Windows Analysis Report
WER9Fz381n.exe

Overview

General Information

Sample name: WER9Fz381n.exe
renamed because original name is a hash value
Original sample name: 40d22787e79f76e54bfeb359822a4b3ad8e6bef6.exe
Analysis ID: 1546806
MD5: 256506e20fe6bddbe08403debd4c39cc
SHA1: 40d22787e79f76e54bfeb359822a4b3ad8e6bef6
SHA256: 81b8d673c51e5f98a4690c11f4f4f156349b2ab850733cbac4119c7c6ec3d804
Tags: exeReversingLabsuser-NDA0E
Infos:

Detection

Glupteba
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Glupteba
AI detected suspicious sample
Contain functionality to detect virtual machines
Found Tor onion address
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to read the PEB
Detected potential crypto function
Enables debug privileges
Found potential string decryption / allocating functions
IP address seen in connection with other malware
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
Glupteba Glupteba is a trojan horse malware that is one of the top ten malware variants of 2021. After infecting a system, the Glupteba malware can be used to deliver additional malware, steal user authentication information, and enroll the infected system in a cryptomining botnet. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.glupteba

AV Detection

barindex
Source: WER9Fz381n.exe Avira: detected
Source: WER9Fz381n.exe ReversingLabs: Detection: 84%
Source: Yara match File source: 4.2.WER9Fz381n.exe.400000.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.WER9Fz381n.exe.37f0000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.3.WER9Fz381n.exe.3700000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.WER9Fz381n.exe.400000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.WER9Fz381n.exe.400000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.WER9Fz381n.exe.2f70e67.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.WER9Fz381n.exe.37f0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.3.WER9Fz381n.exe.3700000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.WER9Fz381n.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.WER9Fz381n.exe.2e80e67.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: WER9Fz381n.exe PID: 7264, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: WER9Fz381n.exe PID: 7480, type: MEMORYSTR
Source: Submited Sample Integrated Neural Analysis Model: Matched 98.4% probability
Source: WER9Fz381n.exe Joe Sandbox ML: detected

Bitcoin Miner

barindex
Source: Yara match File source: 4.2.WER9Fz381n.exe.400000.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.WER9Fz381n.exe.37f0000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.3.WER9Fz381n.exe.3700000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.WER9Fz381n.exe.400000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.WER9Fz381n.exe.400000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.WER9Fz381n.exe.2f70e67.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.WER9Fz381n.exe.37f0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.3.WER9Fz381n.exe.3700000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.WER9Fz381n.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.WER9Fz381n.exe.2e80e67.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: WER9Fz381n.exe PID: 7264, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: WER9Fz381n.exe PID: 7480, type: MEMORYSTR

Compliance

barindex
Source: C:\Users\user\Desktop\WER9Fz381n.exe Unpacked PE file: 0.2.WER9Fz381n.exe.400000.4.unpack
Source: C:\Users\user\Desktop\WER9Fz381n.exe Unpacked PE file: 4.2.WER9Fz381n.exe.400000.5.unpack
Source: WER9Fz381n.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\WER9Fz381n.exe File opened: C:\Windows\SysWOW64\msvcr100.dll Jump to behavior
Source: Binary string: Loader.pdb source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: EfiGuardDxe.pdb7 source: WER9Fz381n.exe, WER9Fz381n.exe, 00000004.00000002.1444895629.0000000002A8C000.00000040.00000020.00020000.00000000.sdmp
Source: Binary string: Unrecognized pdb formatThis error indicates attempting to access a .pdb file with source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: A connection with the server could not be establishedAn extended error was returned from the WinHttp serverThe .pdb file is probably no longer indexed in the symbol server share location. source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Age does not matchThe module age and .pdb age do not match. source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: symsrv.pdb source: WER9Fz381n.exe, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000C29000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000036A9000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003F28000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: Cvinfo is corruptThe .pdb file contains a corrupted debug codeview information. source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Downloading symbols for [%s] %ssrv*symsrv*http://https://_bad_pdb_file.pdb source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: The symbol server has never indexed any version of this symbol fileNo version of the .pdb file with the given name has ever been registered. source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: PDB not foundUnable to locate the .pdb file in any of the symbol search path locations. source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: c:\Users\Admin\documents\visual studio 2015\Projects\Winmon\Release\Winmon.pdb source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\vbox\branch\w64-1.6\out\win.amd64\release\obj\src\VBox\HostDrivers\VBoxDrv\VBoxDrv.pdb source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: c:\Users\Admin\documents\visual studio 2015\Projects\Winmon\x64\Release\Winmon.pdb source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Drive not readyThis error indicates a .pdb file related failure. source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\Users\vladimir\source\repos\driver-process-monitor\Release\WinmonProcessMonitor.pdb source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Error while loading symbolsUnable to locate the .pdb file in any of the symbol search source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: zzz_AsmCodeRange_*FrameDatainvalid string positionstring too long.pdb source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Pdb read access deniedYou may be attempting to access a .pdb file with read-only attributes source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Unable to locate the .pdb file in this location source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\Users\Admin\documents\visual studio 2015\Projects\WinmonFS\x64\Release\WinmonFS.pdb source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: The module signature does not match with .pdb signature. source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: .pdb.dbg source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: '(EfiGuardDxe.pdbx source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: symsrv.pdbGCTL source: WER9Fz381n.exe, 00000000.00000003.1387384767.0000000004018000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000C29000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.0000000003799000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000C29000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000036A9000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003F28000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: C:\Users\Admin\documents\visual studio 2015\Projects\WinmonFS\Release\WinmonFS.pdb source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: or you do not have access permission to the .pdb location. source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: An Exception happened while downloading the module .pdbPlease open a bug if this is a consistent repro. source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: EfiGuardDxe.pdb source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\Users\vladimir\source\repos\driver-process-monitor\x64\Release\WinmonProcessMonitor.pdb source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Signature does not matchThe module signature does not match with .pdb signature source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: dbghelp.pdb source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: dbghelp.pdbGCTL source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\muxusad\viwep\gokixetuweton suhip90\hobeloz_cawico.pdb source: WER9Fz381n.exe

Networking

barindex
Source: WER9Fz381n.exe String found in binary or memory: 5mjk6uijs.onionhttp2: frame too largehttp://localhost:3433/idna: invalid label %qinappropriate fallbackinteger divide by zerointegrity check failedinterface conversion: internal inconsistencyinvalid address familyinvalid number base %djson: unknown field %qker
Source: WER9Fz381n.exe String found in binary or memory: atible; Exabot/3.0; http://www.exabot.com/go/robot)Opera/9.80 (J2ME/MIDP; Opera Mini/5.0.16823/1428; U; en) Presto/2.2.0http2: Transport closing idle conn %p (forSingleUse=%v, maxStream=%v)http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.oniont
Source: WER9Fz381n.exe String found in binary or memory: freeIndex is not validgenerate challenge: %wgetenv before env initgzip: invalid checksumheader field %q = %q%shpack: string too longhsmiths4fyqlw5xw.onionhsmiths5mjk6uijs.onionhttp2: frame too largehttp://localhost:3433/idna: invalid label %qinappropriate fall
Source: WER9Fz381n.exe String found in binary or memory: getenv before env initgzip: invalid checksumheader field %q = %q%shpack: string too longhsmiths4fyqlw5xw.onionhsmiths5mjk6uijs.onionhttp2: frame too largehttp://localhost:3433/idna: invalid label %qinappropriate fallbackinteger divide by zerointegrity check fa
Source: WER9Fz381n.exe, 00000000.00000002.1407844983.0000000013C58000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion
Source: WER9Fz381n.exe, 00000000.00000002.1407844983.0000000013C58000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: C:\Windows\system32C:\Windows\system32\advapi32.dllS-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\TestAppS-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\TestAppS-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onionhttp://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onionS-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S
Source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: Pakistan Standard TimeParaguay Standard TimeRoGetActivationFactoryRtlDeleteFunctionTableRtlGetNtVersionNumbersSafeArrayGetRecordInfoSafeArraySetRecordInfoSakhalin Standard TimeSeImpersonatePrivilegeSetupDiEnumDriverInfoWSetupDiGetClassDevsExWTasmania Standard TimeTor bootstrap progressTor service is runningUnsupported Media TypeWSAGetOverlappedResultWaitForMultipleObjectsWget/1.12 (freebsd8.1)Xenu Link Sleuth/1.3.8address already in useadvapi32.dll not foundapplication/javascriptargument list too longassembly checks failedbad g->status in readybad sweepgen in refillbitcoin3nqy3db7c.onionbody closed by handlercannot allocate memoryclient not initializedcouldn't create devicecouldn't get file infocouldn't start servicecoulnd't write to filecreate main window: %wdecode and decrypt: %wdownloading obfs4proxydriver: bad connectionelectrum.leblancnet.uselectrum3.hodlister.coelectrum5.hodlister.coelectrumxhqdsmlu.onionencrypt and encode: %werror decoding messageerror parsing regexp: expected multiple of 2failed to get UUID: %wfailed to hide app: %wfailed to open key: %wfailed to open src: %wfailed to register: %wfailed to set UUID: %wfreeIndex is not validgenerate challenge: %wgetenv before env initgzip: invalid checksumheader field %q = %q%shpack: string too longhsmiths4fyqlw5xw.onionhsmiths5mjk6uijs.onionhttp2: frame too largehttp://localhost:3433/idna: invalid label %qinappropriate fallbackinteger divide by zerointegrity check failedinterface conversion: internal inconsistencyinvalid address familyinvalid number base %djson: unknown field %qkernel32.dll not foundmalformed HTTP versionminpc or maxpc invalidmissing ']' in addressndndword5lpb7eex.onionnetwork is unreachableno connection providednon-Go function at pc=oldoverflow is not niloperation was canceledozahtqwp25chjdjd.onionprotocol not availableprotocol not supportedqtornadoklbgdyww.onionread response body: %wreflect.Value.MapIndexreflect.Value.SetFloatreflectlite.Value.Elemreflectlite.Value.Typeremote address changedruntime.main not on m0runtime: t.span= runtime: physPageSize=runtime: work.nwait = runtime:scanstack: gp=s.freeindex > s.nelemss7clinmo4cazmhul.onionscanstack - bad statussecure boot is enabledsend on closed channelserver.peers.subscribeservice does not existservice is not runningset Tor mode to %s: %wspan has no free spacestack not a power of 2status/bootstrap-phasetimer goroutine (idle)trace reader (blocked)trace: alloc too largetransaction is stoppedtransaction not existsunexpected length codewirep: invalid p statewrite on closed bufferzero length BIT STRINGzlib: invalid checksum into Go value of type ) must be a power of 2
Source: WER9Fz381n.exe, 00000000.00000002.1407844983.0000000013CBE000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: C:\Windows\system32\advapi32.dllhttp://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion
Source: WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp String found in binary or memory: Pakistan Standard TimeParaguay Standard TimeRoGetActivationFactoryRtlDeleteFunctionTableRtlGetNtVersionNumbersSafeArrayGetRecordInfoSafeArraySetRecordInfoSakhalin Standard TimeSeImpersonatePrivilegeSetupDiEnumDriverInfoWSetupDiGetClassDevsExWTasmania Standard TimeTor bootstrap progressTor service is runningUnsupported Media TypeWSAGetOverlappedResultWaitForMultipleObjectsWget/1.12 (freebsd8.1)Xenu Link Sleuth/1.3.8address already in useadvapi32.dll not foundapplication/javascriptargument list too longassembly checks failedbad g->status in readybad sweepgen in refillbitcoin3nqy3db7c.onionbody closed by handlercannot allocate memoryclient not initializedcouldn't create devicecouldn't get file infocouldn't start servicecoulnd't write to filecreate main window: %wdecode and decrypt: %wdownloading obfs4proxydriver: bad connectionelectrum.leblancnet.uselectrum3.hodlister.coelectrum5.hodlister.coelectrumxhqdsmlu.onionencrypt and encode: %werror decoding messageerror parsing regexp: expected multiple of 2failed to get UUID: %wfailed to hide app: %wfailed to open key: %wfailed to open src: %wfailed to register: %wfailed to set UUID: %wfreeIndex is not validgenerate challenge: %wgetenv before env initgzip: invalid checksumheader field %q = %q%shpack: string too longhsmiths4fyqlw5xw.onionhsmiths5mjk6uijs.onionhttp2: frame too largehttp://localhost:3433/idna: invalid label %qinappropriate fallbackinteger divide by zerointegrity check failedinterface conversion: internal inconsistencyinvalid address familyinvalid number base %djson: unknown field %qkernel32.dll not foundmalformed HTTP versionminpc or maxpc invalidmissing ']' in addressndndword5lpb7eex.onionnetwork is unreachableno connection providednon-Go function at pc=oldoverflow is not niloperation was canceledozahtqwp25chjdjd.onionprotocol not availableprotocol not supportedqtornadoklbgdyww.onionread response body: %wreflect.Value.MapIndexreflect.Value.SetFloatreflectlite.Value.Elemreflectlite.Value.Typeremote address changedruntime.main not on m0runtime: t.span= runtime: physPageSize=runtime: work.nwait = runtime:scanstack: gp=s.freeindex > s.nelemss7clinmo4cazmhul.onionscanstack - bad statussecure boot is enabledsend on closed channelserver.peers.subscribeservice does not existservice is not runningset Tor mode to %s: %wspan has no free spacestack not a power of 2status/bootstrap-phasetimer goroutine (idle)trace reader (blocked)trace: alloc too largetransaction is stoppedtransaction not existsunexpected length codewirep: invalid p statewrite on closed bufferzero length BIT STRINGzlib: invalid checksum into Go value of type ) must be a power of 2
Source: WER9Fz381n.exe, 00000000.00000002.1407844983.0000000013CF2000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion
Source: WER9Fz381n.exe, 00000000.00000002.1406450301.0000000002F70000.00000040.00001000.00020000.00000000.sdmp String found in binary or memory: Pakistan Standard TimeParaguay Standard TimeRoGetActivationFactoryRtlDeleteFunctionTableRtlGetNtVersionNumbersSafeArrayGetRecordInfoSafeArraySetRecordInfoSakhalin Standard TimeSeImpersonatePrivilegeSetupDiEnumDriverInfoWSetupDiGetClassDevsExWTasmania Standard TimeTor bootstrap progressTor service is runningUnsupported Media TypeWSAGetOverlappedResultWaitForMultipleObjectsWget/1.12 (freebsd8.1)Xenu Link Sleuth/1.3.8address already in useadvapi32.dll not foundapplication/javascriptargument list too longassembly checks failedbad g->status in readybad sweepgen in refillbitcoin3nqy3db7c.onionbody closed by handlercannot allocate memoryclient not initializedcouldn't create devicecouldn't get file infocouldn't start servicecoulnd't write to filecreate main window: %wdecode and decrypt: %wdownloading obfs4proxydriver: bad connectionelectrum.leblancnet.uselectrum3.hodlister.coelectrum5.hodlister.coelectrumxhqdsmlu.onionencrypt and encode: %werror decoding messageerror parsing regexp: expected multiple of 2failed to get UUID: %wfailed to hide app: %wfailed to open key: %wfailed to open src: %wfailed to register: %wfailed to set UUID: %wfreeIndex is not validgenerate challenge: %wgetenv before env initgzip: invalid checksumheader field %q = %q%shpack: string too longhsmiths4fyqlw5xw.onionhsmiths5mjk6uijs.onionhttp2: frame too largehttp://localhost:3433/idna: invalid label %qinappropriate fallbackinteger divide by zerointegrity check failedinterface conversion: internal inconsistencyinvalid address familyinvalid number base %djson: unknown field %qkernel32.dll not foundmalformed HTTP versionminpc or maxpc invalidmissing ']' in addressndndword5lpb7eex.onionnetwork is unreachableno connection providednon-Go function at pc=oldoverflow is not niloperation was canceledozahtqwp25chjdjd.onionprotocol not availableprotocol not supportedqtornadoklbgdyww.onionread response body: %wreflect.Value.MapIndexreflect.Value.SetFloatreflectlite.Value.Elemreflectlite.Value.Typeremote address changedruntime.main not on m0runtime: t.span= runtime: physPageSize=runtime: work.nwait = runtime:scanstack: gp=s.freeindex > s.nelemss7clinmo4cazmhul.onionscanstack - bad statussecure boot is enabledsend on closed channelserver.peers.subscribeservice does not existservice is not runningset Tor mode to %s: %wspan has no free spacestack not a power of 2status/bootstrap-phasetimer goroutine (idle)trace reader (blocked)trace: alloc too largetransaction is stoppedtransaction not existsunexpected length codewirep: invalid p statewrite on closed bufferzero length BIT STRINGzlib: invalid checksum into Go value of type ) must be a power of 2
Source: WER9Fz381n.exe String found in binary or memory: 5mjk6uijs.onionhttp2: frame too largehttp://localhost:3433/idna: invalid label %qinappropriate fallbackinteger divide by zerointegrity check failedinterface conversion: internal inconsistencyinvalid address familyinvalid number base %djson: unknown field %qker
Source: WER9Fz381n.exe String found in binary or memory: atible; Exabot/3.0; http://www.exabot.com/go/robot)Opera/9.80 (J2ME/MIDP; Opera Mini/5.0.16823/1428; U; en) Presto/2.2.0http2: Transport closing idle conn %p (forSingleUse=%v, maxStream=%v)http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.oniont
Source: WER9Fz381n.exe String found in binary or memory: freeIndex is not validgenerate challenge: %wgetenv before env initgzip: invalid checksumheader field %q = %q%shpack: string too longhsmiths4fyqlw5xw.onionhsmiths5mjk6uijs.onionhttp2: frame too largehttp://localhost:3433/idna: invalid label %qinappropriate fall
Source: WER9Fz381n.exe String found in binary or memory: getenv before env initgzip: invalid checksumheader field %q = %q%shpack: string too longhsmiths4fyqlw5xw.onionhsmiths5mjk6uijs.onionhttp2: frame too largehttp://localhost:3433/idna: invalid label %qinappropriate fallbackinteger divide by zerointegrity check fa
Source: WER9Fz381n.exe, 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp String found in binary or memory: Pakistan Standard TimeParaguay Standard TimeRoGetActivationFactoryRtlDeleteFunctionTableRtlGetNtVersionNumbersSafeArrayGetRecordInfoSafeArraySetRecordInfoSakhalin Standard TimeSeImpersonatePrivilegeSetupDiEnumDriverInfoWSetupDiGetClassDevsExWTasmania Standard TimeTor bootstrap progressTor service is runningUnsupported Media TypeWSAGetOverlappedResultWaitForMultipleObjectsWget/1.12 (freebsd8.1)Xenu Link Sleuth/1.3.8address already in useadvapi32.dll not foundapplication/javascriptargument list too longassembly checks failedbad g->status in readybad sweepgen in refillbitcoin3nqy3db7c.onionbody closed by handlercannot allocate memoryclient not initializedcouldn't create devicecouldn't get file infocouldn't start servicecoulnd't write to filecreate main window: %wdecode and decrypt: %wdownloading obfs4proxydriver: bad connectionelectrum.leblancnet.uselectrum3.hodlister.coelectrum5.hodlister.coelectrumxhqdsmlu.onionencrypt and encode: %werror decoding messageerror parsing regexp: expected multiple of 2failed to get UUID: %wfailed to hide app: %wfailed to open key: %wfailed to open src: %wfailed to register: %wfailed to set UUID: %wfreeIndex is not validgenerate challenge: %wgetenv before env initgzip: invalid checksumheader field %q = %q%shpack: string too longhsmiths4fyqlw5xw.onionhsmiths5mjk6uijs.onionhttp2: frame too largehttp://localhost:3433/idna: invalid label %qinappropriate fallbackinteger divide by zerointegrity check failedinterface conversion: internal inconsistencyinvalid address familyinvalid number base %djson: unknown field %qkernel32.dll not foundmalformed HTTP versionminpc or maxpc invalidmissing ']' in addressndndword5lpb7eex.onionnetwork is unreachableno connection providednon-Go function at pc=oldoverflow is not niloperation was canceledozahtqwp25chjdjd.onionprotocol not availableprotocol not supportedqtornadoklbgdyww.onionread response body: %wreflect.Value.MapIndexreflect.Value.SetFloatreflectlite.Value.Elemreflectlite.Value.Typeremote address changedruntime.main not on m0runtime: t.span= runtime: physPageSize=runtime: work.nwait = runtime:scanstack: gp=s.freeindex > s.nelemss7clinmo4cazmhul.onionscanstack - bad statussecure boot is enabledsend on closed channelserver.peers.subscribeservice does not existservice is not runningset Tor mode to %s: %wspan has no free spacestack not a power of 2status/bootstrap-phasetimer goroutine (idle)trace reader (blocked)trace: alloc too largetransaction is stoppedtransaction not existsunexpected length codewirep: invalid p statewrite on closed bufferzero length BIT STRINGzlib: invalid checksum into Go value of type ) must be a power of 2
Source: WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: Pakistan Standard TimeParaguay Standard TimeRoGetActivationFactoryRtlDeleteFunctionTableRtlGetNtVersionNumbersSafeArrayGetRecordInfoSafeArraySetRecordInfoSakhalin Standard TimeSeImpersonatePrivilegeSetupDiEnumDriverInfoWSetupDiGetClassDevsExWTasmania Standard TimeTor bootstrap progressTor service is runningUnsupported Media TypeWSAGetOverlappedResultWaitForMultipleObjectsWget/1.12 (freebsd8.1)Xenu Link Sleuth/1.3.8address already in useadvapi32.dll not foundapplication/javascriptargument list too longassembly checks failedbad g->status in readybad sweepgen in refillbitcoin3nqy3db7c.onionbody closed by handlercannot allocate memoryclient not initializedcouldn't create devicecouldn't get file infocouldn't start servicecoulnd't write to filecreate main window: %wdecode and decrypt: %wdownloading obfs4proxydriver: bad connectionelectrum.leblancnet.uselectrum3.hodlister.coelectrum5.hodlister.coelectrumxhqdsmlu.onionencrypt and encode: %werror decoding messageerror parsing regexp: expected multiple of 2failed to get UUID: %wfailed to hide app: %wfailed to open key: %wfailed to open src: %wfailed to register: %wfailed to set UUID: %wfreeIndex is not validgenerate challenge: %wgetenv before env initgzip: invalid checksumheader field %q = %q%shpack: string too longhsmiths4fyqlw5xw.onionhsmiths5mjk6uijs.onionhttp2: frame too largehttp://localhost:3433/idna: invalid label %qinappropriate fallbackinteger divide by zerointegrity check failedinterface conversion: internal inconsistencyinvalid address familyinvalid number base %djson: unknown field %qkernel32.dll not foundmalformed HTTP versionminpc or maxpc invalidmissing ']' in addressndndword5lpb7eex.onionnetwork is unreachableno connection providednon-Go function at pc=oldoverflow is not niloperation was canceledozahtqwp25chjdjd.onionprotocol not availableprotocol not supportedqtornadoklbgdyww.onionread response body: %wreflect.Value.MapIndexreflect.Value.SetFloatreflectlite.Value.Elemreflectlite.Value.Typeremote address changedruntime.main not on m0runtime: t.span= runtime: physPageSize=runtime: work.nwait = runtime:scanstack: gp=s.freeindex > s.nelemss7clinmo4cazmhul.onionscanstack - bad statussecure boot is enabledsend on closed channelserver.peers.subscribeservice does not existservice is not runningset Tor mode to %s: %wspan has no free spacestack not a power of 2status/bootstrap-phasetimer goroutine (idle)trace reader (blocked)trace: alloc too largetransaction is stoppedtransaction not existsunexpected length codewirep: invalid p statewrite on closed bufferzero length BIT STRINGzlib: invalid checksum into Go value of type ) must be a power of 2
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CE4000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CE4000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\TestAppS-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\TestAppS-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onionS-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHzS-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7current filenname with args "C:\Users\user\Desktop\WER9Fz381n.exe"
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion9e146be9-c76a-4720-bcdb-53011b87bd06
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CF2000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp String found in binary or memory: Pakistan Standard TimeParaguay Standard TimeRoGetActivationFactoryRtlDeleteFunctionTableRtlGetNtVersionNumbersSafeArrayGetRecordInfoSafeArraySetRecordInfoSakhalin Standard TimeSeImpersonatePrivilegeSetupDiEnumDriverInfoWSetupDiGetClassDevsExWTasmania Standard TimeTor bootstrap progressTor service is runningUnsupported Media TypeWSAGetOverlappedResultWaitForMultipleObjectsWget/1.12 (freebsd8.1)Xenu Link Sleuth/1.3.8address already in useadvapi32.dll not foundapplication/javascriptargument list too longassembly checks failedbad g->status in readybad sweepgen in refillbitcoin3nqy3db7c.onionbody closed by handlercannot allocate memoryclient not initializedcouldn't create devicecouldn't get file infocouldn't start servicecoulnd't write to filecreate main window: %wdecode and decrypt: %wdownloading obfs4proxydriver: bad connectionelectrum.leblancnet.uselectrum3.hodlister.coelectrum5.hodlister.coelectrumxhqdsmlu.onionencrypt and encode: %werror decoding messageerror parsing regexp: expected multiple of 2failed to get UUID: %wfailed to hide app: %wfailed to open key: %wfailed to open src: %wfailed to register: %wfailed to set UUID: %wfreeIndex is not validgenerate challenge: %wgetenv before env initgzip: invalid checksumheader field %q = %q%shpack: string too longhsmiths4fyqlw5xw.onionhsmiths5mjk6uijs.onionhttp2: frame too largehttp://localhost:3433/idna: invalid label %qinappropriate fallbackinteger divide by zerointegrity check failedinterface conversion: internal inconsistencyinvalid address familyinvalid number base %djson: unknown field %qkernel32.dll not foundmalformed HTTP versionminpc or maxpc invalidmissing ']' in addressndndword5lpb7eex.onionnetwork is unreachableno connection providednon-Go function at pc=oldoverflow is not niloperation was canceledozahtqwp25chjdjd.onionprotocol not availableprotocol not supportedqtornadoklbgdyww.onionread response body: %wreflect.Value.MapIndexreflect.Value.SetFloatreflectlite.Value.Elemreflectlite.Value.Typeremote address changedruntime.main not on m0runtime: t.span= runtime: physPageSize=runtime: work.nwait = runtime:scanstack: gp=s.freeindex > s.nelemss7clinmo4cazmhul.onionscanstack - bad statussecure boot is enabledsend on closed channelserver.peers.subscribeservice does not existservice is not runningset Tor mode to %s: %wspan has no free spacestack not a power of 2status/bootstrap-phasetimer goroutine (idle)trace reader (blocked)trace: alloc too largetransaction is stoppedtransaction not existsunexpected length codewirep: invalid p statewrite on closed bufferzero length BIT STRINGzlib: invalid checksum into Go value of type ) must be a power of 2
Source: Joe Sandbox View IP Address: 199.59.243.227 199.59.243.227
Source: Joe Sandbox View IP Address: 46.8.8.100 46.8.8.100
Source: Joe Sandbox View IP Address: 46.8.8.100 46.8.8.100
Source: Network traffic Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.7:49817
Source: Network traffic Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.7:63612
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: ww82.trythisgid.comUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
Source: WER9Fz381n.exe String found in binary or memory: Gecko)Opera/9.80 (Macintosh; Intel Mac OS X; U; en) Presto/2.6.30 Version/10.61facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)tls: received unexpected handshake message of type %T when waiting for %TBlackBerry7100i/4.1.0 Profile/MIDP- equals www.facebook.com (Facebook)
Source: WER9Fz381n.exe String found in binary or memory: cko Debian/1.6-7Mozilla/5.0 (compatible; Konqueror/3.3; Linux 2.6.8-gentoo-r3; X11;facebookscraper/1.0( http://www.facebook.com/sharescraper_help.php)26959946667150639794667015087019625940457807714424391721682722368061269599466671506397946670150870196306735579 equals www.facebook.com (Facebook)
Source: global traffic DNS traffic detected: DNS query: trythisgid.com
Source: global traffic DNS traffic detected: DNS query: ww82.trythisgid.com
Source: unknown HTTP traffic detected: POST /app-install-failure HTTP/1.1Host: trythisgid.comUser-Agent: Go-http-client/1.1Content-Length: 166Accept-Encoding: gzip
Source: WER9Fz381n.exe String found in binary or memory: http://archive.org/details/archive.org_bot)Mozilla/5.0
Source: WER9Fz381n.exe, 00000000.00000002.1406124092.0000000002B7B000.00000040.00000020.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1444895629.0000000002A8C000.00000040.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.g
Source: WER9Fz381n.exe, 00000000.00000002.1406450301.000000000358B000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000349B000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp String found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0
Source: WER9Fz381n.exe, 00000000.00000002.1406450301.000000000358B000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000349B000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp String found in binary or memory: http://crl.globalsign.net/Root.crl0
Source: WER9Fz381n.exe, 00000000.00000002.1406450301.000000000358B000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000349B000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp String found in binary or memory: http://crl.globalsign.net/primobject.crl0
Source: WER9Fz381n.exe, WER9Fz381n.exe, 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp String found in binary or memory: http://devlog.gregarius.net/docs/ua)Links
Source: WER9Fz381n.exe, 00000000.00000002.1407844983.0000000013C58000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1407844983.0000000013CBE000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1407844983.0000000013CF2000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CE4000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CF2000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion9e146be9-c76a-4720-bcdb-53011b8
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CE4000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onionS-1-5-21-2246122658-3693405117-
Source: WER9Fz381n.exe, 00000000.00000002.1407844983.0000000013C58000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onionhttp://dg2sz7pxs7llf2t25fsbutlv
Source: WER9Fz381n.exe String found in binary or memory: http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.oniont
Source: WER9Fz381n.exe String found in binary or memory: http://gais.cs.ccu.edu.tw/robot.php)Gulper
Source: WER9Fz381n.exe String found in binary or memory: http://grub.org)Mozilla/5.0
Source: WER9Fz381n.exe String found in binary or memory: http://help.yahoo.com/help/us/ysea
Source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp String found in binary or memory: http://https://_bad_pdb_file.pdb
Source: WER9Fz381n.exe, WER9Fz381n.exe, 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp String found in binary or memory: http://invalidlog.txtlookup
Source: WER9Fz381n.exe String found in binary or memory: http://misc.yahoo.com.cn/help.html)QueryPerformanceFrequency
Source: WER9Fz381n.exe String found in binary or memory: http://search.ms
Source: WER9Fz381n.exe String found in binary or memory: http://search.msn.com/msn
Source: WER9Fz381n.exe, WER9Fz381n.exe, 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp String found in binary or memory: http://search.msn.com/msnbot.htm)msnbot/1.1
Source: WER9Fz381n.exe, WER9Fz381n.exe, 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp String found in binary or memory: http://search.msn.com/msnbot.htm)net/http:
Source: WER9Fz381n.exe, WER9Fz381n.exe, 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp String found in binary or memory: http://search.msn.com/msnbot.htm)pkcs7:
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CF4000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013D6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013C10000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://ww82.trythisgid.com/
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013C10000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://ww82.trythisgid.com/Fri
Source: WER9Fz381n.exe String found in binary or memory: http://www.alexa.com/help/webmasters;
Source: WER9Fz381n.exe String found in binary or memory: http://www.alltheweb.com/help/webmaster/crawler)POLARIS/6.01(BREW
Source: WER9Fz381n.exe String found in binary or memory: http://www.archive.org/details/archive.org_bot)Opera/9.80
Source: WER9Fz381n.exe, WER9Fz381n.exe, 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp String found in binary or memory: http://www.avantbrowser.com)MOT-V9mm/00.62
Source: WER9Fz381n.exe, WER9Fz381n.exe, 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp String found in binary or memory: http://www.baidu.com/search/spider.htm)MobileSafari/600.1.4
Source: WER9Fz381n.exe String found in binary or memory: http://www.bloglines.com)F
Source: WER9Fz381n.exe String found in binary or memory: http://www.everyfeed.com)explicit
Source: WER9Fz381n.exe String found in binary or memory: http://www.exabot.com/go/robot)Opera/9.80
Source: WER9Fz381n.exe String found in binary or memory: http://www.google.com/adsbot.html)Encountered
Source: WER9Fz381n.exe String found in binary or memory: http://www.google.com/bot.h
Source: WER9Fz381n.exe String found in binary or memory: http://www.google.com/bot.html)Mozilla/5.0
Source: WER9Fz381n.exe String found in binary or memory: http://www.google.com/bot.html)tls:
Source: WER9Fz381n.exe String found in binary or memory: http://www.google.com/feedfetcher.html)HKLM
Source: WER9Fz381n.exe String found in binary or memory: http://www.googlebot.com/bot.html)Links
Source: WER9Fz381n.exe String found in binary or memory: http://www.spidersoft.com)Wget/1.9
Source: WER9Fz381n.exe String found in binary or memory: http://yandex.com/bots)Opera/9.51
Source: WER9Fz381n.exe String found in binary or memory: http://yandex.com/bots)Opera/9.80
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp String found in binary or memory: https://blockchain.infoindex
Source: WER9Fz381n.exe, WER9Fz381n.exe, 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp String found in binary or memory: https://blockstream.info/apiinvalid
Source: WER9Fz381n.exe String found in binary or memory: https://cdn.discordapp.com/attachments/1023299088751538198/1023549843135795230/to
Source: WER9Fz381n.exe String found in binary or memory: https://cdn.discordapp.com/attachments/925779512644497442/933676145558310953/obfs4proxy.exehttps://g
Source: WER9Fz381n.exe String found in binary or memory: https://raw.githubusercontent.c
Source: WER9Fz381n.exe String found in binary or memory: https://trythisgid.com/app-install-failureinsufficient
Source: WER9Fz381n.exe, WER9Fz381n.exe, 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp String found in binary or memory: https://turnitin.com/robot/crawlerinfo.html)gentraceback
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013D82000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013D6E000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://www.google.com
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49751
Source: unknown Network traffic detected: HTTP traffic on port 49751 -> 443

E-Banking Fraud

barindex
Source: Yara match File source: 4.2.WER9Fz381n.exe.400000.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.WER9Fz381n.exe.37f0000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.3.WER9Fz381n.exe.3700000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.WER9Fz381n.exe.400000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.WER9Fz381n.exe.400000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.WER9Fz381n.exe.2f70e67.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.WER9Fz381n.exe.37f0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.3.WER9Fz381n.exe.3700000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.WER9Fz381n.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.WER9Fz381n.exe.2e80e67.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: WER9Fz381n.exe PID: 7264, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: WER9Fz381n.exe PID: 7480, type: MEMORYSTR

System Summary

barindex
Source: 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
Source: 00000004.00000002.1444895629.0000000002A8C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000000.00000002.1406124092.0000000002B7B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000000.00000002.1406450301.0000000002F70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02F76FF7 0_2_02F76FF7
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02FC09D7 0_2_02FC09D7
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02F7A967 0_2_02F7A967
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 4_2_02E86FF7 4_2_02E86FF7
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 4_2_02ED09D7 4_2_02ED09D7
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 4_2_02E8A967 4_2_02E8A967
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: String function: 02F9C597 appears 53 times
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: String function: 02F9AEC7 appears 71 times
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: String function: 02EAC597 appears 53 times
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: String function: 02EAAEC7 appears 71 times
Source: WER9Fz381n.exe Static PE information: invalid certificate
Source: WER9Fz381n.exe Static PE information: Resource name: RT_VERSION type: x86 executable not stripped
Source: WER9Fz381n.exe Binary or memory string: OriginalFilename vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000000.00000002.1406450301.000000000358B000.00000040.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedsefix.exe. vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000000.00000003.1387384767.0000000004018000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameDBGHELP.DLLj% vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000000.00000003.1387384767.0000000004018000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamesymsrv.dllj% vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameWinmonFS.sysZ vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedsefix.exe. vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameWinmonFS.sysZ vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenamedsefix.exe. vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000C29000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameDBGHELP.DLLj% vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000C29000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenamesymsrv.dllj% vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000000.00000002.1406450301.0000000003799000.00000040.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameDBGHELP.DLLj% vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000000.00000002.1406450301.0000000003799000.00000040.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamesymsrv.dllj% vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameWinmonFS.sysZ vs WER9Fz381n.exe
Source: WER9Fz381n.exe Binary or memory string: OriginalFilename vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameWinmonFS.sysZ vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedsefix.exe. vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000C29000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameDBGHELP.DLLj% vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000C29000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenamesymsrv.dllj% vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000004.00000002.1445502886.000000000349B000.00000040.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedsefix.exe. vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000004.00000002.1445502886.00000000036A9000.00000040.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameDBGHELP.DLLj% vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000004.00000002.1445502886.00000000036A9000.00000040.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamesymsrv.dllj% vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameWinmonFS.sysZ vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenamedsefix.exe. vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003F28000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameDBGHELP.DLLj% vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003F28000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamesymsrv.dllj% vs WER9Fz381n.exe
Source: WER9Fz381n.exe, 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameWinmonFS.sysZ vs WER9Fz381n.exe
Source: WER9Fz381n.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
Source: 00000004.00000002.1444895629.0000000002A8C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000000.00000002.1406124092.0000000002B7B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000000.00000002.1406450301.0000000002F70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
Source: classification engine Classification label: mal100.troj.evad.winEXE@2/0@2/2
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02B7B7C6 CreateToolhelp32Snapshot,Module32First, 0_2_02B7B7C6
Source: WER9Fz381n.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\WER9Fz381n.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name FROM Win32_Processor
Source: C:\Users\user\Desktop\WER9Fz381n.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: WER9Fz381n.exe ReversingLabs: Detection: 84%
Source: WER9Fz381n.exe String found in binary or memory: ackRoots= out of range s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= %s/rawaddr/%s%s\%s\drivers, gp->status=, not pointer-bind-address-byte block (3814697265625:UseSTD3RulesAccept-RangesAuthorizationCLIENT_RANDOMCONNECTION-IDCONNECT_ERRORCach
Source: WER9Fz381n.exe String found in binary or memory: ker initGetConsoleModeGetProcAddressGetShellWindowGetSystemTimesGetTickCount64GetUserNameExWGetWindowTextWGooglebot-NewsHTMLParser/1.6ICE-CONTROLLEDINTERNAL_ERRORInstEmptyWidthIsWellKnownSidIsWow64ProcessLoadLibraryExWMAPPED-ADDRESSMAX_FRAME_SIZEMB; allocated
Source: WER9Fz381n.exe String found in binary or memory: application/app/install.go
Source: WER9Fz381n.exe String found in binary or memory: application/resilience/btcblockchain/address.go
Source: WER9Fz381n.exe String found in binary or memory: is dowloadedTranslateMessageTrustedInstallerUnregisterClassWUpgrade RequiredUser-Agent: %s VirtualProtectExWinVerifyTrustExWindows DefenderWww-AuthenticateXOR-PEER-ADDRESSZanabazar_Square\windefender.exe runtime stack: ^\x00-\x{10FFFF}address is emptyafter ob
Source: WER9Fz381n.exe String found in binary or memory: unknown network workbuf is emptywrite config: %wwww-authenticate initialHeapLive= spinningthreads=%%!%c(big.Int=%s)%s/address/%s/txs0123456789ABCDEFX0123456789abcdefx060102150405Z07001192092895507812559604644775390625: missing method ; SameSite=StrictAdjustTok
Source: WER9Fz381n.exe String found in binary or memory: %wfailed to restrict Tor service control: %wgrew heap, but no adequate free span foundhttp: ContentLength=%d with Body length %dhttps://trythisgid.com/app-install-failureinsufficient data for resource body lengthinvalid HTTP header value %q for header %qlookin
Source: WER9Fz381n.exe String found in binary or memory: Temporary RedirectTerminateJobObjectUNKNOWN-ATTRIBUTESUNKNOWN_SETTING_%dUnknown value typeVariation_SelectorWeb Downloader/6.9WriteProcessMemoryXOR-MAPPED-ADDRESS[^\x00-\x{10FFFF}]bad Content-Lengthbad manualFreeListbufio: buffer fullconnection refusedcontext.
Source: WER9Fz381n.exe String found in binary or memory: REQUESTED-ADDRESS-FAMILYRequest Entity Too LargeSA Eastern Standard TimeSA Pacific Standard TimeSA Western Standard TimeSafeArrayAllocDescriptorSetConsoleCursorPositionSetDefaultDllDirectoriesSetupDiCreateDeviceInfoWSetupDiGetSelectedDeviceSetupDiSetSelectedDe
Source: WER9Fz381n.exe String found in binary or memory: is nil, not nStackRoots= out of range s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= %s/rawaddr/%s%s\%s\drivers, gp->status=, not pointer-bind-address-byte block (3814697265625:UseSTD3RulesAccept-RangesAuthorizationCLIENT_RANDOMCONNECTION-ID
Source: WER9Fz381n.exe String found in binary or memory: workbuf is emptywrite config: %wwww-authenticate initialHeapLive= spinningthreads=%%!%c(big.Int=%s)%s/address/%s/txs0123456789ABCDEFX0123456789abcdefx060102150405Z07001192092895507812559604644775390625: missing method ; SameSite=StrictAdjustTokenGroupsCOMPRESS
Source: WER9Fz381n.exe String found in binary or memory: ackRoots= out of range s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= %s/rawaddr/%s%s\%s\drivers, gp->status=, not pointer-bind-address-byte block (3814697265625:UseSTD3RulesAccept-RangesAuthorizationCLIENT_RANDOMCONNECTION-IDCONNECT_ERRORCach
Source: WER9Fz381n.exe String found in binary or memory: ker initGetConsoleModeGetProcAddressGetShellWindowGetSystemTimesGetTickCount64GetUserNameExWGetWindowTextWGooglebot-NewsHTMLParser/1.6ICE-CONTROLLEDINTERNAL_ERRORInstEmptyWidthIsWellKnownSidIsWow64ProcessLoadLibraryExWMAPPED-ADDRESSMAX_FRAME_SIZEMB; allocated
Source: WER9Fz381n.exe String found in binary or memory: application/app/install.go
Source: WER9Fz381n.exe String found in binary or memory: application/resilience/btcblockchain/address.go
Source: WER9Fz381n.exe String found in binary or memory: is dowloadedTranslateMessageTrustedInstallerUnregisterClassWUpgrade RequiredUser-Agent: %s VirtualProtectExWinVerifyTrustExWindows DefenderWww-AuthenticateXOR-PEER-ADDRESSZanabazar_Square\windefender.exe runtime stack: ^\x00-\x{10FFFF}address is emptyafter ob
Source: WER9Fz381n.exe String found in binary or memory: unknown network workbuf is emptywrite config: %wwww-authenticate initialHeapLive= spinningthreads=%%!%c(big.Int=%s)%s/address/%s/txs0123456789ABCDEFX0123456789abcdefx060102150405Z07001192092895507812559604644775390625: missing method ; SameSite=StrictAdjustTok
Source: WER9Fz381n.exe String found in binary or memory: %wfailed to restrict Tor service control: %wgrew heap, but no adequate free span foundhttp: ContentLength=%d with Body length %dhttps://trythisgid.com/app-install-failureinsufficient data for resource body lengthinvalid HTTP header value %q for header %qlookin
Source: WER9Fz381n.exe String found in binary or memory: Temporary RedirectTerminateJobObjectUNKNOWN-ATTRIBUTESUNKNOWN_SETTING_%dUnknown value typeVariation_SelectorWeb Downloader/6.9WriteProcessMemoryXOR-MAPPED-ADDRESS[^\x00-\x{10FFFF}]bad Content-Lengthbad manualFreeListbufio: buffer fullconnection refusedcontext.
Source: WER9Fz381n.exe String found in binary or memory: REQUESTED-ADDRESS-FAMILYRequest Entity Too LargeSA Eastern Standard TimeSA Pacific Standard TimeSA Western Standard TimeSafeArrayAllocDescriptorSetConsoleCursorPositionSetDefaultDllDirectoriesSetupDiCreateDeviceInfoWSetupDiGetSelectedDeviceSetupDiSetSelectedDe
Source: WER9Fz381n.exe String found in binary or memory: is nil, not nStackRoots= out of range s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= %s/rawaddr/%s%s\%s\drivers, gp->status=, not pointer-bind-address-byte block (3814697265625:UseSTD3RulesAccept-RangesAuthorizationCLIENT_RANDOMCONNECTION-ID
Source: WER9Fz381n.exe String found in binary or memory: workbuf is emptywrite config: %wwww-authenticate initialHeapLive= spinningthreads=%%!%c(big.Int=%s)%s/address/%s/txs0123456789ABCDEFX0123456789abcdefx060102150405Z07001192092895507812559604644775390625: missing method ; SameSite=StrictAdjustTokenGroupsCOMPRESS
Source: C:\Users\user\Desktop\WER9Fz381n.exe File read: C:\Users\user\Desktop\WER9Fz381n.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\WER9Fz381n.exe "C:\Users\user\Desktop\WER9Fz381n.exe"
Source: C:\Users\user\Desktop\WER9Fz381n.exe Process created: C:\Users\user\Desktop\WER9Fz381n.exe "C:\Users\user\Desktop\WER9Fz381n.exe"
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: msimg32.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: msvcr100.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: powrprof.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: umpdc.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: wtsapi32.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: winsta.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: samcli.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: samlib.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: msimg32.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: msvcr100.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: powrprof.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: umpdc.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: wtsapi32.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: winsta.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}\InProcServer32 Jump to behavior
Source: WER9Fz381n.exe Static file information: File size 4253224 > 1048576
Source: C:\Users\user\Desktop\WER9Fz381n.exe File opened: C:\Windows\SysWOW64\msvcr100.dll Jump to behavior
Source: WER9Fz381n.exe Static PE information: Raw size of .data is bigger than: 0x100000 < 0x3eb600
Source: WER9Fz381n.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: Loader.pdb source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: EfiGuardDxe.pdb7 source: WER9Fz381n.exe, WER9Fz381n.exe, 00000004.00000002.1444895629.0000000002A8C000.00000040.00000020.00020000.00000000.sdmp
Source: Binary string: Unrecognized pdb formatThis error indicates attempting to access a .pdb file with source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: A connection with the server could not be establishedAn extended error was returned from the WinHttp serverThe .pdb file is probably no longer indexed in the symbol server share location. source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Age does not matchThe module age and .pdb age do not match. source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: symsrv.pdb source: WER9Fz381n.exe, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000C29000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000036A9000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003F28000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: Cvinfo is corruptThe .pdb file contains a corrupted debug codeview information. source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Downloading symbols for [%s] %ssrv*symsrv*http://https://_bad_pdb_file.pdb source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: The symbol server has never indexed any version of this symbol fileNo version of the .pdb file with the given name has ever been registered. source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: PDB not foundUnable to locate the .pdb file in any of the symbol search path locations. source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: c:\Users\Admin\documents\visual studio 2015\Projects\Winmon\Release\Winmon.pdb source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\vbox\branch\w64-1.6\out\win.amd64\release\obj\src\VBox\HostDrivers\VBoxDrv\VBoxDrv.pdb source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: c:\Users\Admin\documents\visual studio 2015\Projects\Winmon\x64\Release\Winmon.pdb source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Drive not readyThis error indicates a .pdb file related failure. source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\Users\vladimir\source\repos\driver-process-monitor\Release\WinmonProcessMonitor.pdb source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Error while loading symbolsUnable to locate the .pdb file in any of the symbol search source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: zzz_AsmCodeRange_*FrameDatainvalid string positionstring too long.pdb source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Pdb read access deniedYou may be attempting to access a .pdb file with read-only attributes source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Unable to locate the .pdb file in this location source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\Users\Admin\documents\visual studio 2015\Projects\WinmonFS\x64\Release\WinmonFS.pdb source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: The module signature does not match with .pdb signature. source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: .pdb.dbg source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: '(EfiGuardDxe.pdbx source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: symsrv.pdbGCTL source: WER9Fz381n.exe, 00000000.00000003.1387384767.0000000004018000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000C29000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.0000000003799000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000C29000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000036A9000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003F28000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: C:\Users\Admin\documents\visual studio 2015\Projects\WinmonFS\Release\WinmonFS.pdb source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: or you do not have access permission to the .pdb location. source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: An Exception happened while downloading the module .pdbPlease open a bug if this is a consistent repro. source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: EfiGuardDxe.pdb source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\Users\vladimir\source\repos\driver-process-monitor\x64\Release\WinmonProcessMonitor.pdb source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Signature does not matchThe module signature does not match with .pdb signature source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: dbghelp.pdb source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: dbghelp.pdbGCTL source: WER9Fz381n.exe, 00000000.00000002.1406450301.00000000035EB000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000003.1387384767.0000000003E6A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000A7C000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003D7A000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.00000000034FB000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\muxusad\viwep\gokixetuweton suhip90\hobeloz_cawico.pdb source: WER9Fz381n.exe

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\WER9Fz381n.exe Unpacked PE file: 0.2.WER9Fz381n.exe.400000.4.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.idata:W;.symtab:R;
Source: C:\Users\user\Desktop\WER9Fz381n.exe Unpacked PE file: 4.2.WER9Fz381n.exe.400000.5.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.idata:W;.symtab:R;
Source: C:\Users\user\Desktop\WER9Fz381n.exe Unpacked PE file: 0.2.WER9Fz381n.exe.400000.4.unpack
Source: C:\Users\user\Desktop\WER9Fz381n.exe Unpacked PE file: 4.2.WER9Fz381n.exe.400000.5.unpack
Source: WER9Fz381n.exe Static PE information: real checksum: 0x410d11 should be: 0x40e96a
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02B7F8EB pushad ; iretd 0_2_02D881C8
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02B80E20 push eax; ret 0_2_02B80E21
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02B7D87E push eax; ret 0_2_02B7D87F
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02B7CE56 push ecx; ret 0_2_02B7CE5B
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02B7CA56 push es; ret 0_2_02B7CA57
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02B7CD87 pushfd ; ret 0_2_02B7CD88
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02B7FB32 push esp; ret 0_2_02B7FB3A
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02B7D974 push eax; ret 0_2_02B7D980
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02B80755 push cs; ret 0_2_02B80761
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02F75EAF pushfd ; ret 0_2_02F75EB0
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02F7609C pushfd ; ret 0_2_02F7609D
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02F78D1D pushfd ; ret 0_2_02F78D1E
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 4_2_02A908EB pushad ; iretd 4_2_02C991C8
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 4_2_02A91E20 push eax; ret 4_2_02A91E21
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 4_2_02A8E87E push eax; ret 4_2_02A8E87F
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 4_2_02A8DE56 push ecx; ret 4_2_02A8DE5B
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 4_2_02A8DA56 push es; ret 4_2_02A8DA57
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 4_2_02A8DD87 pushfd ; ret 4_2_02A8DD88
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 4_2_02A90B32 push esp; ret 4_2_02A90B3A
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 4_2_02A8E974 push eax; ret 4_2_02A8E980
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 4_2_02A91755 push cs; ret 4_2_02A91761
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 4_2_02E85EAF pushfd ; ret 4_2_02E85EB0
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 4_2_02E8609C pushfd ; ret 4_2_02E8609D
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 4_2_02E88D1D pushfd ; ret 4_2_02E88D1E
Source: C:\Users\user\Desktop\WER9Fz381n.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: , n -Inf-inf.bat.cmd.com.css.exe.gif.htm.jpg.mjs.pdf.png.svg.sys.xml0x%x1.1110803125: p=ACDTACSTAEDTAESTAKDTAKSTAWSTAhomAtoiCDN=CESTChamDATADashDataDateEESTEULAEtagFromGOGCGoneHEADHKCCHKLMHostJulyJuneLisuMiaoModiNZDTNZSTNewaPINGPOSTQEMUROOTSASTSendStatTempThai , n -Inf-inf.bat.cmd.com.css.exe.gif.htm.jpg.mjs.pdf.png.svg.sys.xml0x%x1.1110803125: p=ACDTACSTAEDTAESTAKDTAKSTAWSTAhomAtoiCDN=CESTChamDATADashDataDateEESTEULAEtagFromGOGCGoneHEADHKCCHKLMHostJulyJuneLisuMiaoModiNZDTNZSTNewaPINGPOSTQEMUROOTSASTSendStatTempThai 0_2_02F95267
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: , n -Inf-inf.bat.cmd.com.css.exe.gif.htm.jpg.mjs.pdf.png.svg.sys.xml0x%x1.1110803125: p=ACDTACSTAEDTAESTAKDTAKSTAWSTAhomAtoiCDN=CESTChamDATADashDataDateEESTEULAEtagFromGOGCGoneHEADHKCCHKLMHostJulyJuneLisuMiaoModiNZDTNZSTNewaPINGPOSTQEMUROOTSASTSendStatTempThai , n -Inf-inf.bat.cmd.com.css.exe.gif.htm.jpg.mjs.pdf.png.svg.sys.xml0x%x1.1110803125: p=ACDTACSTAEDTAESTAKDTAKSTAWSTAhomAtoiCDN=CESTChamDATADashDataDateEESTEULAEtagFromGOGCGoneHEADHKCCHKLMHostJulyJuneLisuMiaoModiNZDTNZSTNewaPINGPOSTQEMUROOTSASTSendStatTempThai 0_2_02F951B7
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: , n -Inf-inf.bat.cmd.com.css.exe.gif.htm.jpg.mjs.pdf.png.svg.sys.xml0x%x1.1110803125: p=ACDTACSTAEDTAESTAKDTAKSTAWSTAhomAtoiCDN=CESTChamDATADashDataDateEESTEULAEtagFromGOGCGoneHEADHKCCHKLMHostJulyJuneLisuMiaoModiNZDTNZSTNewaPINGPOSTQEMUROOTSASTSendStatTempThai , n -Inf-inf.bat.cmd.com.css.exe.gif.htm.jpg.mjs.pdf.png.svg.sys.xml0x%x1.1110803125: p=ACDTACSTAEDTAESTAKDTAKSTAWSTAhomAtoiCDN=CESTChamDATADashDataDateEESTEULAEtagFromGOGCGoneHEADHKCCHKLMHostJulyJuneLisuMiaoModiNZDTNZSTNewaPINGPOSTQEMUROOTSASTSendStatTempThai 4_2_02EA5267
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: , n -Inf-inf.bat.cmd.com.css.exe.gif.htm.jpg.mjs.pdf.png.svg.sys.xml0x%x1.1110803125: p=ACDTACSTAEDTAESTAKDTAKSTAWSTAhomAtoiCDN=CESTChamDATADashDataDateEESTEULAEtagFromGOGCGoneHEADHKCCHKLMHostJulyJuneLisuMiaoModiNZDTNZSTNewaPINGPOSTQEMUROOTSASTSendStatTempThai , n -Inf-inf.bat.cmd.com.css.exe.gif.htm.jpg.mjs.pdf.png.svg.sys.xml0x%x1.1110803125: p=ACDTACSTAEDTAESTAKDTAKSTAWSTAhomAtoiCDN=CESTChamDATADashDataDateEESTEULAEtagFromGOGCGoneHEADHKCCHKLMHostJulyJuneLisuMiaoModiNZDTNZSTNewaPINGPOSTQEMUROOTSASTSendStatTempThai 4_2_02EA51B7
Source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.0000000002F70000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: RTP.EXESYSTEMROOT=SETFILETIMESIGNWRITINGSOFT_DOTTEDSYSTEMDRIVETESTING KEYTTL EXPIREDUNINSTALLERVBOXSERVICEVMUSRVC.EXEVT_RESERVEDVARIANTINITVIRTUALFREEVIRTUALLOCKWSARECVFROMWARANG_CITIWHITE_SPACEWINDEFENDER[:^XDIGIT:]\DSEFIX.EXEALARM CLOCKAPPLICATIONBAD ADDRESSBAD MESSAGEBAD TIMEDIVBITCOINS.SKBROKEN PIPECAMPAIGN_IDCGOCALL NILCLOBBERFREECLOSESOCKETCOMBASE.DLLCREATED BY CRYPT32.DLLDNSMESSAGE.E2.KEFF.ORGEMBEDDED/%SEXTERNAL IPFILE EXISTSFINAL TOKENFLOAT32NAN2FLOAT64NAN2FLOAT64NAN3GCCHECKMARKGENERALIZEDGET CDN: %WGETPEERNAMEGETSOCKNAMEHTTPS_PROXYI/O TIMEOUTLOCAL ERRORLOST MCACHEMSPANMANUALMETHODARGS(MICROSECONDMILLISECONDMOVE %S: %WMSWSOCK.DLLNEXT SERVERNIL CONTEXTOPERA-PROXYORANNIS.COMOUT OF SYNCPARSE ERRORPROCESS: %SRAW-CONTROLREFLECT.SETRETRY-AFTERRUNTIME: P RUNTIME: P SCHEDDETAILSECHOST.DLLSECUR32.DLLSERVICE: %SSHELL32.DLLSHORT WRITESTART PROXYTASKMGR.EXETLS: ALERT(TRACEALLOC(TRAFFIC UPDUNREACHABLEUSERENV.DLLVERSION.DLLVERSION=191WININET.DLLWUP_PROCESS (SENSITIVE) [RECOVERED] ALLOCCOUNT FOUND AT *( GCSCANDONE M->GSIGNAL= MINTRIGGER= NDATAROOTS= NSPANROOTS= PAGES/BYTE
Source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.0000000002F70000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: ... OMITTING ACCEPT-CHARSETAFTER EFIGUARDALLOCFREETRACEBAD ALLOCCOUNTBAD RECORD MACBAD SPAN STATEBAD STACK SIZEBTC.USEBSV.COMCERT INSTALLEDCHECKSUM ERRORCONTENT-LENGTHCOULDN'T PATCHDATA TRUNCATEDDISTRIBUTOR_IDDRIVER REMOVEDERROR RESPONSEEXIT STATUS -1FILE TOO LARGEFINALIZER WAITGCSTOPTHEWORLDGET UPTIME: %WGETPROTOBYNAMEGOT SYSTEM PIDINITIAL SERVERINTERNAL ERRORINVALID SYNTAXIS A DIRECTORYKEY SIZE WRONGLEVEL 2 HALTEDLEVEL 3 HALTEDMEMPROFILERATENEED MORE DATANIL ELEM TYPE!NO MODULE DATANO SUCH DEVICEOBFS4PROXY.EXEOPEN EVENT: %WPARSE CERT: %WPROTOCOL ERRORREAD CERTS: %WREMOVE APP: %WRUNTIME: BASE=RUNTIME: FULL=S.ALLOCCOUNT= SEMAROOT QUEUESERVER.VERSIONSTACK OVERFLOWSTOPM SPINNINGSTORE64 FAILEDSYNC.COND.WAITTEXT FILE BUSYTIMEENDPERIODTOO MANY LINKSTOO MANY USERSTORRC FILENAMEUNEXPECTED EOFUNKNOWN CODE: UNKNOWN ERROR UNKNOWN METHODUNKNOWN MODE: UNREACHABLE: UNSAFE.POINTERVIRTUALBOX: %WVMWARETRAY.EXEVMWAREUSER.EXEWII LIBNUP/1.0WINAPI ERROR #WINDOW CREATEDWORK.FULL != 0X509IGNORECN=1XENSERVICE.EXEZERO PARAMETER WITH GC PROG
Source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.0000000002F70000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: TOO MANY LINKSTOO MANY USERSTORRC FILENAMEUNEXPECTED EOFUNKNOWN CODE: UNKNOWN ERROR UNKNOWN METHODUNKNOWN MODE: UNREACHABLE: UNSAFE.POINTERVIRTUALBOX: %WVMWARETRAY.EXEVMWAREUSER.EXEWII LIBNUP/1.0WINAPI ERROR #WINDOW CREATEDWORK.FULL != 0X509IGNORECN=1XENSERVICE.EXEZERO PARAMETER WITH GC PROG
Source: WER9Fz381n.exe Binary or memory string: RTP.EXESYSTEMROOT=SETFILETIMESIGNWRITINGSOFT_DOTTEDSYSTEMDRIVETESTING KEYTTL EXPIREDUNINSTALLERVBOXSERVICEVMUSRVC.EXEVT_RESERVEDVARIANTINITVIRTUALFREEVIRTUALLOCKWSARECVFROMWARANG_CITIWHITE_SPACEWINDEFENDER[:^XDIGIT:]\DSEFIX.EXEALARM CLOCKAPPLICATIONBAD ADDRESS
Source: C:\Users\user\Desktop\WER9Fz381n.exe File opened / queried: VBoxGuest Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe File opened / queried: VBoxTrayIPC Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe File opened / queried: \pipe\VBoxTrayIPC Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe File opened / queried: VBoxMiniRdrDN Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02FC0957 rdtsc 0_2_02FC0957
Source: C:\Users\user\Desktop\WER9Fz381n.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name FROM Win32_Processor
Source: WER9Fz381n.exe Binary or memory string: falsefaultfloatgcinggeoiphttpsimap2imap3imapsint16int32int64matchmkdirmonthntohsobfs4panicparsepgdsepop3sproxyrangermdirrouterune sdsetsleepslicesockssse41sse42ssse3text/tls13tls: torrctotaluint8usageuser=utf-8valuevmusbvmx86write (MB) Value addr= base code=
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: entersyscallexit status failed to %wfound av: %sgcpacertracegetaddrinfowgot TI tokenguid_machinehost is downhttp2debug=1http2debug=2illegal seekinjector.exeinstall_dateinvalid baseinvalid portinvalid slotiphlpapi.dllkernel32.dllmachine_guidmadvdontneedmax-forwardsmsftedit.dllnetapi32.dllno such hostnon-existentnot pollableoleaut32.dllout of rangeparse PE: %wpointtopointproxyconnectreflect.Copyreleasep: m=remote errorremoving appruntime: f= runtime: gp=s ap traffics hs trafficsetupapi.dllshort buffertraffic/readtransmitfileulrichard.chunexpected )unknown portunknown typevmacthlp.exevmtoolsd.exewatchdog.exewinlogon.exewintrust.dllwirep: p->m=wtsapi32.dll != sweepgen (default %q) (default %v) MB released
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: DSA-SHA1DecemberDefenderDeleteDCDuployanEULA.txtEqualSidEthiopicExtenderFebruaryFirewallFullPathGeorgianGetOEMCPGoStringGujaratiGurmukhiHTTP/1.1HTTP/2.0HiraganaInstFailInstRuneJavaneseKatakanaKayah_LiLIFETIMELinear_ALinear_BLocationLsaCloseMahajaniNO_ERRORNO_PROXYNovemberOl_ChikiPRIORITYPROGRESSParseIntPersoconPhags_PaQuestionReadFileReceivedSETTINGSSHA1-RSASOFTWARESaturdaySetEventSystem32TagbanwaTai_ThamTai_VietThursdayTifinaghTypeAAAATypeAXFRUSERHASHUSERNAMEUgariticVBoxWddmVT_ARRAYVT_BYREFWSAIoctlWinmonFSWmiPrvSE[:word:][signal \\.\HGFS\\.\vmcistack=[_NewEnumacceptexaddress bad instcgocheckcs default:dial: %wdnsquerydurationeax ebp ebx ecx edi edx eflags eip embeddedesi esp exporterf is nilfinishedfs go1.13.3gs hijackedhttp/1.1https://if-matchif-rangeinfinityinjectorinvalid locationloopbackmac_addrmountvolmsvmmoufno anodeno-cacheno_proxyopPseudoraw-readreadfromrecvfromrunnableruntime.scavengeshutdownstrconv.taskkilltor_modeunixgramunknown(usernamevmmemctlvmx_svgawalk: %wwsaioctlwuauservyuio.top (forced) blocked= defersc= in use)
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CDC000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: svchost.exesvchost.exespoolsv.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exeMicrosoft Windows 10 ProS-1-5-21-2246122658-3693405117-2476756634-1003FirstInstallDateIntel(R) Core(TM)2 CPU 6600 @ 2.40 GHzc:\users\user\desktop\wer9fz381n.exe"C:\Users\user\Desktop\WER9Fz381n.exe" c:\users\user\desktop\wer9fz381n.exeintel(r) core(tm)2 cpu 6600 @ 2.40 ghzcsrss.exewininit.execsrss.exewinlogon.exeservices.exelsass.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exespoolsv.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesihost.exesvchost.exesvchost.exesvchost.exesvchost.exectfmon.exesvchost.exeexplorer.exesvchost.exesvchost.exesvchost.exedasHost.exesvchost.exedllhost.exesvchost.exesvchost.exeWmiPrvSE.exeWmiPrvSE.exeWmiPrvSE.execonhost.exesppsvc.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exedllhost.exesvchost.exesvchost.exesvchost.exespoolsv.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesihost.exesvchost.exesvchost.exesvchost.exesvchost.exectfmon.exesvchost.exeexplorer.exesvchost.exesvchost.exesvchost.exedasHost.exesvchost.exedllhost.exesvchost.exesvchost.exeWmiPrvSE.exeWmiPrvSE.exeWmiPrvSE.execonhost.exesppsvc.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exedllhost.exesvchost.exevm detected: vmware: service: vmciC:\Users\user\Desktop\WER9Fz381n.exeC:\Users\user\Desktop\WER9Fz381n.exe.text
Source: WER9Fz381n.exe Binary or memory string: falsefaultfloatgcinggeoiphttpsimap2imap3imapsint16int32int64matchmkdirmonthntohsobfs4panicparsepgdsepop3sproxyrangermdirrouterune sdsetsleepslicesockssse41sse42ssse3text/tls13tls: torrctotaluint8usageuser=utf-8valuevmusbvmx86write (MB) Value addr= base code=
Source: WER9Fz381n.exe Binary or memory string: word:][signal \\.\HGFS\\.\vmcistack=[_NewEnumacceptexaddress bad instcgocheckcs default:dial: %wdnsquerydurationeax ebp ebx ecx edi edx eflags eip embeddedesi esp exporterf is nilfinishedfs go1.13.3gs hijack
Source: WER9Fz381n.exe Binary or memory string: typevmacthlp.exevmtoolsd.exewatchdog.exewinlogon.exewintrust.dllwirep: p->m=wtsapi32.dll != sweepgen (default %q) (default %v) MB released MB) workers= called from flushedWork gcscanvalid heap_marked= idlethreads= in duration in host name is nil, not nS
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CB2000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vm detected: vmware: service: vmci
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: IP addressIsValidSidKeep-AliveKharoshthiLocalAllocLockFileExLogonUserWManichaeanMessage-IdNo ContentOld_ItalicOld_PermicOld_TurkicOpenEventWOpenMutexWOpenThreadOther_MathPOSTALCODEParseFloatPhoenicianProcessingPulseEventRST_STREAMResetEventSHA256-RSASHA384-RSASHA512-RSASYSTEMROOTSaurashtraSecureBootSet-CookieShowWindowTor uptimeUseBridgesUser-AgentVMSrvc.exeVT_ILLEGALWSACleanupWSASocketWWSAStartupWget/1.9.1Windows 10Windows 11[:^alnum:][:^alpha:][:^ascii:][:^blank:][:^cntrl:][:^digit:][:^graph:][:^lower:][:^print:][:^punct:][:^space:][:^upper:][:xdigit:]\\.\WinMon\patch.exe^{[\w-]+}$app_%d.txtatomicand8attr%d=%s casgstatuscmd is nilcomplex128connectiondnsapi.dlldsefix.exedwarf.Attre.keff.orgexitThreadexp mastergetsockoptgoroutine http_proxyimage/jpegimage/webpindicationinvalidptrkeep-alivemSpanInUsenanosecondno resultsnot a boolnot signedowner diedprl_cc.exeres binderres masterresumptionrune <nil>runtime: gschedtracesemacquiresend stateset-cookiesetsockoptsocks bindterminatedtracefree(tracegc()
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CDC000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: 2024/11/01 11:04:59 vm detected: vmware: service: vmci
Source: WER9Fz381n.exe Binary or memory string: rTokenWrite after CloseWrong CredentialsX-Idempotency-Key\System32\drivers\\.\VBoxMiniRdrDNbad TinySizeClasscouldn't dial: %wcouldn't find pidcouldn't get UUIDcouldn't get pidscouldn't hide PIDcpu name is emptycreate window: %wdecryption faileddownloading prox
Source: WER9Fz381n.exe Binary or memory string: bfs4panicparsepgdsepop3sproxyrangermdirrouterune sdsetsleepslicesockssse41sse42ssse3text/tls13tls: torrctotaluint8usageuser=utf-8valuevmusbvmx86write (MB) Value addr= base code= ctxt: curg= goid jobs= list= m->p= next= p->m= prev= span=%d: %s%s.exe%s.sys%s:
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CDC000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: qemuvirtual
Source: WER9Fz381n.exe Binary or memory string: bindterminatedtracefree(tracegc() unixpacketunknown pcuser-agentuser32.dllvmusbmousevmware: %wws2_32.dll of size (targetpc= ErrCode=%v a.npages= b.npages= bytes ... gcwaiting= gp.status= heap_live= idleprocs= in status m->mcache= mallocing= ms clock,
Source: WER9Fz381n.exe Binary or memory string: dhttp/1.1https://if-matchif-rangeinfinityinjectorinvalid locationloopbackmac_addrmountvolmsvmmoufno anodeno-cacheno_proxyopPseudoraw-readreadfromrecvfromrunnableruntime.scavengeshutdownstrconv.taskkilltor_modeunixgramunknown(usernamevmmemctlvmx_svgawalk: %wwsa
Source: WER9Fz381n.exe Binary or memory string: FileUnauthorizedUnlockFileExVBoxTray.exeVariantClearVirtualAllocVirtualQueryWinmon32.sysWinmon64.sysWintrust.dllX-ImforwardsX-Powered-By[[:^ascii:]]\/(\d+)-(.*)\\.\WinMonFSabi mismatchadvapi32.dllaltmatch -> anynotnl -> bad flushGenbad g statusbad g0 stackbad
Source: WER9Fz381n.exe, 00000000.00000002.1405574701.0000000000E7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll&
Source: WER9Fz381n.exe Binary or memory string: runtime.scavengeshutdownstrconv.taskkilltor_modeunixgramunknown(usernamevmmemctlvmx_svgawalk: %wwsaioctlwuauservyuio.top (forced) blocked= defersc= in use) lockedg= lockedm= m->curg= method: ms cpu, not in [ of type runtime= s.limit= s.state= threads= u_a/
Source: WER9Fz381n.exe Binary or memory string: too many linkstoo many userstorrc filenameunexpected EOFunknown code: unknown error unknown methodunknown mode: unreachable: unsafe.Pointervirtualbox: %wvmwaretray.exevmwareuser.exewii libnup/1.0winapi error #window createdwork.full != 0x509ignoreCN=1xenservi
Source: WER9Fz381n.exe, 00000004.00000002.1444895629.0000000002A8C000.00000040.00000020.00020000.00000000.sdmp Binary or memory string: 11VBoxSFVT(%d)WINDIRWibx@
Source: WER9Fz381n.exe Binary or memory string: psfuncgziphosthourhttpicmpidleigmpint8jsonkindlinknonenullopenpathpipepop3quitreadsbrkseeksid=smtpsse2sse3tag:tcp4tcp6texttruetypeudp4udp6uintunixuuidvaryvmcixn-- -%s ... H_T= H_a= H_g= MB, W_a= \" and h_a= h_g= h_t= max= ptr siz= tab= top= u_a= u_g=%s
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: ... omitting accept-charsetafter EfiGuardallocfreetracebad allocCountbad record MACbad span statebad stack sizebtc.usebsv.comcert installedchecksum errorcontent-lengthcouldn't patchdata truncateddistributor_iddriver removederror responseexit status -1file too largefinalizer waitgcstoptheworldget uptime: %wgetprotobynamegot system PIDinitial serverinternal errorinvalid syntaxis a directorykey size wronglevel 2 haltedlevel 3 haltedmemprofilerateneed more datanil elem type!no module datano such deviceobfs4proxy.exeopen event: %wparse cert: %wprotocol errorread certs: %wremove app: %wruntime: base=runtime: full=s.allocCount= semaRoot queueserver.versionstack overflowstopm spinningstore64 failedsync.Cond.Waittext file busytimeEndPeriodtoo many linkstoo many userstorrc filenameunexpected EOFunknown code: unknown error unknown methodunknown mode: unreachable: unsafe.Pointervirtualbox: %wvmwaretray.exevmwareuser.exewii libnup/1.0winapi error #window createdwork.full != 0x509ignoreCN=1xenservice.exezero parameter with GC prog
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CDC000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: Microsoft Windows 10 ProHKEY_USERS\S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\TestAppHKEY_USERS\S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7Microsoft Windows 10 ProEastern Standard Time2024/11/01 11:04:59 vm detected: vmware: service: vmci
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: NonTransitionalNot ImplementedNtSuspendThreadOpenThreadTokenOther_LowercaseOther_UppercasePartial ContentPostQuitMessageProcess32FirstWPsalter_PahlaviQueryDosDeviceWRegCreateKeyExWRegDeleteValueWRequest TimeoutRtlDefaultNpAclSafeArrayCreateSafeArrayGetDimSafeArrayGetIIDSafeArrayUnlockScheduledUpdateSetCommTimeoutsSetSecurityInfoSetVolumeLabelWShellExecuteExWStringFromCLSIDStringFromGUID2TerminateThreadUnescaped quoteUninstallStringUnmapViewOfFileVBoxService.exeVPS.hsmiths.comWinsta0\DefaultX-Forwarded-For\\.\VBoxTrayIPC]
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: Value is nullVirtualUnlockWINDOW_UPDATEWTSFreeMemoryWriteConsoleW[FrameHeader \\.\VBoxGuestaccept-rangesaccess deniedadvapi32.dll
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CDC000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vm+detected%3A+vmware%3A+service%3A+vmci
Source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.0000000002F70000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: &gt;&lt;'\'') = ) m=+Inf+inf, n -Inf-inf.bat.cmd.com.css.exe.gif.htm.jpg.mjs.pdf.png.svg.sys.xml0x%x1.1110803125: p=ACDTACSTAEDTAESTAKDTAKSTAWSTAhomAtoiCDN=CESTChamDATADashDataDateEESTEULAEtagFromGOGCGoneHEADHKCCHKLMHostJulyJuneLisuMiaoModiNZDTNZSTNewaPINGPOSTQEMUROOTSASTSendStatTempThaiUUIDWEST"%s"\rss\smb\u00
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CDC000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: systemvboxtray.exe
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: VersionVirtualWSARecvWSASend"%s" %stypes value=abortedalt -> any -> booleancharsetchunkedcmd.execonnectconsolecpu: %sderiveddriversexpiresfloat32float64gctracehttp://invalidlog.txtlookup max-agemessagenil keynop -> number panic: refererrefreshrequestrunningserial:server=signal svc_versyscalltor.exetraileruintptrunknownupgradeversionvmmousevpcuhubwaitingwsarecvwsasendwup_verxen: %wxennet6 data=%q etypes goal
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: underflowunhandledunzip Torunzip: %ww3m/0.5.1websocketxenevtchn} stack=[ MB goal, actual
Source: WER9Fz381n.exe Binary or memory string: InformationSetVolumeMountPointWSetupDiOpenDevRegKeyTaipei Standard TimeTerminal_PunctuationTurkey Standard TimeUnprocessable EntityWinmonProcessMonitor[invalid char class]\\.\pipe\VBoxTrayIPCasn1: syntax error: bad defer size classbad font file formatbad syste
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: GetActiveObjectGetAdaptersInfoGetCommTimeoutsGetCommandLineWGetFirmwareTypeGetProcessTimesGetSecurityInfoGetStartupInfoWGlobal\qtxp9g8wHanifi_RohingyaICE-CONTROLLINGIdempotency-KeyImpersonateSelfInstall failureIsWow64Process2Length RequiredLoadLibraryExALoadLibraryExWNonTransitionalNot ImplementedNtSuspendThreadOpenThreadTokenOther_LowercaseOther_UppercasePartial ContentPostQuitMessageProcess32FirstWPsalter_PahlaviQueryDosDeviceWRegCreateKeyExWRegDeleteValueWRequest TimeoutRtlDefaultNpAclSafeArrayCreateSafeArrayGetDimSafeArrayGetIIDSafeArrayUnlockScheduledUpdateSetCommTimeoutsSetSecurityInfoSetVolumeLabelWShellExecuteExWStringFromCLSIDStringFromGUID2TerminateThreadUnescaped quoteUninstallStringUnmapViewOfFileVBoxService.exeVPS.hsmiths.comWinsta0\DefaultX-Forwarded-For\\.\VBoxTrayIPC]
Source: WER9Fz381n.exe, 00000000.00000002.1406124092.0000000002B7B000.00000040.00000020.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1444895629.0000000002A8C000.00000040.00000020.00020000.00000000.sdmp Binary or memory string: ewaPINGPOSTQEMUROOTG
Source: WER9Fz381n.exe Binary or memory string: releasep: m=remote errorremoving appruntime: f= runtime: gp=s ap traffics hs trafficsetupapi.dllshort buffertraffic/readtransmitfileulrichard.chunexpected )unknown portunknown typevmacthlp.exevmtoolsd.exewatchdog.exewinlogon.exewintrust.dllwirep: p->m=wtsapi32
Source: WER9Fz381n.exe Binary or memory string: ashDataDateEESTEULAEtagFromGOGCGoneHEADHKCCHKLMHostJulyJuneLisuMiaoModiNZDTNZSTNewaPINGPOSTQEMUROOTSASTSendStatTempThaiUUIDWEST"%s"\rss\smb\u00 %+v m=] n=archasn1avx2basebindbmi1bmi2boolcallcap cas1cas2cas3cas4cas5cas6chandatedeaddialdoneermsetagfailfilefromf
Source: WER9Fz381n.exe, 00000000.00000002.1406124092.0000000002B7B000.00000040.00000020.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1444895629.0000000002A8C000.00000040.00000020.00020000.00000000.sdmp Binary or memory string: hgfsO
Source: WER9Fz381n.exe, 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp Binary or memory string: main.isRunningInsideVMWare
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CB2000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: useruser-PCC:\Windows\system32\kernel32.dllC:\Users\user\Desktop\WER9Fz381n.exeSELECT Caption FROM Win32_OperatingSystem\\.\VBoxMiniRdrDN\\.\pipe\VBoxMiniRdDN\\.\pipe\VBoxTrayIPCcsrss.exewininit.execsrss.exewinlogon.exeservices.exelsass.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exe93b62ac7-5555-49b6-9788-02d52105fd16vm detected: vmware: service: vmci
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CFA000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: SearchApp.exesearchapp.exesvchost.exedllhost.exesvchost.exesvchost.exeWmiPrvSE.exewmiprvse.exewinstore.app.exeWmiPrvSE.exewmiprvse.exeWmiPrvSE.exewmiprvse.execonhost.exesppsvc.exeupfc.exesvchost.exesgrmbroker.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exedllhost.exesvchost.exewer9fz381n.exevmci$
Source: WER9Fz381n.exe Binary or memory string: rayGetIIDSafeArrayUnlockScheduledUpdateSetCommTimeoutsSetSecurityInfoSetVolumeLabelWShellExecuteExWStringFromCLSIDStringFromGUID2TerminateThreadUnescaped quoteUninstallStringUnmapViewOfFileVBoxService.exeVPS.hsmiths.comWinsta0\DefaultX-Forwarded-For\\.\VBoxTra
Source: WER9Fz381n.exe Binary or memory string: usageuser=utf-8valuevmusbvmx86write (MB) Value addr= base code= ctxt: curg= goid jobs= list= m->p= next= p->m= prev= span=%d: %s%s.exe%s.sys%s: %s(...), not , val -BEFV--DYOR--FMLD--FZTA--IRXC--JFQI--JQGP--JSKV--JZUF--KGQJ--KSFO--MKND--MOHU--NSFS--PFQJ--PL
Source: WER9Fz381n.exe Binary or memory string: rnateUSE-CANDIDATEUsage of %s: Value is nullVirtualUnlockWINDOW_UPDATEWTSFreeMemoryWriteConsoleW[FrameHeader \\.\VBoxGuestaccept-rangesaccess deniedadvapi32.dll
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CDC000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: VBoxSF$
Source: WER9Fz381n.exe Binary or memory string: , n -Inf-inf.bat.cmd.com.css.exe.gif.htm.jpg.mjs.pdf.png.svg.sys.xml0x%x1.1110803125: p=ACDTACSTAEDTAESTAKDTAKSTAWSTAhomAtoiCDN=CESTChamDATADashDataDateEESTEULAEtagFromGOGCGoneHEADHKCCHKLMHostJulyJuneLisuMiaoModiNZDTNZSTNewaPINGPOSTQEMUROOTSASTSendStatTempThai
Source: WER9Fz381n.exe Binary or memory string: truetypeudp4udp6uintunixuuidvaryvmcixn-- -%s ... H_T= H_a= H_g= MB, W_a= \" and h_a= h_g= h_t= max= ptr siz= tab= top= u_a= u_g=%s %q%s %s%s*%d%s/%s%s:%d%s=%s&#34;&#39;&amp;+0330+0430+0530+0545+0630+0845+1030+1245+1345, ..., fp:-0930.html.jpeg.wasm.webp
Source: WER9Fz381n.exe, 00000004.00000002.1444895629.0000000002A8C000.00000040.00000020.00020000.00000000.sdmp Binary or memory string: yvmcixn-Re-
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CDC000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vboxservice.exe
Source: WER9Fz381n.exe Binary or memory string: 11VBoxSFVT(%d)WINDIRWinMonWinmon[]byte\??\%s\csrss\ufffd acceptactivechan<-closedcookiedirectdomaindwarf.efenceempty exec: expectfamilygeoip6gopherhangupheaderip+netkilledlistenminutenumberobjectpopcntreadatreasonremoverenamerun-v3rune1 scvg: secondsecure
Source: WER9Fz381n.exe Binary or memory string: RTP.exeSYSTEMROOT=SetFileTimeSignWritingSoft_DottedSystemDriveTESTING KEYTTL expiredUninstallerVBoxServiceVMUSrvc.exeVT_RESERVEDVariantInitVirtualFreeVirtualLockWSARecvFromWarang_CitiWhite_SpaceWinDefender[:^xdigit:]\dsefix.exealarm clockapplicationbad address
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CDC000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vboxtray.exe
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: m=] n=archasn1avx2basebindbmi1bmi2boolcallcap cas1cas2cas3cas4cas5cas6chandatedeaddialdoneermsetagfailfilefromftpsfuncgziphosthourhttpicmpidleigmpint8jsonkindlinknonenullopenpathpipepop3quitreadsbrkseeksid=smtpsse2sse3tag:tcp4tcp6texttruetypeudp4udp6uintunixuuidvaryvmcixn-- -%s ...
Source: WER9Fz381n.exe Binary or memory string: basebindbmi1bmi2boolcallcap cas1cas2cas3cas4cas5cas6chandatedeaddialdoneermsetagfailfilefromftpsfuncgziphosthourhttpicmpidleigmpint8jsonkindlinknonenullopenpathpipepop3quitreadsbrkseeksid=smtpsse2sse3tag:tcp4tcp6texttruetypeudp4udp6uintunixuuidvaryvmcixn-- -%
Source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.0000000002F70000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: 100-continue127.0.0.1:%d152587890625762939453125AUTHENTICATEBidi_ControlCIDR addressCONTINUATIONCfgMgr32.dllCoCreateGuidCoInitializeContent TypeContent-TypeCookie.ValueCreateEventWCreateMutexWDeleteObjectECDSA-SHA256ECDSA-SHA384ECDSA-SHA512ErrUnknownPCFindNextFileGetAddrInfoWGetConsoleCPGetLastErrorGetLengthSidGetProcessIdGetStdHandleGetTempPathWGetUserGeoIDGlobalUnlockGlobal\csrssI'm a teapotInstAltMatchJoin_ControlLittleEndianLoadLibraryWLoadResourceLockResourceMax-ForwardsMeetei_MayekMime-VersionMulti-StatusNot ExtendedNot ModifiedNtCreateFileOpenServiceWPUSH_PROMISEPahawh_HmongRCodeRefusedRCodeSuccessReadConsoleWReleaseMutexReportEventWResumeThreadRevertToSelfRoInitializeS-1-5-32-544SERIALNUMBERSelectObjectServer ErrorSetEndOfFileSetErrorModeSetStdHandleSora_SompengSyloti_NagriSysStringLenThread32NextTor mode setTransitionalTransmitFileUnauthorizedUnlockFileExVBoxTray.exeVariantClearVirtualAllocVirtualQueryWinmon32.sysWinmon64.sysWintrust.dllX-ImforwardsX-Powered-By[[:^ascii:]]\/(\d+)-(.*)\\.\WinMonFSabi mismatchadvapi32.dllaltmatch -> anynotnl -> bad flushGenbad g statusbad g0 stackbad recoverybad value %dbootmgfw.efibuild_numberc ap trafficc hs trafficcaller errorcan't happencas64 failedcdn is emptychan receiveclose notifycontent-typecontext.TODOcountry_codedse disableddumping heapend tracegc
Source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.0000000002F70000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: DnsRecordListFreeENHANCE_YOUR_CALMEnumThreadWindowsFLE Standard TimeFailed DependencyGC assist markingGMT Standard TimeGTB Standard TimeGetCurrentProcessGetShortPathNameWHEADER_TABLE_SIZEHKEY_CLASSES_ROOTHKEY_CURRENT_USERHTTP_1_1_REQUIREDIf-Modified-SinceIsTokenRestrictedLookupAccountSidWMESSAGE-INTEGRITYMoved PermanentlyOld_North_ArabianOld_South_ArabianOther_ID_ContinuePython-urllib/2.5QueryWorkingSetExRESERVATION-TOKENReadProcessMemoryRegLoadMUIStringWSafeArrayCopyDataSafeArrayCreateExSentence_TerminalSysAllocStringLenToo Many RequestsTransfer-EncodingUnexpected escapeUnified_IdeographUnknown AttributeVGAuthService.exeWSAEnumProtocolsWWTSQueryUserTokenWrite after CloseWrong CredentialsX-Idempotency-Key\System32\drivers\\.\VBoxMiniRdrDNbad TinySizeClasscouldn't dial: %wcouldn't find pidcouldn't get UUIDcouldn't get pidscouldn't hide PIDcpu name is emptycreate window: %wdecryption faileddownloading proxyelectrumx.soon.itembedded/%s32.sysembedded/%s64.sysembedded/EULA.txtentersyscallblockexec format errorexec: not startedexponent overflowfile URL is emptyfractional secondgp.waiting != nilhandshake failureif-modified-sinceillegal parameterimpersonation: %win string literalindex > windowEndinteger too largeinvalid bit size invalid stream IDkey align too biglibwww-perl/5.820locked m0 woke upmark - bad statusmarkBits overflowmissing closing )missing closing ]missing extensionnil resource bodyno data availablenotetsleepg on g0permission deniedpseudo-device: %sread revision: %wreflect.Value.Capreflect.Value.Intreflect.Value.Lenreflect: New(nil)reflect: call of removing watchdogruntime.newosprocruntime: a.base= runtime: b.base= runtime: nameOff runtime: next_gc=runtime: pointer runtime: textOff runtime: typeOff s.callback is nilscanobject n == 0seek at 0x%0x: %wseeker can't seekselect (no cases)stack: frame={sp:start service: %wthread exhaustiontransfer-encodingtruncated headersunknown caller pcvalidate hash: %wwait for GC cyclewine_get_version
Source: WER9Fz381n.exe Binary or memory string: oenicianProcessingPulseEventRST_STREAMResetEventSHA256-RSASHA384-RSASHA512-RSASYSTEMROOTSaurashtraSecureBootSet-CookieShowWindowTor uptimeUseBridgesUser-AgentVMSrvc.exeVT_ILLEGALWSACleanupWSASocketWWSAStartupWget/1.9.1Windows 10Windows 11[:^alnum:][:^alpha:][:
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CFA000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vmware: service: vmci
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013D6A000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: build_number=19045&campaign_id=%2F407&distributor_id=407&machine_guid=9e146be9-c76a-4720-bcdb-53011b87bd06&reason=vm+detected%3A+vmware%3A+service%3A+vmci&version=191
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: unixpacketunknown pcuser-agentuser32.dllvmusbmousevmware: %wws2_32.dll of size (targetpc= ErrCode=%v a.npages= b.npages= bytes ...
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CDC000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: winstore.app.exevboxtray.exe
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CFA000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: service: vmcicsrss
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CDC000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: [system process]vboxtray.exe
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: Value is nullVirtualUnlockWINDOW_UPDATEWTSFreeMemoryWriteConsoleW[FrameHeader \\.\VBoxGuestaccept-rangesaccess deniedadvapi32.dllauthorizationbad flushGen bad map statebtc.cihar.combtc.xskyx.netcache-controlcontent-rangecouldn't polldalTLDpSugct?data is emptyemail addressempty integerexchange fullfatal error: gethostbynamegetservbynamegzip, deflatehttp2client=0if-none-matchimage/svg+xmlinvalid UTF-8invalid base kernel32.dllkey expansionlast-modifiedlevel 3 resetload64 failedmaster secretname is emptynil stackbasenot a Float32open file: %wout of memoryparallels: %wparsing time powrprof.dllprl_tools.exeread EULA: %wrebooting nowscvg: inuse: service stateset event: %wsigner is nilsocks connectsrmount errorstill in listtimer expiredtrailing datatriggerRatio=unimplementedunsupported: user canceledvalue method virtualpc: %wxadd64 failedxchg64 failed}
Source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.0000000002F70000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: to unallocated span$WINDIR\watchdog.exe%%!%c(*big.Float=%s)%s\Sysnative\cmd.exe37252902984619140625Arabic Standard TimeAzores Standard TimeCertFindChainInStoreCertOpenSystemStoreWChangeServiceConfigWCheckTokenMembershipCreateProcessAsUserWCryptAcquireContextWEgyptian_HieroglyphsEnumProcessModulesExFileTimeToSystemTimeGetAcceptExSockaddrsGetAdaptersAddressesGetCurrentDirectoryWGetFileAttributesExWGetModuleFileNameExWGetModuleInformationGetProcessMemoryInfoGetWindowsDirectoryWIDS_Trinary_OperatorInsufficient StorageIsrael Standard TimeJordan Standard TimeMAX_HEADER_LIST_SIZEMalformed JSON errorMediapartners-GoogleMeroitic_HieroglyphsNtSetInformationFileNtUnmapViewOfSectionNtWriteVirtualMemoryOffline Explorer/2.5ProcessIdToSessionIdQueryServiceConfig2WQueryServiceStatusExRegisterEventSourceWRequest URI Too LongRtlInitUnicodeStringSHGetKnownFolderPathSafeArrayDestroyDataSafeArrayGetElemsizeSeek: invalid offsetSeek: invalid whenceSetCurrentDirectoryWSetHandleInformationSetVolumeMountPointWSetupDiOpenDevRegKeyTaipei Standard TimeTerminal_PunctuationTurkey Standard TimeUnprocessable EntityWinmonProcessMonitor[invalid char class]\\.\pipe\VBoxTrayIPCasn1: syntax error: bad defer size classbad font file formatbad system page sizebad use of bucket.bpbad use of bucket.mpchan send (nil chan)close of nil channelconnection error: %sconnection timed outcouldn't disable DSEcouldn't get IsAdmincouldn't get serverscouldn't run servicecouldn't set IsAdmincouldn't set serverscouldn't stop PsaSvccouldn't write patchcreate proxy dir: %wcreate text edit: %wdecode siganture: %wdecode signature: %welectrum.bitkoins.nlelectrum.hsmiths.comelectrum.taborsky.czelectrum.villocq.comevent message is nilflag: help requestedfloating point errorforcegc: phase errorgc_trigger underflowget transactions: %wgetadaptersaddressesgo of nil func valuegopark: bad g statusgzip: invalid headerheader line too longhttp2: stream closedinvalid repeat countinvalid request codeis a named type filejson: Unmarshal(nil json: Unmarshal(nil)key has been revokedmSpanList.insertBackmalformed ciphertextmalloc during signalmove GeoIP files: %wmove Tor GeoIP filesno such struct fieldnon-empty swept listnorm: invalid whencenot an integer classnotetsleep not on g0number has no digitsp mcache not flushedpacer: assist ratio=pad length too largepreempt off reason: reflect.Value.SetIntreflect.makeFuncStubrequest file CDN: %wroot\SecurityCenter2runtime: casgstatus runtime: double waitruntime: unknown pc semaRoot rotateRightstun.ipfire.org:3478systemdrive is emptytime: invalid numbertrace: out of memoryunexpected network: unknown address typeunsupported arch: %suser is not an adminvalue is not presentwirep: already in goworkbuf is not emptywrite of Go pointer ws2_32.dll not foundzlib: invalid header gp.gcscanvalid=true
Source: WER9Fz381n.exe Binary or memory string: runtime.scavengeshutdownstrconv.taskkilltor_modeunixgramunknown(usernamevmmemctlvmx_svgawalk: %wwsaioctlwuauservyuio.top (forced) blocked= defersc= in use) lockedg= lockedm= m->curg= method: ms cpu, not in [ of type runtime= s.limit= s.state= threads= u_a/
Source: WER9Fz381n.exe, 00000000.00000002.1406124092.0000000002B7B000.00000040.00000020.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1444895629.0000000002A8C000.00000040.00000020.00020000.00000000.sdmp Binary or memory string: \\.\HGFS`
Source: WER9Fz381n.exe, 00000004.00000002.1444299041.0000000000DA8000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CDC000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: *struct { BuildNumber string }vm+detected%3A+vmware%3A+service%3A+vmci/
Source: WER9Fz381n.exe Binary or memory string: anNot FoundOP_RETURNOSCaptionPalmyreneParseUintPatchTimePublisherReleaseDCRemoveAllSTUN addrSamaritanSee OtherSeptemberSundaneseSysnativeToo EarlyTrailer: TypeCNAMETypeHINFOTypeMINFOUse ProxyVBoxGuestVBoxMouseVBoxVideoWSASendToWednesdayWindows 7WriteFileZ07:00
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: (MISSING)(unknown)+infinity, newval=, oldval=-07:00:00-infinity/api/cdn?/api/poll127.0.0.1244140625: status=; Domain=Accuracy(AuthorityBassa_VahBhaiksukiClassINETCuneiformDiacriticEVEN-PORTExecQueryFindCloseForbiddenGetDIBitsHex_DigitInheritedInstMatchInstRune1InterfaceKhudawadiLocalFreeMalayalamMongolianMoveFileWNabataeanNot FoundOP_RETURNOSCaptionPalmyreneParseUintPatchTimePublisherReleaseDCRemoveAllSTUN addrSamaritanSee OtherSeptemberSundaneseSysnativeToo EarlyTrailer: TypeCNAMETypeHINFOTypeMINFOUse ProxyVBoxGuestVBoxMouseVBoxVideoWSASendToWednesdayWindows 7WriteFileZ07:00:00[%v = %d][:^word:][:alnum:][:alpha:][:ascii:][:blank:][:cntrl:][:digit:][:graph:][:lower:][:print:][:punct:][:space:][:upper:]atomicor8attributeb.ooze.ccbad indirbroadcastbus errorchallengechan sendcomplex64connectexcopystackcsrss.exectxt != 0d.nx != 0ecdsa.netempty urlfn.48.orgfodhelperfork/execfuncargs(gdi32.dllimage/gifimage/pnginterfaceinterruptipv6-icmplocalhostmSpanDeadmSpanFreemulticastnew tokennil errorntdll.dllole32.dllomitemptyop_returnpanicwaitpatch.exepclmulqdqprintableprotocol proxy.exepsapi.dllraw-writereboot inrecover: reflect: rwxrwxrwxsucceededtask %+v
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CAE000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: CoCreateInstanceConnectServerkernel32.dllGetUserDefaultLCIDoleaut32.dllExecQuerySysAllocStringLen_NewEnumVBoxMouseVBoxVideo\\.\VBoxGuest\\.\VBoxTrayIPC[System Process]vgauthservice.exeSystemvgauthservice.exeRegistryvgauthservice.exesmss.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exefontdrvhost.exevgauthservice.exefontdrvhost.exevgauthservice.exevgauthservice.exevgauthservice.exedwm.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exeMemory Compressionmemory compressionvgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exevgauthservice.exeFri, 01 Nov 2024 15:05:00 GMTtext/html; charset=utf-8no-store, max-age=0sec-ch-prefers-color-schemesec-ch-prefers-color-schemesec-ch-prefers-color-scheme
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CD2000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: Tadvapi32.dllRegQueryValueExWServiceVersionServersVersionDistributorIDCampaignIDOSCaptionMicrosoft Windows 10 ProOSArchitecture64-bitPatchTimeBW3L8KKc:\windows\rss\csrss.exeGetTimeZoneInformationEastern Standard Time2024/11/01 11:04:57 OpenProcessTokenGetTokenInformationS-1-5-18c:\windows\rss\csrss.exeCreateToolhelp32Snapshot[System Process]SystemRegistrysmss.exefontdrvhost.exefontdrvhost.exedwm.exeMemory Compressionmemory compressionOfficeClickToRun.exeofficeclicktorun.exeStartMenuExperienceHost.exestartmenuexperiencehost.exeRuntimeBroker.exeruntimebroker.exeRuntimeBroker.exeruntimebroker.exeRuntimeBroker.exeruntimebroker.exesmartscreen.exeApplicationFrameHost.exeapplicationframehost.exeWinStore.App.exeRuntimeBroker.exeruntimebroker.exeTextInputHost.exetextinputhost.exebackgroundTaskHost.exebackgroundtaskhost.exeRuntimeBroker.exeruntimebroker.exeRuntimeBroker.exeruntimebroker.exeupfc.exeSgrmBroker.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUnvh.exefhtgnsqsiunvh.exefhTGNsQSiUn
Source: WER9Fz381n.exe Binary or memory string: GOROOTGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLepchaLockedLycianLydianMondayPADDEDPcaSvcPragmaRejangSCHED STREETServerStringSundaySyriacTai_LeTangutTeluguThaanaTypeMXTypeNSUTC+12UTC+13UTC-02UTC-08UTC-09UTC-11VBoxSFVT(%d)WINDIRWinMonWinmon[]byte\??\%s\c
Source: WER9Fz381n.exe, 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, WER9Fz381n.exe, 00000000.00000002.1406450301.0000000002F70000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1445502886.0000000002E80000.00000040.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: DnsRecordListFreeENHANCE_YOUR_CALMEnumThreadWindowsFLE Standard TimeFailed DependencyGC assist markingGMT Standard TimeGTB Standard TimeGetCurrentProcessGetShortPathNameWHEADER_TABLE_SIZEHKEY_CLASSES_ROOTHKEY_CURRENT_USERHTTP_1_1_REQUIREDIf-Modified-SinceIsTokenRestrictedLookupAccountSidWMESSAGE-INTEGRITYMoved PermanentlyOld_North_ArabianOld_South_ArabianOther_ID_ContinuePython-urllib/2.5QueryWorkingSetExRESERVATION-TOKENReadProcessMemoryRegLoadMUIStringWSafeArrayCopyDataSafeArrayCreateExSentence_TerminalSysAllocStringLenToo Many RequestsTransfer-EncodingUnexpected escapeUnified_IdeographUnknown AttributeVGAuthService.exeWSAEnumProtocolsWWTSQueryUserTokenWrite after CloseWrong CredentialsX-Idempotency-Key\System32\drivers\\.\VBoxMiniRdrDNbad TinySizeClasscouldn't dial: %wcouldn't find pidcouldn't get UUIDcouldn't get pidscouldn't hide PIDcpu name is emptycreate window: %wdecryption faileddownloading proxyelectrumx.soon.itembedded/%s32.sysembedded/%s64.sysembedded/EULA.txtentersyscallblockexec format errorexec: not startedexponent overflowfile URL is emptyfractional secondgp.waiting != nilhandshake failureif-modified-sinceillegal parameterimpersonation: %win string literalindex > windowEndinteger too largeinvalid bit size invalid stream IDkey align too biglibwww-perl/5.820locked m0 woke upmark - bad statusmarkBits overflowmissing closing )missing closing ]missing extensionnil resource bodyno data availablenotetsleepg on g0permission deniedpseudo-device: %sread revision: %wreflect.Value.Capreflect.Value.Intreflect.Value.Lenreflect: New(nil)reflect: call of removing watchdogruntime.newosprocruntime: a.base= runtime: b.base= runtime: nameOff runtime: next_gc=runtime: pointer runtime: textOff runtime: typeOff s.callback is nilscanobject n == 0seek at 0x%0x: %wseeker can't seekselect (no cases)stack: frame={sp:start service: %wthread exhaustiontransfer-encodingtruncated headersunknown caller pcvalidate hash: %wwait for GC cyclewine_get_versionwrong medium type but memory size because dotdotdot to non-Go memory $SYSTEMDRIVE\Users, locked to thread298023223876953125: day out of rangeArab Standard TimeAsset %s not foundCM_MapCrToWin32ErrCaucasian_AlbanianCertGetNameStringWCloseServiceHandleCommandLineToArgvWCreateCompatibleDCCreateDispTypeInfoCreateFileMappingWCreateRemoteThreadCreateWellKnownSidCryptUnprotectDataCuba Standard TimeELinks/0.12~pre5-4EnumProcessModulesExpectation FailedFLOW_CONTROL_ERRORFiji Standard TimeGetBestInterfaceExGetComputerNameExWGetCurrentThreadIdGetExitCodeProcessGetFileAttributesWGetModuleBaseNameWGetModuleFileNameWGetModuleHandleExWGetSidSubAuthorityGetUserDefaultLCIDGetVolumePathNameWGo-http-client/1.1Go-http-client/2.0HKEY_LOCAL_MACHINEInternetSetOptionWIran Standard TimeKey path not foundLookupAccountNameWMakeSelfRelativeSDMethod Not AllowedNtSetContextThreadOmsk Standard TimePASSWORD-ALGORITHMPFXImportCertStorePermanent RedirectProxy-AuthenticateQueryServiceStatusRCodeServerFailureRFS specific errorRegional_IndicatorRoAc
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: and h_a= h_g= h_t= max= ptr siz= tab= top= u_a= u_g=%s %q%s %s%s*%d%s/%s%s:%d%s=%s&#34;&#39;&amp;+0330+0430+0530+0545+0630+0845+1030+1245+1345, ..., fp:-0930.html.jpeg.wasm.webp1.4.2156253.2.250001500025000350004500055000650512560015600278125:***@:path<nil>AdlamAprilAttr(BamumBatakBuhidCall CountDograECDSAErrorFlagsFoundGetDCGreekHTTP/KhmerLatinLimbuLocalLstatMarchNONCENushuOghamOriyaOsageP-224P-256P-384P-521PGDSEREALMRangeRealmRunicSTermTakriTamilTypeAUUID=\u202allowarraybad nchdirclosecsrssfalsefaultfloatgcinggeoiphttpsimap2imap3imapsint16int32int64matchmkdirmonthntohsobfs4panicparsepgdsepop3sproxyrangermdirrouterune sdsetsleepslicesockssse41sse42ssse3text/tls13tls: torrctotaluint8usageuser=utf-8valuevmusbvmx86write (MB)
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CFA000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: service: vmci
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: RTP.exeSYSTEMROOT=SetFileTimeSignWritingSoft_DottedSystemDriveTESTING KEYTTL expiredUninstallerVBoxServiceVMUSrvc.exeVT_RESERVEDVariantInitVirtualFreeVirtualLockWSARecvFromWarang_CitiWhite_SpaceWinDefender[:^xdigit:]\dsefix.exealarm clockapplicationbad addressbad messagebad timedivbitcoins.skbroken pipecampaign_idcgocall nilclobberfreeclosesocketcombase.dllcreated by crypt32.dlldnsmessage.e2.keff.orgembedded/%sexternal IPfile existsfinal tokenfloat32nan2float64nan2float64nan3gccheckmarkgeneralizedget CDN: %wgetpeernamegetsocknamehttps_proxyi/o timeoutlocal errorlost mcachemSpanManualmethodargs(microsecondmillisecondmove %s: %wmswsock.dllnext servernil contextopera-proxyorannis.comout of syncparse errorprocess: %sraw-controlreflect.Setretry-afterruntime: P runtime: p scheddetailsechost.dllsecur32.dllservice: %sshell32.dllshort writestart proxytaskmgr.exetls: alert(tracealloc(traffic updunreachableuserenv.dllversion.dllversion=191wininet.dllwup_process (sensitive) [recovered] allocCount found at *( gcscandone m->gsignal= minTrigger= nDataRoots= nSpanRoots= pages/byte
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: acceptactivechan<-closedcookiedirectdomaindwarf.efenceempty exec: expectfamilygeoip6gopherhangupheaderip+netkilledlistenminutenumberobjectpopcntreadatreasonremoverenamerun-v3rune1 scvg: secondsecureselectsendtoserversocketsocks socks5statusstringstructsweep telnetuint16uint32uint64unuseduptimevmhgfsvmxnetvpc-s3wup_hsxennetxensvcxenvdb %v=%v, (conn) (scan (scan) MB in Value> dying= flags= len=%d locks= m->g0= nmsys= s=nil
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013D26000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: build_number=19045&campaign_id=%2F407&distributor_id=407&machine_guid=9e146be9-c76a-4720-bcdb-53011b87bd06&reason=vm+detected%3A+vmware%3A+service%3A+vmci&version=191R
Source: WER9Fz381n.exe Binary or memory string: usageuser=utf-8valuevmusbvmx86write (MB) Value addr= base code= ctxt: curg= goid jobs= list= m->p= next= p->m= prev= span=%d: %s%s.exe%s.sys%s: %s(...) , not , val -BEFV--DYOR--FMLD--FZTA--IRXC--JFQI--JQGP--JSKV--JZUF--KGQJ--KSFO--MKND--MOHU--NSFS--PFQJ--PL
Source: WER9Fz381n.exe Binary or memory string: electsendtoserversocketsocks socks5statusstringstructsweep telnetuint16uint32uint64unuseduptimevmhgfsvmxnetvpc-s3wup_hsxennetxensvcxenvdb %v=%v, (conn) (scan (scan) MB in Value> dying= flags= len=%d locks= m->g0= nmsys= s=nil $WINDIR%03d %s%v: %#x, goid=, si
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: too many linkstoo many userstorrc filenameunexpected EOFunknown code: unknown error unknown methodunknown mode: unreachable: unsafe.Pointervirtualbox: %wvmwaretray.exevmwareuser.exewii libnup/1.0winapi error #window createdwork.full != 0x509ignoreCN=1xenservice.exezero parameter with GC prog
Source: WER9Fz381n.exe, 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: , not , val -BEFV--DYOR--FMLD--FZTA--IRXC--JFQI--JQGP--JSKV--JZUF--KGQJ--KSFO--MKND--MOHU--NSFS--PFQJ--PLND--RTMD--VRSM--XQVL-.onion/%d-%s370000390625:31461<-chanAcceptAnswerArabicAugustBUTTONBasic BitBltBrahmiBridgeCANCELCancelCarianChakmaClass(CommonCookieCopticDELETEExpectFltMgrFormatFridayGOAWAYGOROOTGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLepchaLockedLycianLydianMondayPADDEDPcaSvcPragmaRejangSCHED STREETServerStringSundaySyriacTai_LeTangutTeluguThaanaTypeMXTypeNSUTC+12UTC+13UTC-02UTC-08UTC-09UTC-11VBoxSFVT(%d)WINDIRWinMonWinmon[]byte\??\%s\csrss\ufffd
Source: WER9Fz381n.exe, 00000004.00000002.1446483656.0000000013CDC000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: CloseHandleS-1-5-18nehalemkvmqemuvirtualpersoconProcess32FirstW[system process]vboxtray.exevboxservice.exeProcess32NextWSystemsystemvboxtray.exevboxservice.exeRegistryregistry
Source: WER9Fz381n.exe Binary or memory string: truetypeudp4udp6uintunixuuidvaryvmcixn-- -%s ... H_T= H_a= H_g= MB, W_a= \" and h_a= h_g= h_t= max= ptr siz= tab= top= u_a= u_g=%s %q%s %s%s*%d%s/%s%s:%d%s=%s&#34;&#39;&amp;+0330+0430+0530+0545+0630+0845+1030+1245+1345, ..., fp:-0930.html.jpeg.wasm.webp
Source: C:\Users\user\Desktop\WER9Fz381n.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02FC0957 rdtsc 0_2_02FC0957
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02B7B0A3 push dword ptr fs:[00000030h] 0_2_02B7B0A3
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02F70D90 mov eax, dword ptr fs:[00000030h] 0_2_02F70D90
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 0_2_02F7092B mov eax, dword ptr fs:[00000030h] 0_2_02F7092B
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 4_2_02A8C0A3 push dword ptr fs:[00000030h] 4_2_02A8C0A3
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 4_2_02E8092B mov eax, dword ptr fs:[00000030h] 4_2_02E8092B
Source: C:\Users\user\Desktop\WER9Fz381n.exe Code function: 4_2_02E80D90 mov eax, dword ptr fs:[00000030h] 4_2_02E80D90
Source: C:\Users\user\Desktop\WER9Fz381n.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Users\user\Desktop\WER9Fz381n.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM AntiVirusProduct

Stealing of Sensitive Information

barindex
Source: Yara match File source: 4.2.WER9Fz381n.exe.400000.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.WER9Fz381n.exe.37f0000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.3.WER9Fz381n.exe.3700000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.WER9Fz381n.exe.400000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.WER9Fz381n.exe.400000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.WER9Fz381n.exe.2f70e67.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.WER9Fz381n.exe.37f0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.3.WER9Fz381n.exe.3700000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.WER9Fz381n.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.WER9Fz381n.exe.2e80e67.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: WER9Fz381n.exe PID: 7264, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: WER9Fz381n.exe PID: 7480, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 4.2.WER9Fz381n.exe.400000.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.WER9Fz381n.exe.37f0000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.3.WER9Fz381n.exe.3700000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.WER9Fz381n.exe.400000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.WER9Fz381n.exe.400000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.WER9Fz381n.exe.2f70e67.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.WER9Fz381n.exe.37f0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.3.WER9Fz381n.exe.3700000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.WER9Fz381n.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.WER9Fz381n.exe.2e80e67.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000004.00000002.1445502886.000000000327A000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1406450301.000000000336A000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.1387384767.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.1416807241.0000000003700000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1404121864.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.1443450767.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: WER9Fz381n.exe PID: 7264, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: WER9Fz381n.exe PID: 7480, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs