Source: bPNK0VeG79.exe | Virustotal: Detection: 27% | Perma Link |
Source: bPNK0VeG79.exe | ReversingLabs: Detection: 15% |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Code function: 0_2_00007FFD7ACC2E35 lstrcmpA,CryptDecodeObject,CertFreeCertificateContext, | 0_2_00007FFD7ACC2E35 |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Code function: 0_2_00007FFD7ACC2E00 lstrcmpA,CryptDecodeObject,CertFreeCertificateContext,LocalAlloc,CertFreeCertificateContext,CryptDecodeObject,CertFreeCertificateContext,CertFreeCertificateContext, | 0_2_00007FFD7ACC2E00 |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Code function: 0_2_00007FFD7ACC27C0 CryptQueryObject,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CertFreeCertificateContext,CertCloseStore,CryptMsgClose,CryptMsgGetParam,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CertFreeCertificateContext,CertCloseStore,CryptMsgClose,LocalAlloc,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CertFreeCertificateContext,CertCloseStore,CryptMsgClose,CryptMsgGetParam,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CertFreeCertificateContext,CertCloseStore,CryptMsgClose,LocalFree,LocalFree,LocalFree,LocalFree,LocalFree,CertFreeCertificateContext,CertCloseStore,CryptMsgClose, | 0_2_00007FFD7ACC27C0 |
Source: bPNK0VeG79.exe | Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT |
Source: | Binary string: clrjit.pdb source: bPNK0VeG79.exe, 00000000.00000002.355063700.000000001BA70000.00000004.00000001.sdmp |
Source: | Binary string: C:\Users\Alexx\Desktop\QWER\DeviceCredentialDeployment\bin\Release\Secured\AccessibilityImprovements.pdb source: bPNK0VeG79.exe |
Source: global traffic | HTTP traffic detected: GET /Buld2.exe HTTP/1.1Host: swretjhwrtj.gqConnection: Keep-Alive |
Source: bPNK0VeG79.exe | String found in binary or memory: http://epidemicsound.com/referral/cee...) |
Source: bPNK0VeG79.exe, 00000000.00000002.353788316.0000000002E91000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: bPNK0VeG79.exe | String found in binary or memory: http://secureteam.net/ErrorReporting.asmx |
Source: bPNK0VeG79.exe | String found in binary or memory: http://secureteam.net/webservices/CreateErrorReport |
Source: bPNK0VeG79.exe | String found in binary or memory: http://secureteam.net/webservices/T |
Source: bPNK0VeG79.exe | String found in binary or memory: http://secureteam.net/webservices/TU |
Source: bPNK0VeG79.exe | String found in binary or memory: http://secureteam.net/webservices/Y |
Source: bPNK0VeG79.exe, 00000000.00000002.353788316.0000000002E91000.00000004.00000001.sdmp | String found in binary or memory: http://swretjhwrtj.gq |
Source: bPNK0VeG79.exe, 00000000.00000002.353788316.0000000002E91000.00000004.00000001.sdmp | String found in binary or memory: http://swretjhwrtj.gq/Buld2.exe |
Source: bPNK0VeG79.exe, 00000000.00000002.353912370.0000000002F44000.00000004.00000001.sdmp | String found in binary or memory: http://swretjhwrtj.gqx |
Source: bPNK0VeG79.exe | String found in binary or memory: http://www.epidemicsound.com) |
Source: bPNK0VeG79.exe | String found in binary or memory: https://bit.ly/3zr3UY1 |
Source: bPNK0VeG79.exe | String found in binary or memory: https://discord.com/invite/magicrust |
Source: bPNK0VeG79.exe | String found in binary or memory: https://rustycloth.ru |
Source: bPNK0VeG79.exe | String found in binary or memory: https://shop.magic-rust.ru |
Source: bPNK0VeG79.exe | String found in binary or memory: https://vk.com/magic_manager |
Source: bPNK0VeG79.exe | String found in binary or memory: https://vk.com/magicow |
Source: bPNK0VeG79.exe | String found in binary or memory: https://vk.com/magicowrust |
Source: bPNK0VeG79.exe | String found in binary or memory: https://vk.com/rustycloth |
Source: bPNK0VeG79.exe, 00000000.00000002.353958356.0000000002F69000.00000004.00000001.sdmp | String found in binary or memory: https://www.cloudflare.com/5xx-error-landing |
Source: bPNK0VeG79.exe | String found in binary or memory: https://www.instagram.com/dergidverih... |
Source: unknown | DNS traffic detected: queries for: swretjhwrtj.gq |
Source: global traffic | HTTP traffic detected: GET /Buld2.exe HTTP/1.1Host: swretjhwrtj.gqConnection: Keep-Alive |
Source: bPNK0VeG79.exe | Binary or memory string: OriginalFilename vs bPNK0VeG79.exe |
Source: bPNK0VeG79.exe, 00000000.00000002.352733784.0000000000B75000.00000002.00020000.sdmp | Binary or memory string: OriginalFilenameAccessibilityImprovements.exeT vs bPNK0VeG79.exe |
Source: bPNK0VeG79.exe, 00000000.00000002.352951762.0000000000F8C000.00000004.00000020.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs bPNK0VeG79.exe |
Source: bPNK0VeG79.exe, 00000000.00000002.354913557.000000001B930000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenameKernelbase.dll.muij% vs bPNK0VeG79.exe |
Source: bPNK0VeG79.exe, 00000000.00000002.357041645.00007FFD7ACD3000.00000002.00020000.sdmp | Binary or memory string: OriginalFilename vs bPNK0VeG79.exe |
Source: bPNK0VeG79.exe, 00000000.00000002.354843237.000000001B750000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenamemscorrc.dllT vs bPNK0VeG79.exe |
Source: bPNK0VeG79.exe | Binary or memory string: OriginalFilenameAccessibilityImprovements.exeT vs bPNK0VeG79.exe |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Code function: 0_2_00007FFD7ACC1D70 | 0_2_00007FFD7ACC1D70 |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Code function: 0_2_00007FFD7ACC3270 | 0_2_00007FFD7ACC3270 |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Code function: 0_2_00007FFD7ACC14D0 | 0_2_00007FFD7ACC14D0 |
Source: .dll.0.dr | Static PE information: Section: .reloc IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
Source: .dll.0.dr | Static PE information: Section: .reloc IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
Source: bPNK0VeG79.exe | Virustotal: Detection: 27% |
Source: bPNK0VeG79.exe | ReversingLabs: Detection: 15% |
Source: bPNK0VeG79.exe | Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\bPNK0VeG79.exe.log | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | File created: C:\Users\user\AppData\Local\Temp\108b7f4f-5686-4e2a-8f63-f5f2c7239d1c | Jump to behavior |
Source: classification engine | Classification label: mal52.evad.winEXE@1/2@1/1 |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: bPNK0VeG79.exe, u003cu0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u003e.cs | Security API names: System.Void System.IO.File::SetAccessControl(System.String,System.Security.AccessControl.FileSecurity) |
Source: bPNK0VeG79.exe, u003cu0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u003e.cs | Security API names: System.Void System.Security.AccessControl.FileSystemSecurity::AddAccessRule(System.Security.AccessControl.FileSystemAccessRule) |
Source: bPNK0VeG79.exe, u003cu0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u003e.cs | Security API names: System.Security.AccessControl.FileSecurity System.IO.File::GetAccessControl(System.String) |
Source: 0.0.bPNK0VeG79.exe.b70000.0.unpack, u003cu0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u003e.cs | Security API names: System.Void System.IO.File::SetAccessControl(System.String,System.Security.AccessControl.FileSecurity) |
Source: 0.0.bPNK0VeG79.exe.b70000.0.unpack, u003cu0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u003e.cs | Security API names: System.Void System.Security.AccessControl.FileSystemSecurity::AddAccessRule(System.Security.AccessControl.FileSystemAccessRule) |
Source: 0.0.bPNK0VeG79.exe.b70000.0.unpack, u003cu0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u003e.cs | Security API names: System.Security.AccessControl.FileSecurity System.IO.File::GetAccessControl(System.String) |
Source: 0.2.bPNK0VeG79.exe.b70000.0.unpack, u003cu0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u003e.cs | Security API names: System.Void System.IO.File::SetAccessControl(System.String,System.Security.AccessControl.FileSecurity) |
Source: 0.2.bPNK0VeG79.exe.b70000.0.unpack, u003cu0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u003e.cs | Security API names: System.Void System.Security.AccessControl.FileSystemSecurity::AddAccessRule(System.Security.AccessControl.FileSystemAccessRule) |
Source: 0.2.bPNK0VeG79.exe.b70000.0.unpack, u003cu0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u0020u003e.cs | Security API names: System.Security.AccessControl.FileSecurity System.IO.File::GetAccessControl(System.String) |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | File opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll | Jump to behavior |
Source: bPNK0VeG79.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: bPNK0VeG79.exe | Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT |
Source: bPNK0VeG79.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: | Binary string: clrjit.pdb source: bPNK0VeG79.exe, 00000000.00000002.355063700.000000001BA70000.00000004.00000001.sdmp |
Source: | Binary string: C:\Users\Alexx\Desktop\QWER\DeviceCredentialDeployment\bin\Release\Secured\AccessibilityImprovements.pdb source: bPNK0VeG79.exe |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Code function: 0_2_00007FFD7ACE0AA9 push rsp; retf | 0_2_00007FFD7ACE0AD9 |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Code function: 0_2_00007FFD7ACC5E28 push rbp; retf | 0_2_00007FFD7ACC5E29 |
Source: bPNK0VeG79.exe | Static PE information: 0xF3E88B15 [Thu Sep 3 07:24:05 2099 UTC] |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Code function: 0_2_00007FFD7ACC83A0 GetCurrentProcess,GetCurrentProcess,GetFileVersionInfoSizeW,GetProcessHeap,HeapAlloc,GetFileVersionInfoW,VerQueryValueA,LoadLibraryW,GetProcAddress,GetProcessHeap,HeapFree, | 0_2_00007FFD7ACC83A0 |
Source: initial sample | Static PE information: section name: .text entropy: 7.40200609771 |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | File created: C:\Users\user\AppData\Local\Temp\108b7f4f-5686-4e2a-8f63-f5f2c7239d1c\ .dll | Jump to dropped file |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | RDTSC instruction interceptor: First address: 00007FFD7ACC1F0F second address: 00007FFD7ACC1F90 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 dec eax 0x0000000a mov dword ptr [esp+28h], eax 0x0000000e dec eax 0x0000000f mov eax, dword ptr [esp+30h] 0x00000013 dec eax 0x00000014 mov ecx, dword ptr [esp+28h] 0x00000018 dec eax 0x00000019 sub ecx, eax 0x0000001b dec eax 0x0000001c mov eax, ecx 0x0000001e dec eax 0x0000001f add esp, 48h 0x00000022 ret 0x00000023 dec eax 0x00000024 mov dword ptr [00010326h], eax 0x0000002a mov dword ptr [esp+28h], 00000000h 0x00000032 jmp 00007F6830BA02FCh 0x00000034 mov eax, dword ptr [esp+50h] 0x00000038 cmp dword ptr [esp+28h], eax 0x0000003c jnl 00007F6830BA0334h 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe TID: 5944 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe TID: 6004 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Code function: 0_2_00007FFD7ACC1F40 rdtsc | 0_2_00007FFD7ACC1F40 |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: bPNK0VeG79.exe, 00000000.00000002.354913557.000000001B930000.00000002.00000001.sdmp | Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed. |
Source: bPNK0VeG79.exe, 00000000.00000002.354913557.000000001B930000.00000002.00000001.sdmp | Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service. |
Source: bPNK0VeG79.exe, 00000000.00000002.354913557.000000001B930000.00000002.00000001.sdmp | Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported. |
Source: bPNK0VeG79.exe, 00000000.00000002.355063700.000000001BA70000.00000004.00000001.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: bPNK0VeG79.exe, 00000000.00000002.354913557.000000001B930000.00000002.00000001.sdmp | Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service. |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Code function: 0_2_00007FFD7ACC83A0 GetCurrentProcess,GetCurrentProcess,GetFileVersionInfoSizeW,GetProcessHeap,HeapAlloc,GetFileVersionInfoW,VerQueryValueA,LoadLibraryW,GetProcAddress,GetProcessHeap,HeapFree, | 0_2_00007FFD7ACC83A0 |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Code function: 0_2_00007FFD7ACC4F70 EnumProcessModules,K32EnumProcessModules,GetProcessHeap,HeapAlloc,EnumProcessModules,K32EnumProcessModules,GetModuleInformation,K32GetModuleInformation,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualQuery, | 0_2_00007FFD7ACC4F70 |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Code function: 0_2_00007FFD7ACC1F40 rdtsc | 0_2_00007FFD7ACC1F40 |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Process token adjusted: Debug | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Memory allocated: page read and write | page guard | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Queries volume information: C:\Users\user\Desktop\bPNK0VeG79.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Code function: 0_2_00007FFD7ACC10A0 GetVersionExW, | 0_2_00007FFD7ACC10A0 |
Source: C:\Users\user\Desktop\bPNK0VeG79.exe | Code function: 0_2_00007FFD7ACC6020 MessageBoxW,GetSystemTimeAsFileTime,CompareFileTime,MessageBoxW, | 0_2_00007FFD7ACC6020 |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.