Click to jump to signature section
Source: EBAbsk8ydv.exe | ReversingLabs: Detection: 13% |
Source: EBAbsk8ydv.exe | Virustotal: Detection: 12% | Perma Link |
Source: EBAbsk8ydv.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: E:\F1_proj_trunk\f1\src\features\qbroker\Release\qbroker64.pdb; source: EBAbsk8ydv.exe |
Source: | Binary string: E:\F1_proj_trunk\f1\src\features\qbroker\Release\qbroker64.pdb source: EBAbsk8ydv.exe |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD614C0 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExW,_errno,_errno,_wfullpath,_errno,_errno,_errno,_wfullpath,IsRootUNCName,GetDriveTypeW,free,__loctotime64_t,free,_wsopen_s,_fstat64,_close,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,__loctotime64_t,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,__loctotime64_t,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,__loctotime64_t,FindClose,__wdtoxmode,GetLastError,_dosmaperr,FindClose,GetLastError,_dosmaperr,FindClose, | 0_2_00007FF61BD614C0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD58C4C FindFirstFileW,FindClose, | 0_2_00007FF61BD58C4C |
Source: | DNS query: xn--ypd.dssdhome.xyz |
Source: Joe Sandbox View | IP Address: 169.150.247.38 169.150.247.38 |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | DNS traffic detected: DNS query: xn--ypd.dssdhome.xyz |
Source: EBAbsk8ydv.exe, 00000000.00000002.3273555261.000000EF41CFA000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://11.dssdhome.xyz/11/ip.bin |
Source: EBAbsk8ydv.exe | String found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0 |
Source: EBAbsk8ydv.exe | String found in binary or memory: http://ocsp.thawte.com0 |
Source: EBAbsk8ydv.exe | String found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0 |
Source: EBAbsk8ydv.exe | String found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0( |
Source: EBAbsk8ydv.exe | String found in binary or memory: http://ts-ocsp.ws.symantec.com07 |
Source: EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/ |
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/.2 |
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/.2&aGV |
Source: EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/.2refox/70.2 |
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA189000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA148000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA180000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/11/ip.bin |
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/11/ip.bin. |
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA189000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/11/ip.binI |
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/11/ip.binx |
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA189000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA180000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/11/ip.binz |
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/ll |
Source: EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/lla |
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/xa |
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA148000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz:80/11/ip.bin |
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz:80/11/ip.binP&o9V |
Source: EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz:80/11/ip.binPf |
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz:80/11/ip.biny |
Source: EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://xn--ypd.dssdhome.xyz/11/ip.bin |
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://xn--ypd.dssdhome.xyz/11/ip.binE |
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://xn--ypd.dssdhome.xyz/11/ip.bino |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD5DD00: CreateFileW,DeviceIoControl,FindCloseChangeNotification, | 0_2_00007FF61BD5DD00 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD5D434 | 0_2_00007FF61BD5D434 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD5D9A0 | 0_2_00007FF61BD5D9A0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD41848 | 0_2_00007FF61BD41848 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD56FB1 | 0_2_00007FF61BD56FB1 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD714E0 | 0_2_00007FF61BD714E0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD614C0 | 0_2_00007FF61BD614C0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD72454 | 0_2_00007FF61BD72454 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD7442C | 0_2_00007FF61BD7442C |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD64C2C | 0_2_00007FF61BD64C2C |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD62B78 | 0_2_00007FF61BD62B78 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD77B2C | 0_2_00007FF61BD77B2C |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD772C8 | 0_2_00007FF61BD772C8 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD50AAC | 0_2_00007FF61BD50AAC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD66AAC | 0_2_00007FF61BD66AAC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD6A278 | 0_2_00007FF61BD6A278 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD4EA00 | 0_2_00007FF61BD4EA00 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD529E4 | 0_2_00007FF61BD529E4 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD5E1E8 | 0_2_00007FF61BD5E1E8 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD47144 | 0_2_00007FF61BD47144 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD74890 | 0_2_00007FF61BD74890 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD6AFF0 | 0_2_00007FF61BD6AFF0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD43FD4 | 0_2_00007FF61BD43FD4 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD6C7B4 | 0_2_00007FF61BD6C7B4 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD70EBC | 0_2_00007FF61BD70EBC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD69EC8 | 0_2_00007FF61BD69EC8 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD64EA0 | 0_2_00007FF61BD64EA0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD6B6AC | 0_2_00007FF61BD6B6AC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD62E90 | 0_2_00007FF61BD62E90 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD7A660 | 0_2_00007FF61BD7A660 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD57670 | 0_2_00007FF61BD57670 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD78D8C | 0_2_00007FF61BD78D8C |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD65D54 | 0_2_00007FF61BD65D54 |
Source: EBAbsk8ydv.exe | Static PE information: invalid certificate |
Source: EBAbsk8ydv.exe | Binary or memory string: OriginalFilename vs EBAbsk8ydv.exe |
Source: EBAbsk8ydv.exe, 00000000.00000000.2018453175.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameqbroker.exe, vs EBAbsk8ydv.exe |
Source: EBAbsk8ydv.exe | Binary or memory string: OriginalFilenameqbroker.exe, vs EBAbsk8ydv.exe |
Source: classification engine | Classification label: mal56.troj.winEXE@1/0@1/1 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD4EFA0 GetCurrentThreadId,PostThreadMessageW,Sleep,ShellExecuteW,CoCreateInstance,CoCreateInstance, | 0_2_00007FF61BD4EFA0 |
Source: EBAbsk8ydv.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: EBAbsk8ydv.exe | ReversingLabs: Detection: 13% |
Source: EBAbsk8ydv.exe | Virustotal: Detection: 12% |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: EBAbsk8ydv.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: EBAbsk8ydv.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT |
Source: EBAbsk8ydv.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE |
Source: EBAbsk8ydv.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC |
Source: EBAbsk8ydv.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: EBAbsk8ydv.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG |
Source: EBAbsk8ydv.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT |
Source: EBAbsk8ydv.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: EBAbsk8ydv.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: | Binary string: E:\F1_proj_trunk\f1\src\features\qbroker\Release\qbroker64.pdb; source: EBAbsk8ydv.exe |
Source: | Binary string: E:\F1_proj_trunk\f1\src\features\qbroker\Release\qbroker64.pdb source: EBAbsk8ydv.exe |
Source: EBAbsk8ydv.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: EBAbsk8ydv.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: EBAbsk8ydv.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: EBAbsk8ydv.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: EBAbsk8ydv.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD5CF60 GetSystemDirectoryW,LoadLibraryW,GetProcAddress,GetAdaptersInfo,FreeLibrary, | 0_2_00007FF61BD5CF60 |
Source: EBAbsk8ydv.exe | Static PE information: real checksum: 0x63c9a should be: 0x61a23 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: CreateFileW,DeviceIoControl,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d | 0_2_00007FF61BD5D434 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: CreateFileW,DeviceIoControl,isalnum,isalnum,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive%d | 0_2_00007FF61BD5D9A0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: CreateFileW,DeviceIoControl,malloc,DeviceIoControl,free,CloseHandle, \\.\PhysicalDrive%d | 0_2_00007FF61BD5D748 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: CreateFileW,DeviceIoControl,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d | 0_2_00007FF61BD5D434 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: CreateFileW,DeviceIoControl,isalnum,isalnum,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive%d | 0_2_00007FF61BD5D9A0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: CreateFileW,DeviceIoControl,malloc,DeviceIoControl,free,CloseHandle, \\.\PhysicalDrive%d | 0_2_00007FF61BD5D748 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD62B78 EncodePointer,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, | 0_2_00007FF61BD62B78 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: GetSystemDirectoryW,LoadLibraryW,GetProcAddress,GetAdaptersInfo,FreeLibrary, | 0_2_00007FF61BD5CF60 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Evasive API call chain: GetSystemTimeAsFileTime,DecisionNodes | graph_0-22258 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Last function: Thread delayed |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD614C0 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExW,_errno,_errno,_wfullpath,_errno,_errno,_errno,_wfullpath,IsRootUNCName,GetDriveTypeW,free,__loctotime64_t,free,_wsopen_s,_fstat64,_close,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,__loctotime64_t,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,__loctotime64_t,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,__loctotime64_t,FindClose,__wdtoxmode,GetLastError,_dosmaperr,FindClose,GetLastError,_dosmaperr,FindClose, | 0_2_00007FF61BD614C0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD58C4C FindFirstFileW,FindClose, | 0_2_00007FF61BD58C4C |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD506C4 GetSystemTimeAsFileTime,GetModuleHandleW,GetProcAddress,GetSystemInfo,GetSystemDefaultLangID,InternetOpenA,InternetSetOptionW,InternetConnectW, | 0_2_00007FF61BD506C4 |
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA148000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWp |
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD5ECDC GetLastError,IsDebuggerPresent,OutputDebugStringW, | 0_2_00007FF61BD5ECDC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD5ECDC GetLastError,IsDebuggerPresent,OutputDebugStringW, | 0_2_00007FF61BD5ECDC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD5CF60 GetSystemDirectoryW,LoadLibraryW,GetProcAddress,GetAdaptersInfo,FreeLibrary, | 0_2_00007FF61BD5CF60 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD74D00 _lseeki64_nolock,_lseeki64_nolock,GetProcessHeap,HeapAlloc,_errno,_errno,_setmode_nolock,_write_nolock,__doserrno,_errno,_setmode_nolock,GetProcessHeap,HeapFree,_lseeki64_nolock,_get_osfhandle,SetEndOfFile,_errno,__doserrno,GetLastError,_lseeki64_nolock, | 0_2_00007FF61BD74D00 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD687D8 SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00007FF61BD687D8 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 0_2_00007FF61BD71D1C |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: __crtGetLocaleInfoEx,malloc,__crtGetLocaleInfoEx,WideCharToMultiByte,free, | 0_2_00007FF61BD6E4DC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,IsValidCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,wcschr,wcschr,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_invoke_watson,_invoke_watson,_getptd,_getptd,LcidFromHexString,GetLocaleInfoW, | 0_2_00007FF61BD714E0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: __crtGetLocaleInfoEx, | 0_2_00007FF61BD713DC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,TestDefaultLanguage, | 0_2_00007FF61BD71BD0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,GetACP, | 0_2_00007FF61BD71328 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,TestDefaultLanguage, | 0_2_00007FF61BD719A0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: __crtDownlevelLocaleNameToLCID,GetLocaleInfoW, | 0_2_00007FF61BD6E944 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: EnumSystemLocalesW, | 0_2_00007FF61BD6E900 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _getptd,EnumSystemLocalesW, | 0_2_00007FF61BD7190C |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _getptd,EnumSystemLocalesW, | 0_2_00007FF61BD71858 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _getptd,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,TestDefaultCountry,__crtGetLocaleInfoEx,TestDefaultCountry,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_getptd,__crtGetLocaleInfoEx,_invoke_watson, | 0_2_00007FF61BD70EBC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,GetACP,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson, | 0_2_00007FF61BD64EA0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _getptd,_getptd,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,_getptd,EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,__crtDownlevelLCIDToLocaleName,__crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,_itow_s, | 0_2_00007FF61BD71E74 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, | 0_2_00007FF61BD6E648 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _getptd,GetLocaleInfoW, | 0_2_00007FF61BD71DCC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: __crtGetLocaleInfoA,GetLastError,__crtGetLocaleInfoA,_calloc_crt,__crtGetLocaleInfoA,_calloc_crt,free,free,__crtGetLocaleInfoEx,_calloc_crt,__crtGetLocaleInfoEx,free,__crtGetLocaleInfoEx,_invoke_watson, | 0_2_00007FF61BD63598 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD506C4 GetSystemTimeAsFileTime,GetModuleHandleW,GetProcAddress,GetSystemInfo,GetSystemDefaultLangID,InternetOpenA,InternetSetOptionW,InternetConnectW, | 0_2_00007FF61BD506C4 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF61BD7442C _lock,_get_daylight,_get_daylight,_get_daylight,___lc_codepage_func,_getenv_helper_nolock,free,_malloc_crt,_invoke_watson,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson, | 0_2_00007FF61BD7442C |