Windows Analysis Report
PO No. 3200005919.exe

Overview

General Information

Sample Name: PO No. 3200005919.exe
Analysis ID: 755357
MD5: 9453cdcf8221341d06bac47b8ab3aa19
SHA1: c35a23cdc61eb42594e1a39a23ccae06399263c0
SHA256: 7490acc48d1659234d61c1716c0d549880a98375f502502b60dcc71b49f7f14f
Tags: exe
Infos:

Detection

GuLoader
Score: 60
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
Uses 32bit PE files
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Detected potential crypto function
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

AV Detection

barindex
Source: PO No. 3200005919.exe Virustotal: Detection: 47% Perma Link
Source: PO No. 3200005919.exe ReversingLabs: Detection: 61%
Source: PO No. 3200005919.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: PO No. 3200005919.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Kelly1076\__HITDisplay__\00_Code\ProArt Code_Git\ProArt\x64\Release\WMIMethod.pdb source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.dr
Source: Binary string: qipcap.pdb source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr
Source: Binary string: qipcap.pdb0 source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Code function: 0_2_00402862 FindFirstFileW, 0_2_00402862
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Code function: 0_2_004066F3 FindFirstFileW,FindClose, 0_2_004066F3
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Code function: 0_2_00405ABE CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, 0_2_00405ABE
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.dr String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.dr String found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.dr String found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr String found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.dr String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.dr String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.dr String found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.dr String found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0J
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr String found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.dr String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: PO No. 3200005919.exe String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.dr String found in binary or memory: http://ocsp.digicert.com0C
Source: PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.dr String found in binary or memory: http://ocsp.digicert.com0H
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.dr String found in binary or memory: http://ocsp.digicert.com0I
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr String found in binary or memory: http://ocsp.digicert.com0N
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.dr String found in binary or memory: http://ocsp.digicert.com0O
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.dr String found in binary or memory: http://www.digicert.com/CPS0
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.dr String found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr String found in binary or memory: https://mozilla.org0
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.dr String found in binary or memory: https://www.digicert.com/CPS0
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Code function: 0_2_00405553 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard, 0_2_00405553
Source: PO No. 3200005919.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameqipcap.dll8 vs PO No. 3200005919.exe
Source: PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameWMIMethod.dllL vs PO No. 3200005919.exe
Source: PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameqipcap.dll8 vs PO No. 3200005919.exe
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Code function: 0_2_00403489 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, 0_2_00403489
Source: C:\Users\user\Desktop\PO No. 3200005919.exe File created: C:\Windows\leprousness.lnk Jump to behavior
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Code function: 0_2_00404D90 0_2_00404D90
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Code function: 0_2_00406ABA 0_2_00406ABA
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Process Stats: CPU usage > 98%
Source: PO No. 3200005919.exe Virustotal: Detection: 47%
Source: PO No. 3200005919.exe ReversingLabs: Detection: 61%
Source: C:\Users\user\Desktop\PO No. 3200005919.exe File read: C:\Users\user\Desktop\PO No. 3200005919.exe Jump to behavior
Source: PO No. 3200005919.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32 Jump to behavior
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Code function: 0_2_00403489 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, 0_2_00403489
Source: C:\Users\user\Desktop\PO No. 3200005919.exe File created: C:\Users\user\Overfurnished Jump to behavior
Source: C:\Users\user\Desktop\PO No. 3200005919.exe File created: C:\Users\user\AppData\Local\Temp\nsyEC5C.tmp Jump to behavior
Source: C:\Users\user\Desktop\PO No. 3200005919.exe File written: C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Afskede\Hitherunto\Sale\Swedish.ini Jump to behavior
Source: classification engine Classification label: mal60.troj.evad.winEXE@1/7@0/0
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Code function: 0_2_004020FE CoCreateInstance, 0_2_004020FE
Source: C:\Users\user\Desktop\PO No. 3200005919.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Code function: 0_2_00404814 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW, 0_2_00404814
Source: PO No. 3200005919.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Kelly1076\__HITDisplay__\00_Code\ProArt Code_Git\ProArt\x64\Release\WMIMethod.pdb source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.dr
Source: Binary string: qipcap.pdb source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr
Source: Binary string: qipcap.pdb0 source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr

Data Obfuscation

barindex
Source: Yara match File source: 00000000.00000002.761070766.0000000004020000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Code function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
Source: WMIMethod.dll.0.dr Static PE information: section name: _RDATA
Source: qipcap.dll.0.dr Static PE information: section name: .00cfg
Source: C:\Users\user\Desktop\PO No. 3200005919.exe File created: C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Circularizations126\Iltningernes\Mellivorous\qipcap.dll Jump to dropped file
Source: C:\Users\user\Desktop\PO No. 3200005919.exe File created: C:\Users\user\AppData\Local\Temp\nskA46.tmp\System.dll Jump to dropped file
Source: C:\Users\user\Desktop\PO No. 3200005919.exe File created: C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Circularizations126\Iltningernes\Mellivorous\WMIMethod.dll Jump to dropped file
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\PO No. 3200005919.exe RDTSC instruction interceptor: First address: 0000000004021F8B second address: 0000000004021F8B instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, 97171E49h 0x00000008 cmp ebx, ecx 0x0000000a jc 00007F22E4B28E52h 0x0000000c pushad 0x0000000d mov bl, 19h 0x0000000f cmp bl, 00000019h 0x00000012 jne 00007F22E4B4D606h 0x00000018 popad 0x00000019 test ah, ah 0x0000001b inc ebp 0x0000001c inc ebx 0x0000001d test ax, bx 0x00000020 rdtsc
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Dropped PE file which has not been started: C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Circularizations126\Iltningernes\Mellivorous\qipcap.dll Jump to dropped file
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Dropped PE file which has not been started: C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Circularizations126\Iltningernes\Mellivorous\WMIMethod.dll Jump to dropped file
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Code function: 0_2_00402862 FindFirstFileW, 0_2_00402862
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Code function: 0_2_004066F3 FindFirstFileW,FindClose, 0_2_004066F3
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Code function: 0_2_00405ABE CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, 0_2_00405ABE
Source: C:\Users\user\Desktop\PO No. 3200005919.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\PO No. 3200005919.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\PO No. 3200005919.exe Code function: 0_2_00403489 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, 0_2_00403489
No contacted IP infos