019D2581
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D2581 mov eax, dword ptr fs:[00000030h] 10_2_019D2581
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019CC182 mov eax, dword ptr fs:[00000030h] 10_2_019CC182
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D1DB5 mov eax, dword ptr fs:[00000030h] 10_2_019D1DB5
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D1DB5 mov eax, dword ptr fs:[00000030h] 10_2_019D1DB5
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D1DB5 mov eax, dword ptr fs:[00000030h] 10_2_019D1DB5
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D35A1 mov eax, dword ptr fs:[00000030h] 10_2_019D35A1
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D61A0 mov eax, dword ptr fs:[00000030h] 10_2_019D61A0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D61A0 mov eax, dword ptr fs:[00000030h] 10_2_019D61A0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A341E8 mov eax, dword ptr fs:[00000030h] 10_2_01A341E8
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A58DF1 mov eax, dword ptr fs:[00000030h] 10_2_01A58DF1
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A26DC9 mov eax, dword ptr fs:[00000030h] 10_2_01A26DC9
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A26DC9 mov eax, dword ptr fs:[00000030h] 10_2_01A26DC9
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A26DC9 mov eax, dword ptr fs:[00000030h] 10_2_01A26DC9
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A26DC9 mov ecx, dword ptr fs:[00000030h] 10_2_01A26DC9
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A26DC9 mov eax, dword ptr fs:[00000030h] 10_2_01A26DC9
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A26DC9 mov eax, dword ptr fs:[00000030h] 10_2_01A26DC9
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019AB1E1 mov eax, dword ptr fs:[00000030h] 10_2_019AB1E1
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019AB1E1 mov eax, dword ptr fs:[00000030h] 10_2_019AB1E1
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019AB1E1 mov eax, dword ptr fs:[00000030h] 10_2_019AB1E1
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019BD5E0 mov eax, dword ptr fs:[00000030h] 10_2_019BD5E0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019BD5E0 mov eax, dword ptr fs:[00000030h] 10_2_019BD5E0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A78D34 mov eax, dword ptr fs:[00000030h] 10_2_01A78D34
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A2A537 mov eax, dword ptr fs:[00000030h] 10_2_01A2A537
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A9100 mov eax, dword ptr fs:[00000030h] 10_2_019A9100
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A9100 mov eax, dword ptr fs:[00000030h] 10_2_019A9100
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A9100 mov eax, dword ptr fs:[00000030h] 10_2_019A9100
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D4D3B mov eax, dword ptr fs:[00000030h] 10_2_019D4D3B
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D4D3B mov eax, dword ptr fs:[00000030h] 10_2_019D4D3B
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D4D3B mov eax, dword ptr fs:[00000030h] 10_2_019D4D3B
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D513A mov eax, dword ptr fs:[00000030h] 10_2_019D513A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D513A mov eax, dword ptr fs:[00000030h] 10_2_019D513A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019AAD30 mov eax, dword ptr fs:[00000030h] 10_2_019AAD30
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h] 10_2_019B3D34
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h] 10_2_019B3D34
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h] 10_2_019B3D34
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h] 10_2_019B3D34
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h] 10_2_019B3D34
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h] 10_2_019B3D34
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h] 10_2_019B3D34
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h] 10_2_019B3D34
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h] 10_2_019B3D34
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h] 10_2_019B3D34
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h] 10_2_019B3D34
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h] 10_2_019B3D34
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h] 10_2_019B3D34
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019C4120 mov eax, dword ptr fs:[00000030h] 10_2_019C4120
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019C4120 mov eax, dword ptr fs:[00000030h] 10_2_019C4120
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019C4120 mov eax, dword ptr fs:[00000030h] 10_2_019C4120
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019C4120 mov eax, dword ptr fs:[00000030h] 10_2_019C4120
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019C4120 mov ecx, dword ptr fs:[00000030h] 10_2_019C4120
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019C7D50 mov eax, dword ptr fs:[00000030h] 10_2_019C7D50
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019CB944 mov eax, dword ptr fs:[00000030h] 10_2_019CB944
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019CB944 mov eax, dword ptr fs:[00000030h] 10_2_019CB944
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E3D43 mov eax, dword ptr fs:[00000030h] 10_2_019E3D43
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A23540 mov eax, dword ptr fs:[00000030h] 10_2_01A23540
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019AB171 mov eax, dword ptr fs:[00000030h] 10_2_019AB171
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019AB171 mov eax, dword ptr fs:[00000030h] 10_2_019AB171
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019CC577 mov eax, dword ptr fs:[00000030h] 10_2_019CC577
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019CC577 mov eax, dword ptr fs:[00000030h] 10_2_019CC577
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019AC962 mov eax, dword ptr fs:[00000030h] 10_2_019AC962
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B849B mov eax, dword ptr fs:[00000030h] 10_2_019B849B
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A9080 mov eax, dword ptr fs:[00000030h] 10_2_019A9080
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019DF0BF mov ecx, dword ptr fs:[00000030h] 10_2_019DF0BF
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019DF0BF mov eax, dword ptr fs:[00000030h] 10_2_019DF0BF
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019DF0BF mov eax, dword ptr fs:[00000030h] 10_2_019DF0BF
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A23884 mov eax, dword ptr fs:[00000030h] 10_2_01A23884
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A23884 mov eax, dword ptr fs:[00000030h] 10_2_01A23884
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E90AF mov eax, dword ptr fs:[00000030h] 10_2_019E90AF
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D20A0 mov eax, dword ptr fs:[00000030h] 10_2_019D20A0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D20A0 mov eax, dword ptr fs:[00000030h] 10_2_019D20A0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D20A0 mov eax, dword ptr fs:[00000030h] 10_2_019D20A0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D20A0 mov eax, dword ptr fs:[00000030h] 10_2_019D20A0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D20A0 mov eax, dword ptr fs:[00000030h] 10_2_019D20A0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D20A0 mov eax, dword ptr fs:[00000030h] 10_2_019D20A0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A26CF0 mov eax, dword ptr fs:[00000030h] 10_2_01A26CF0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A26CF0 mov eax, dword ptr fs:[00000030h] 10_2_01A26CF0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A26CF0 mov eax, dword ptr fs:[00000030h] 10_2_01A26CF0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A614FB mov eax, dword ptr fs:[00000030h] 10_2_01A614FB
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A78CD6 mov eax, dword ptr fs:[00000030h] 10_2_01A78CD6
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A3B8D0 mov eax, dword ptr fs:[00000030h] 10_2_01A3B8D0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A3B8D0 mov ecx, dword ptr fs:[00000030h] 10_2_01A3B8D0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A3B8D0 mov eax, dword ptr fs:[00000030h] 10_2_01A3B8D0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A3B8D0 mov eax, dword ptr fs:[00000030h] 10_2_01A3B8D0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A3B8D0 mov eax, dword ptr fs:[00000030h] 10_2_01A3B8D0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A3B8D0 mov eax, dword ptr fs:[00000030h] 10_2_01A3B8D0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A58EC mov eax, dword ptr fs:[00000030h] 10_2_019A58EC
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h] 10_2_01A61C06
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h] 10_2_01A61C06
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h] 10_2_01A61C06
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h] 10_2_01A61C06
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h] 10_2_01A61C06
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h] 10_2_01A61C06
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h] 10_2_01A61C06
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h] 10_2_01A61C06
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h] 10_2_01A61C06
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h] 10_2_01A61C06
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h] 10_2_01A61C06
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h] 10_2_01A61C06
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h] 10_2_01A61C06
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h] 10_2_01A61C06
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A26C0A mov eax, dword ptr fs:[00000030h] 10_2_01A26C0A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A26C0A mov eax, dword ptr fs:[00000030h] 10_2_01A26C0A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A26C0A mov eax, dword ptr fs:[00000030h] 10_2_01A26C0A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A26C0A mov eax, dword ptr fs:[00000030h] 10_2_01A26C0A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A7740D mov eax, dword ptr fs:[00000030h] 10_2_01A7740D
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A7740D mov eax, dword ptr fs:[00000030h] 10_2_01A7740D
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A7740D mov eax, dword ptr fs:[00000030h] 10_2_01A7740D
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D002D mov eax, dword ptr fs:[00000030h] 10_2_019D002D
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D002D mov eax, dword ptr fs:[00000030h] 10_2_019D002D
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D002D mov eax, dword ptr fs:[00000030h] 10_2_019D002D
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D002D mov eax, dword ptr fs:[00000030h] 10_2_019D002D
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D002D mov eax, dword ptr fs:[00000030h] 10_2_019D002D
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019BB02A mov eax, dword ptr fs:[00000030h] 10_2_019BB02A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019BB02A mov eax, dword ptr fs:[00000030h] 10_2_019BB02A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019BB02A mov eax, dword ptr fs:[00000030h] 10_2_019BB02A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019BB02A mov eax, dword ptr fs:[00000030h] 10_2_019BB02A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019DBC2C mov eax, dword ptr fs:[00000030h] 10_2_019DBC2C
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A74015 mov eax, dword ptr fs:[00000030h] 10_2_01A74015
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A74015 mov eax, dword ptr fs:[00000030h] 10_2_01A74015
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A27016 mov eax, dword ptr fs:[00000030h] 10_2_01A27016
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A27016 mov eax, dword ptr fs:[00000030h] 10_2_01A27016
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A27016 mov eax, dword ptr fs:[00000030h] 10_2_01A27016
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019C0050 mov eax, dword ptr fs:[00000030h] 10_2_019C0050
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019C0050 mov eax, dword ptr fs:[00000030h] 10_2_019C0050
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A71074 mov eax, dword ptr fs:[00000030h] 10_2_01A71074
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A62073 mov eax, dword ptr fs:[00000030h] 10_2_01A62073
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019DA44B mov eax, dword ptr fs:[00000030h] 10_2_019DA44B
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019C746D mov eax, dword ptr fs:[00000030h] 10_2_019C746D
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A3C450 mov eax, dword ptr fs:[00000030h] 10_2_01A3C450
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A3C450 mov eax, dword ptr fs:[00000030h] 10_2_01A3C450
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A75BA5 mov eax, dword ptr fs:[00000030h] 10_2_01A75BA5
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D2397 mov eax, dword ptr fs:[00000030h] 10_2_019D2397
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019DB390 mov eax, dword ptr fs:[00000030h] 10_2_019DB390
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B8794 mov eax, dword ptr fs:[00000030h] 10_2_019B8794
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B1B8F mov eax, dword ptr fs:[00000030h] 10_2_019B1B8F
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B1B8F mov eax, dword ptr fs:[00000030h] 10_2_019B1B8F
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A5D380 mov ecx, dword ptr fs:[00000030h] 10_2_01A5D380
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A6138A mov eax, dword ptr fs:[00000030h] 10_2_01A6138A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D4BAD mov eax, dword ptr fs:[00000030h] 10_2_019D4BAD
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D4BAD mov eax, dword ptr fs:[00000030h] 10_2_019D4BAD
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D4BAD mov eax, dword ptr fs:[00000030h] 10_2_019D4BAD
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A27794 mov eax, dword ptr fs:[00000030h] 10_2_01A27794
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A27794 mov eax, dword ptr fs:[00000030h] 10_2_01A27794
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A27794 mov eax, dword ptr fs:[00000030h] 10_2_01A27794
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A253CA mov eax, dword ptr fs:[00000030h] 10_2_01A253CA
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A253CA mov eax, dword ptr fs:[00000030h] 10_2_01A253CA
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E37F5 mov eax, dword ptr fs:[00000030h] 10_2_019E37F5
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019CDBE9 mov eax, dword ptr fs:[00000030h] 10_2_019CDBE9
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D03E2 mov eax, dword ptr fs:[00000030h] 10_2_019D03E2
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D03E2 mov eax, dword ptr fs:[00000030h] 10_2_019D03E2
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D03E2 mov eax, dword ptr fs:[00000030h] 10_2_019D03E2
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D03E2 mov eax, dword ptr fs:[00000030h] 10_2_019D03E2
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D03E2 mov eax, dword ptr fs:[00000030h] 10_2_019D03E2
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D03E2 mov eax, dword ptr fs:[00000030h] 10_2_019D03E2
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019CF716 mov eax, dword ptr fs:[00000030h] 10_2_019CF716
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019DA70E mov eax, dword ptr fs:[00000030h] 10_2_019DA70E
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019DA70E mov eax, dword ptr fs:[00000030h] 10_2_019DA70E
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A7070D mov eax, dword ptr fs:[00000030h] 10_2_01A7070D
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A7070D mov eax, dword ptr fs:[00000030h] 10_2_01A7070D
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019DE730 mov eax, dword ptr fs:[00000030h] 10_2_019DE730
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A3FF10 mov eax, dword ptr fs:[00000030h] 10_2_01A3FF10
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A3FF10 mov eax, dword ptr fs:[00000030h] 10_2_01A3FF10
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A4F2E mov eax, dword ptr fs:[00000030h] 10_2_019A4F2E
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A4F2E mov eax, dword ptr fs:[00000030h] 10_2_019A4F2E
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A6131B mov eax, dword ptr fs:[00000030h] 10_2_01A6131B
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019AF358 mov eax, dword ptr fs:[00000030h] 10_2_019AF358
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A78F6A mov eax, dword ptr fs:[00000030h] 10_2_01A78F6A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019ADB40 mov eax, dword ptr fs:[00000030h] 10_2_019ADB40
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019BEF40 mov eax, dword ptr fs:[00000030h] 10_2_019BEF40
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D3B7A mov eax, dword ptr fs:[00000030h] 10_2_019D3B7A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D3B7A mov eax, dword ptr fs:[00000030h] 10_2_019D3B7A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019ADB60 mov ecx, dword ptr fs:[00000030h] 10_2_019ADB60
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019BFF60 mov eax, dword ptr fs:[00000030h] 10_2_019BFF60
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A78B58 mov eax, dword ptr fs:[00000030h] 10_2_01A78B58
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A70EA5 mov eax, dword ptr fs:[00000030h] 10_2_01A70EA5
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A70EA5 mov eax, dword ptr fs:[00000030h] 10_2_01A70EA5
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A70EA5 mov eax, dword ptr fs:[00000030h] 10_2_01A70EA5
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A246A7 mov eax, dword ptr fs:[00000030h] 10_2_01A246A7
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019DD294 mov eax, dword ptr fs:[00000030h] 10_2_019DD294
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019DD294 mov eax, dword ptr fs:[00000030h] 10_2_019DD294
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A3FE87 mov eax, dword ptr fs:[00000030h] 10_2_01A3FE87
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019BAAB0 mov eax, dword ptr fs:[00000030h] 10_2_019BAAB0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019BAAB0 mov eax, dword ptr fs:[00000030h] 10_2_019BAAB0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019DFAB0 mov eax, dword ptr fs:[00000030h] 10_2_019DFAB0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A52A5 mov eax, dword ptr fs:[00000030h] 10_2_019A52A5
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A52A5 mov eax, dword ptr fs:[00000030h] 10_2_019A52A5
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A52A5 mov eax, dword ptr fs:[00000030h] 10_2_019A52A5
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A52A5 mov eax, dword ptr fs:[00000030h] 10_2_019A52A5
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A52A5 mov eax, dword ptr fs:[00000030h] 10_2_019A52A5
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D36CC mov eax, dword ptr fs:[00000030h] 10_2_019D36CC
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D2ACB mov eax, dword ptr fs:[00000030h] 10_2_019D2ACB
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E8EC7 mov eax, dword ptr fs:[00000030h] 10_2_019E8EC7
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A5FEC0 mov eax, dword ptr fs:[00000030h] 10_2_01A5FEC0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A78ED6 mov eax, dword ptr fs:[00000030h] 10_2_01A78ED6
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B76E2 mov eax, dword ptr fs:[00000030h] 10_2_019B76E2
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D2AE4 mov eax, dword ptr fs:[00000030h] 10_2_019D2AE4
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D16E0 mov ecx, dword ptr fs:[00000030h] 10_2_019D16E0
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019C3A1C mov eax, dword ptr fs:[00000030h] 10_2_019C3A1C
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019DA61C mov eax, dword ptr fs:[00000030h] 10_2_019DA61C
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019DA61C mov eax, dword ptr fs:[00000030h] 10_2_019DA61C
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A5210 mov eax, dword ptr fs:[00000030h] 10_2_019A5210
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A5210 mov ecx, dword ptr fs:[00000030h] 10_2_019A5210
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A5210 mov eax, dword ptr fs:[00000030h] 10_2_019A5210
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A5210 mov eax, dword ptr fs:[00000030h] 10_2_019A5210
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019AAA16 mov eax, dword ptr fs:[00000030h] 10_2_019AAA16
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019AAA16 mov eax, dword ptr fs:[00000030h] 10_2_019AAA16
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B8A0A mov eax, dword ptr fs:[00000030h] 10_2_019B8A0A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A5FE3F mov eax, dword ptr fs:[00000030h] 10_2_01A5FE3F
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019AC600 mov eax, dword ptr fs:[00000030h] 10_2_019AC600
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019AC600 mov eax, dword ptr fs:[00000030h] 10_2_019AC600
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019AC600 mov eax, dword ptr fs:[00000030h] 10_2_019AC600
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019D8E00 mov eax, dword ptr fs:[00000030h] 10_2_019D8E00
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E4A2C mov eax, dword ptr fs:[00000030h] 10_2_019E4A2C
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E4A2C mov eax, dword ptr fs:[00000030h] 10_2_019E4A2C
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019AE620 mov eax, dword ptr fs:[00000030h] 10_2_019AE620
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A5B260 mov eax, dword ptr fs:[00000030h] 10_2_01A5B260
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A5B260 mov eax, dword ptr fs:[00000030h] 10_2_01A5B260
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A78A62 mov eax, dword ptr fs:[00000030h] 10_2_01A78A62
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A9240 mov eax, dword ptr fs:[00000030h] 10_2_019A9240
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A9240 mov eax, dword ptr fs:[00000030h] 10_2_019A9240
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A9240 mov eax, dword ptr fs:[00000030h] 10_2_019A9240
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019A9240 mov eax, dword ptr fs:[00000030h] 10_2_019A9240
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B7E41 mov eax, dword ptr fs:[00000030h] 10_2_019B7E41
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B7E41 mov eax, dword ptr fs:[00000030h] 10_2_019B7E41
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B7E41 mov eax, dword ptr fs:[00000030h] 10_2_019B7E41
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B7E41 mov eax, dword ptr fs:[00000030h] 10_2_019B7E41
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B7E41 mov eax, dword ptr fs:[00000030h] 10_2_019B7E41
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B7E41 mov eax, dword ptr fs:[00000030h] 10_2_019B7E41
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019E927A mov eax, dword ptr fs:[00000030h] 10_2_019E927A
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019CAE73 mov eax, dword ptr fs:[00000030h] 10_2_019CAE73
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019CAE73 mov eax, dword ptr fs:[00000030h] 10_2_019CAE73
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019CAE73 mov eax, dword ptr fs:[00000030h] 10_2_019CAE73
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019CAE73 mov eax, dword ptr fs:[00000030h] 10_2_019CAE73
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019CAE73 mov eax, dword ptr fs:[00000030h] 10_2_019CAE73
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_01A34257 mov eax, dword ptr fs:[00000030h] 10_2_01A34257
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Code function: 10_2_019B766D mov eax, dword ptr fs:[00000030h] 10_2_019B766D
Enables debug privileges
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\explorer.exe Network Connect: 5.79.68.101 80 Jump to behavior
Source: C:\Windows\explorer.exe Domain query: www.driplockerstore.com
Injects a PE file into a foreign processes
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Memory written: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe base: 400000 value starts with: 4D5A Jump to behavior
Maps a DLL or memory area into another process
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Section loaded: unknown target: C:\Windows\SysWOW64\wlanext.exe protection: execute and read and write Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Section loaded: unknown target: C:\Windows\SysWOW64\wlanext.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write Jump to behavior
Modifies the context of a thread in another process (thread injection)
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Thread register set: target process: 3440 Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Thread register set: target process: 3440 Jump to behavior
Queues an APC in another process (thread injection)
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Thread APC queued: target process: C:\Windows\explorer.exe Jump to behavior
Sample uses process hollowing technique
Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe Section unmapped: C:\Windows\SysWOW64\wlanext.exe base address: 2B0000 Jump to behavior
Writes to foreign memory regions
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Memory written: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe base: 400000 Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Memory written: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe base: 401000 Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Memory written: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe base: 1189008 Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Process created: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe vgyjnbhui Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe' Jump to behavior
Source: explorer.exe, 0000000E.00000000.467119162.0000000000EE0000.00000002.00000001.sdmp, wlanext.exe, 00000014.00000002.599758383.0000000004210000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd
Source: explorer.exe, 0000000E.00000000.467119162.0000000000EE0000.00000002.00000001.sdmp, wlanext.exe, 00000014.00000002.599758383.0000000004210000.00000002.00000001.sdmp Binary or memory string: Progman
Source: explorer.exe, 0000000E.00000000.467119162.0000000000EE0000.00000002.00000001.sdmp, wlanext.exe, 00000014.00000002.599758383.0000000004210000.00000002.00000001.sdmp Binary or memory string: &Program Manager
Source: explorer.exe, 0000000E.00000000.467119162.0000000000EE0000.00000002.00000001.sdmp, wlanext.exe, 00000014.00000002.599758383.0000000004210000.00000002.00000001.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Users\user\Desktop\9thuIDnsFV.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\9thuIDnsFV.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information:

barindex
Yara detected FormBook
Source: Yara match File source: 10.2.9thuIDnsFV.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.9thuIDnsFV.exe.45b0350.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.9thuIDnsFV.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.9thuIDnsFV.exe.45140c8.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, type: MEMORY

Remote Access Functionality:

barindex
Yara detected FormBook
Source: Yara match File source: 10.2.9thuIDnsFV.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.9thuIDnsFV.exe.45b0350.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.9thuIDnsFV.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.9thuIDnsFV.exe.45140c8.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs