Click to jump to signature section
Source: EBAbsk8ydv.exe | Virustotal: Detection: 12% | Perma Link |
Source: EBAbsk8ydv.exe | ReversingLabs: Detection: 13% |
Source: EBAbsk8ydv.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: E:\F1_proj_trunk\f1\src\features\qbroker\Release\qbroker64.pdb; source: EBAbsk8ydv.exe |
Source: | Binary string: E:\F1_proj_trunk\f1\src\features\qbroker\Release\qbroker64.pdb source: EBAbsk8ydv.exe |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9F14C0 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExW,_errno,_errno,_wfullpath,_errno,_errno,_errno,_wfullpath,IsRootUNCName,GetDriveTypeW,free,__loctotime64_t,free,_wsopen_s,_fstat64,_close,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,__loctotime64_t,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,__loctotime64_t,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,__loctotime64_t,FindClose,__wdtoxmode,GetLastError,_dosmaperr,FindClose,GetLastError,_dosmaperr,FindClose, | 0_2_00007FF7FA9F14C0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9E8C4C FindFirstFileW,FindClose, | 0_2_00007FF7FA9E8C4C |
Source: | DNS query: xn--ypd.dssdhome.xyz |
Source: | DNS query: xn--ypd.dssdhome.xyz |
Source: Joe Sandbox View | IP Address: 169.150.247.37 169.150.247.37 |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | HTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz |
Source: global traffic | DNS traffic detected: DNS query: xn--ypd.dssdhome.xyz |
Source: EBAbsk8ydv.exe, 00000000.00000002.3938638347.00000065E12FA000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://11.dssdhome.xyz/11/ip.bin |
Source: EBAbsk8ydv.exe | String found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0 |
Source: EBAbsk8ydv.exe | String found in binary or memory: http://ocsp.thawte.com0 |
Source: EBAbsk8ydv.exe | String found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0 |
Source: EBAbsk8ydv.exe | String found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0( |
Source: EBAbsk8ydv.exe | String found in binary or memory: http://ts-ocsp.ws.symantec.com07 |
Source: EBAbsk8ydv.exe, 00000000.00000003.3806545319.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3885206665.0000022251D29000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/ |
Source: EBAbsk8ydv.exe, 00000000.00000003.3920722011.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000002.3938753625.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3806545319.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/.2 |
Source: EBAbsk8ydv.exe, 00000000.00000003.3920722011.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000002.3938753625.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/.dll |
Source: EBAbsk8ydv.exe, 00000000.00000002.3938753625.0000022251CA8000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3499379857.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3806545319.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/11/ip.bin |
Source: EBAbsk8ydv.exe, 00000000.00000002.3938753625.0000022251CE0000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3920722011.0000022251CE0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/11/ip.binfU) |
Source: EBAbsk8ydv.exe, 00000000.00000003.3397293978.0000022251CE0000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3499474925.0000022251CE0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/11/ip.binsFF |
Source: EBAbsk8ydv.exe, 00000000.00000003.3920722011.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000002.3938753625.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3806545319.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/3 |
Source: EBAbsk8ydv.exe, 00000000.00000003.3499379857.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/dll |
Source: EBAbsk8ydv.exe, 00000000.00000003.3397209493.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3499379857.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/l |
Source: EBAbsk8ydv.exe, 00000000.00000003.3920722011.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000002.3938753625.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3806545319.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/n |
Source: EBAbsk8ydv.exe, 00000000.00000003.3499379857.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz/s.dll |
Source: EBAbsk8ydv.exe, 00000000.00000003.3920722011.0000022251D10000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xn--ypd.dssdhome.xyz:80/11/ip.bin |
Source: EBAbsk8ydv.exe, 00000000.00000003.3920722011.0000022251CE0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://xn--ypd.ds |
Source: EBAbsk8ydv.exe, 00000000.00000003.3397209493.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3921258964.0000022251D42000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3499379857.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3806545319.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000002.3938753625.0000022251CDC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://xn--ypd.dssdhome.xyz/11/ip.bin |
Source: EBAbsk8ydv.exe, 00000000.00000003.3397209493.0000022251D03000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3920722011.0000022251CFD000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000002.3938753625.0000022251CFD000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3499379857.0000022251D04000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3806545319.0000022251CE0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://xn--ypd.dssdhome.xyz/11/ip.binLocationETagAuthentication-InfoAgeAccept-RangesLast-ModifiedEx |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9EDD00: CreateFileW,DeviceIoControl,FindCloseChangeNotification, | 0_2_00007FF7FA9EDD00 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9ED434 | 0_2_00007FF7FA9ED434 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9ED9A0 | 0_2_00007FF7FA9ED9A0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9E6FB1 | 0_2_00007FF7FA9E6FB1 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9D1848 | 0_2_00007FF7FA9D1848 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FAA07B2C | 0_2_00007FF7FAA07B2C |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9F2B78 | 0_2_00007FF7FA9F2B78 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9F14C0 | 0_2_00007FF7FA9F14C0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FAA014E0 | 0_2_00007FF7FAA014E0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FAA02454 | 0_2_00007FF7FAA02454 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FAA0442C | 0_2_00007FF7FAA0442C |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9F4C2C | 0_2_00007FF7FA9F4C2C |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9DEA00 | 0_2_00007FF7FA9DEA00 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9E29E4 | 0_2_00007FF7FA9E29E4 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9EE1E8 | 0_2_00007FF7FA9EE1E8 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9D7144 | 0_2_00007FF7FA9D7144 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FAA072C8 | 0_2_00007FF7FAA072C8 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9E0AAC | 0_2_00007FF7FA9E0AAC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9F6AAC | 0_2_00007FF7FA9F6AAC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9FA278 | 0_2_00007FF7FA9FA278 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9D3FD4 | 0_2_00007FF7FA9D3FD4 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9FC7B4 | 0_2_00007FF7FA9FC7B4 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9FAFF0 | 0_2_00007FF7FA9FAFF0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FAA04890 | 0_2_00007FF7FAA04890 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9F5D54 | 0_2_00007FF7FA9F5D54 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FAA08D8C | 0_2_00007FF7FAA08D8C |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FAA00EBC | 0_2_00007FF7FAA00EBC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9F9EC8 | 0_2_00007FF7FA9F9EC8 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9F4EA0 | 0_2_00007FF7FA9F4EA0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9FB6AC | 0_2_00007FF7FA9FB6AC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9F2E90 | 0_2_00007FF7FA9F2E90 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9E7670 | 0_2_00007FF7FA9E7670 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FAA0A660 | 0_2_00007FF7FAA0A660 |
Source: EBAbsk8ydv.exe | Static PE information: invalid certificate |
Source: EBAbsk8ydv.exe | Binary or memory string: OriginalFilename vs EBAbsk8ydv.exe |
Source: EBAbsk8ydv.exe, 00000000.00000002.3939157823.00007FF7FAA25000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameqbroker.exe, vs EBAbsk8ydv.exe |
Source: EBAbsk8ydv.exe | Binary or memory string: OriginalFilenameqbroker.exe, vs EBAbsk8ydv.exe |
Source: classification engine | Classification label: mal56.troj.winEXE@1/0@2/1 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9DEFA0 GetCurrentThreadId,PostThreadMessageW,Sleep,ShellExecuteW,CoCreateInstance,CoCreateInstance, | 0_2_00007FF7FA9DEFA0 |
Source: EBAbsk8ydv.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: EBAbsk8ydv.exe | Virustotal: Detection: 12% |
Source: EBAbsk8ydv.exe | ReversingLabs: Detection: 13% |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: EBAbsk8ydv.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: EBAbsk8ydv.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT |
Source: EBAbsk8ydv.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE |
Source: EBAbsk8ydv.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC |
Source: EBAbsk8ydv.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: EBAbsk8ydv.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG |
Source: EBAbsk8ydv.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT |
Source: EBAbsk8ydv.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: EBAbsk8ydv.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: | Binary string: E:\F1_proj_trunk\f1\src\features\qbroker\Release\qbroker64.pdb; source: EBAbsk8ydv.exe |
Source: | Binary string: E:\F1_proj_trunk\f1\src\features\qbroker\Release\qbroker64.pdb source: EBAbsk8ydv.exe |
Source: EBAbsk8ydv.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: EBAbsk8ydv.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: EBAbsk8ydv.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: EBAbsk8ydv.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: EBAbsk8ydv.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9ECF60 GetSystemDirectoryW,LoadLibraryW,GetProcAddress,GetAdaptersInfo,FreeLibrary, | 0_2_00007FF7FA9ECF60 |
Source: EBAbsk8ydv.exe | Static PE information: real checksum: 0x63c9a should be: 0x61a23 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: CreateFileW,DeviceIoControl,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d | 0_2_00007FF7FA9ED434 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: CreateFileW,DeviceIoControl,isalnum,isalnum,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive%d | 0_2_00007FF7FA9ED9A0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: CreateFileW,DeviceIoControl,malloc,DeviceIoControl,free,CloseHandle, \\.\PhysicalDrive%d | 0_2_00007FF7FA9ED748 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: CreateFileW,DeviceIoControl,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d | 0_2_00007FF7FA9ED434 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: CreateFileW,DeviceIoControl,isalnum,isalnum,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive%d | 0_2_00007FF7FA9ED9A0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: CreateFileW,DeviceIoControl,malloc,DeviceIoControl,free,CloseHandle, \\.\PhysicalDrive%d | 0_2_00007FF7FA9ED748 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9F2B78 EncodePointer,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, | 0_2_00007FF7FA9F2B78 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: GetSystemDirectoryW,LoadLibraryW,GetProcAddress,GetAdaptersInfo,FreeLibrary, | 0_2_00007FF7FA9ECF60 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Evasive API call chain: GetSystemTimeAsFileTime,DecisionNodes | graph_0-22256 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe TID: 420 | Thread sleep time: -60000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe TID: 420 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Last function: Thread delayed |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9F14C0 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExW,_errno,_errno,_wfullpath,_errno,_errno,_errno,_wfullpath,IsRootUNCName,GetDriveTypeW,free,__loctotime64_t,free,_wsopen_s,_fstat64,_close,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,__loctotime64_t,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,__loctotime64_t,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,__loctotime64_t,FindClose,__wdtoxmode,GetLastError,_dosmaperr,FindClose,GetLastError,_dosmaperr,FindClose, | 0_2_00007FF7FA9F14C0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9E8C4C FindFirstFileW,FindClose, | 0_2_00007FF7FA9E8C4C |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9E06C4 GetSystemTimeAsFileTime,GetModuleHandleW,GetProcAddress,GetSystemInfo,GetSystemDefaultLangID,InternetOpenA,InternetSetOptionW,InternetConnectW, | 0_2_00007FF7FA9E06C4 |
Source: EBAbsk8ydv.exe, 00000000.00000003.3920722011.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3397209493.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3499379857.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000002.3938753625.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3806545319.0000022251D1D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: EBAbsk8ydv.exe, 00000000.00000002.3938753625.0000022251CA8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW0s |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9EECDC GetLastError,IsDebuggerPresent,OutputDebugStringW, | 0_2_00007FF7FA9EECDC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9EECDC GetLastError,IsDebuggerPresent,OutputDebugStringW, | 0_2_00007FF7FA9EECDC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9ECF60 GetSystemDirectoryW,LoadLibraryW,GetProcAddress,GetAdaptersInfo,FreeLibrary, | 0_2_00007FF7FA9ECF60 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FAA04D00 _lseeki64_nolock,_lseeki64_nolock,GetProcessHeap,HeapAlloc,_errno,_errno,_setmode_nolock,_write_nolock,__doserrno,_errno,_setmode_nolock,GetProcessHeap,HeapFree,_lseeki64_nolock,_get_osfhandle,SetEndOfFile,_errno,__doserrno,GetLastError,_lseeki64_nolock, | 0_2_00007FF7FAA04D00 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9F87D8 SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00007FF7FA9F87D8 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,TestDefaultLanguage, | 0_2_00007FF7FAA01BD0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: __crtGetLocaleInfoEx, | 0_2_00007FF7FAA013DC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,GetACP, | 0_2_00007FF7FAA01328 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,IsValidCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,wcschr,wcschr,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_invoke_watson,_invoke_watson,_getptd,_getptd,LcidFromHexString,GetLocaleInfoW, | 0_2_00007FF7FAA014E0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: __crtGetLocaleInfoEx,malloc,__crtGetLocaleInfoEx,WideCharToMultiByte,free, | 0_2_00007FF7FA9FE4DC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,TestDefaultLanguage, | 0_2_00007FF7FAA019A0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: __crtDownlevelLocaleNameToLCID,GetLocaleInfoW, | 0_2_00007FF7FA9FE944 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: EnumSystemLocalesW, | 0_2_00007FF7FA9FE900 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _getptd,EnumSystemLocalesW, | 0_2_00007FF7FAA0190C |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _getptd,EnumSystemLocalesW, | 0_2_00007FF7FAA01858 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _getptd,GetLocaleInfoW, | 0_2_00007FF7FAA01DCC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: __crtGetLocaleInfoA,GetLastError,__crtGetLocaleInfoA,_calloc_crt,__crtGetLocaleInfoA,_calloc_crt,free,free,__crtGetLocaleInfoEx,_calloc_crt,__crtGetLocaleInfoEx,free,__crtGetLocaleInfoEx,_invoke_watson, | 0_2_00007FF7FA9F3598 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 0_2_00007FF7FAA01D1C |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _getptd,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,TestDefaultCountry,__crtGetLocaleInfoEx,TestDefaultCountry,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_getptd,__crtGetLocaleInfoEx,_invoke_watson, | 0_2_00007FF7FAA00EBC |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,GetACP,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson, | 0_2_00007FF7FA9F4EA0 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, | 0_2_00007FF7FA9FE648 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: _getptd,_getptd,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,_getptd,EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,__crtDownlevelLCIDToLocaleName,__crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,_itow_s, | 0_2_00007FF7FAA01E74 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FA9E06C4 GetSystemTimeAsFileTime,GetModuleHandleW,GetProcAddress,GetSystemInfo,GetSystemDefaultLangID,InternetOpenA,InternetSetOptionW,InternetConnectW, | 0_2_00007FF7FA9E06C4 |
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe | Code function: 0_2_00007FF7FAA0442C _lock,_get_daylight,_get_daylight,_get_daylight,___lc_codepage_func,_getenv_helper_nolock,free,_malloc_crt,_invoke_watson,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson, | 0_2_00007FF7FAA0442C |