Windows Analysis Report
Booking_0106.exe

Overview

General Information

Sample name: Booking_0106.exe
Analysis ID: 1526562
MD5: 219bc0b3320f5f73d684f07800c0134d
SHA1: 867abe30a0018c0c902f11a9edfb7c0262cdedf5
SHA256: 4d7489c7f5c86e43100b25314f49f3577d43ae47e090b0916578da82ec3d59e6
Tags: AgentTeslaBookingexeSPAM-ITAuser-JAMESWT_MHT
Infos:

Detection

AgentTesla
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
AI detected suspicious sample
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Yara detected Costura Assembly Loader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
Agent Tesla, AgentTesla A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla

AV Detection

barindex
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Avira: detection malicious, Label: TR/Dropper.MSIL.Gen
Source: 0.2.Booking_0106.exe.4023d90.1.raw.unpack Malware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "162.254.34.31", "Username": "sendxambro@educt.shop", "Password": "ABwuRZS5Mjh5"}
Source: http://172.86.66.70/3y/doci.exe Virustotal: Detection: 9% Perma Link
Source: http://172.86.66.70 Virustotal: Detection: 5% Perma Link
Source: http://172.86.66.70/3y/doci.exeP Virustotal: Detection: 5% Perma Link
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Virustotal: Detection: 47% Perma Link
Source: C:\Users\user\AppData\Roaming\ibrzb.exe ReversingLabs: Detection: 60%
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Virustotal: Detection: 66% Perma Link
Source: Booking_0106.exe ReversingLabs: Detection: 60%
Source: Booking_0106.exe Virustotal: Detection: 66% Perma Link
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Joe Sandbox ML: detected
Source: Booking_0106.exe Joe Sandbox ML: detected
Source: Booking_0106.exe Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: unknown HTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49743 version: TLS 1.2
Source: Booking_0106.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xml.ni.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: System.pdb` source: WER6909.tmp.dmp.12.dr
Source: Binary string: System.ni.pdbRSDS source: WER6909.tmp.dmp.12.dr
Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: Booking_0106.exe, 00000000.00000002.1729847882.0000000003FD1000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1732460118.0000000005AB0000.00000004.08000000.00040000.00000000.sdmp, ibrzb.exe, 00000003.00000002.1860595273.0000000003E89000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000003.00000002.1860595273.0000000003C23000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000008.00000002.1926073695.0000000002A08000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000008.00000002.1939658739.0000000003963000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdbK source: doc-d.exe, 00000001.00000002.2269121553.0000000000851000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.pdbc source: doc-d.exe, 00000001.00000002.2269121553.0000000000851000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb8 source: WER6909.tmp.dmp.12.dr
Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbb source: doc-d.exe, 00000001.00000002.2269121553.0000000000851000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: Booking_0106.exe, 00000000.00000002.1729847882.0000000003FD1000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1732460118.0000000005AB0000.00000004.08000000.00040000.00000000.sdmp, ibrzb.exe, 00000003.00000002.1860595273.0000000003E89000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000003.00000002.1860595273.0000000003C23000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000008.00000002.1926073695.0000000002A08000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000008.00000002.1939658739.0000000003963000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: protobuf-net.pdbSHA256}Lq source: Booking_0106.exe, 00000000.00000002.1729847882.00000000040C1000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1731604116.00000000058F0000.00000004.08000000.00040000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1729847882.000000000419C000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: System.Net.Http.pdb source: doc-d.exe, 00000001.00000002.2269121553.0000000000894000.00000004.00000020.00020000.00000000.sdmp, doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp, WER6909.tmp.dmp.12.dr
Source: Binary string: \??\C:\Windows\dll\System.Net.Http.pdb source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb8 source: doc-d.exe, 00000001.00000002.2269121553.0000000000851000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdbRSDS source: WER6909.tmp.dmp.12.dr
Source: Binary string: protobuf-net.pdb source: Booking_0106.exe, 00000000.00000002.1729847882.00000000040C1000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1731604116.00000000058F0000.00000004.08000000.00040000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1729847882.000000000419C000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: System.Configuration.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.Net.Http.pdb source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xml.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: System.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: m0C:\Windows\mscorlib.pdb source: doc-d.exe, 00000001.00000002.2268824999.00000000006F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Xml.ni.pdbRSDS# source: WER6909.tmp.dmp.12.dr
Source: Binary string: System.Core.ni.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: C:\Windows\System.Net.Http.pdbpdbttp.pdb" source: doc-d.exe, 00000001.00000002.2269121553.0000000000810000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: %%.pdb source: doc-d.exe, 00000001.00000002.2268824999.00000000006F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: doc-d.exe, 00000001.00000002.2269121553.0000000000894000.00000004.00000020.00020000.00000000.sdmp, WER6909.tmp.dmp.12.dr
Source: Binary string: \??\C:\Windows\dll\System.pdb source: doc-d.exe, 00000001.00000002.2269121553.0000000000851000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Net.Http.pdb source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbJw source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Net.Http.ni.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: ~p.pdbk$ source: doc-d.exe, 00000001.00000002.2269121553.0000000000810000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: \??\C:\Windows\mscorlib.pdb source: doc-d.exe, 00000001.00000002.2269121553.0000000000851000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\doc-d.PDB source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbK source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbF source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\AppData\Local\Temp\doc-d.PDB source: doc-d.exe, 00000001.00000002.2268824999.00000000006F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER6909.tmp.dmp.12.dr
Source: Binary string: System.Net.Http.ni.pdbRSDS source: WER6909.tmp.dmp.12.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.ni.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER6909.tmp.dmp.12.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.Net.Http.pdbI source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h 0_2_059FD838
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 4x nop then jmp 05A23BC1h 0_2_05A23D27
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 4x nop then jmp 05A23BC1h 0_2_05A23B84
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 4x nop then jmp 05A23BC1h 0_2_05A23A88
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h 0_2_05A22AC8
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h 0_2_05A22AD0
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 4x nop then jmp 05A23BC1h 0_2_05A23A7A
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 4x nop then jmp 05A364BAh 0_2_05A36428
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 4x nop then jmp 05A364BAh 0_2_05A36438
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 4x nop then jmp 05A35C65h 0_2_05A358B8
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 4x nop then jmp 05A35C65h 0_2_05A358C8
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 4x nop then jmp 05A3E0C8h 0_2_05A3E009
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 4x nop then jmp 05A3E0C8h 0_2_05A3E010
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h 3_2_0571D838
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 05743BC1h 3_2_05743D27
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 05743BC1h 3_2_05743B84
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 05743BC1h 3_2_05743A7F
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h 3_2_05742AD0
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h 3_2_05742AC8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 05743BC1h 3_2_05743A88
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 057564BAh 3_2_05756438
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 057564BAh 3_2_05756428
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 0575E0C8h 3_2_0575E010
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 0575E0C8h 3_2_0575E009
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 05755C65h 3_2_057558C8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 05755C65h 3_2_057558B8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h 8_2_0533D838
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 05363BC1h 8_2_05363D27
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 05363BC1h 8_2_05363B84
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 05363BC1h 8_2_05363A7F
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 05363BC1h 8_2_05363A88
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h 8_2_05362AD0
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h 8_2_05362AC8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 053764BAh 8_2_05376438
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 053764BAh 8_2_05376428
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 0537E0C8h 8_2_0537E010
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 0537E0C8h 8_2_0537E009
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 05375C65h 8_2_053758B8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 05375C65h 8_2_053758C8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4x nop then jmp 053764BAh 8_2_053763BF

Networking

barindex
Source: Network traffic Suricata IDS: 2855245 - Severity 1 - ETPRO MALWARE Agent Tesla Exfil via SMTP : 192.168.2.4:49733 -> 162.254.34.31:587
Source: Network traffic Suricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.4:49733 -> 162.254.34.31:587
Source: Network traffic Suricata IDS: 2855245 - Severity 1 - ETPRO MALWARE Agent Tesla Exfil via SMTP : 192.168.2.4:49735 -> 162.254.34.31:587
Source: Network traffic Suricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.4:49735 -> 162.254.34.31:587
Source: Network traffic Suricata IDS: 2855245 - Severity 1 - ETPRO MALWARE Agent Tesla Exfil via SMTP : 192.168.2.4:49744 -> 162.254.34.31:587
Source: Network traffic Suricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.4:49744 -> 162.254.34.31:587
Source: Network traffic Suricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.4:49735 -> 162.254.34.31:587
Source: Network traffic Suricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.4:49735 -> 162.254.34.31:587
Source: Network traffic Suricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.4:49744 -> 162.254.34.31:587
Source: Network traffic Suricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.4:49744 -> 162.254.34.31:587
Source: Network traffic Suricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.4:49733 -> 162.254.34.31:587
Source: Network traffic Suricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.4:49733 -> 162.254.34.31:587
Source: global traffic TCP traffic: 192.168.2.4:49733 -> 162.254.34.31:587
Source: global traffic HTTP traffic detected: GET /3y/doci.exe HTTP/1.1Host: 172.86.66.70Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /3y/doci.exe HTTP/1.1Host: 172.86.66.70Connection: Keep-Alive
Source: Joe Sandbox View IP Address: 162.254.34.31 162.254.34.31
Source: Joe Sandbox View IP Address: 172.67.74.152 172.67.74.152
Source: Joe Sandbox View IP Address: 172.67.74.152 172.67.74.152
Source: Joe Sandbox View ASN Name: VIVIDHOSTINGUS VIVIDHOSTINGUS
Source: Joe Sandbox View JA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknown DNS query: name: api.ipify.org
Source: unknown DNS query: name: api.ipify.org
Source: global traffic TCP traffic: 192.168.2.4:49733 -> 162.254.34.31:587
Source: global traffic HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
Source: unknown TCP traffic detected without corresponding DNS query: 172.86.66.70
Source: unknown TCP traffic detected without corresponding DNS query: 172.86.66.70
Source: unknown TCP traffic detected without corresponding DNS query: 172.86.66.70
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 172.86.66.70
Source: unknown TCP traffic detected without corresponding DNS query: 172.86.66.70
Source: unknown TCP traffic detected without corresponding DNS query: 172.86.66.70
Source: unknown TCP traffic detected without corresponding DNS query: 172.86.66.70
Source: unknown TCP traffic detected without corresponding DNS query: 172.86.66.70
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.254.34.31
Source: unknown TCP traffic detected without corresponding DNS query: 172.86.66.70
Source: unknown TCP traffic detected without corresponding DNS query: 172.86.66.70
Source: global traffic HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /3y/doci.exe HTTP/1.1Host: 172.86.66.70Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /3y/doci.exe HTTP/1.1Host: 172.86.66.70Connection: Keep-Alive
Source: global traffic DNS traffic detected: DNS query: api.ipify.org
Source: doc-d.exe, 00000001.00000002.2274873731.0000000002740000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://172.86.66.70
Source: doc-d.exe, 00000001.00000002.2274873731.00000000026D1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://172.86.66.70/3y/doci.exe
Source: doc-d.exe, 00000001.00000002.2274873731.00000000026D1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://172.86.66.70/3y/doci.exeP
Source: doc-d.exe, 00000001.00000002.2274873731.0000000002760000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://172.86.66.70D
Source: Booking_0106.exe, ibrzb.exe.0.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: Booking_0106.exe, ibrzb.exe.0.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: Booking_0106.exe, ibrzb.exe.0.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: Booking_0106.exe, ibrzb.exe.0.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: Booking_0106.exe, ibrzb.exe.0.dr String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: Booking_0106.exe, ibrzb.exe.0.dr String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: Booking_0106.exe, ibrzb.exe.0.dr String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: ibrzb.exe.0.dr String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: Booking_0106.exe, ibrzb.exe.0.dr String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
Source: Booking_0106.exe, ibrzb.exe.0.dr String found in binary or memory: http://ocsp.digicert.com0
Source: Booking_0106.exe, ibrzb.exe.0.dr String found in binary or memory: http://ocsp.digicert.com0A
Source: Booking_0106.exe, ibrzb.exe.0.dr String found in binary or memory: http://ocsp.digicert.com0C
Source: Booking_0106.exe, ibrzb.exe.0.dr String found in binary or memory: http://ocsp.digicert.com0X
Source: Booking_0106.exe, 00000000.00000002.1711502008.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, doc-d.exe, 00000001.00000002.2274873731.0000000002740000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000002.00000002.2962867895.00000000030A1000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000003.00000002.1842814784.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000004.00000002.2963837882.000000000293C000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000008.00000002.1926073695.0000000002A08000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000009.00000002.2962339297.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Amcache.hve.12.dr String found in binary or memory: http://upx.sf.net
Source: Booking_0106.exe, ibrzb.exe.0.dr String found in binary or memory: http://www.digicert.com/CPS0
Source: Booking_0106.exe, 00000000.00000002.1729847882.0000000003FD1000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1711502008.0000000003117000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000003.00000002.1860595273.0000000003CC2000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000003.00000002.1842814784.0000000002D12000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000008.00000002.1926073695.0000000002A85000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000008.00000002.1939658739.0000000003A01000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://account.dyn.com/
Source: Booking_0106.exe, 00000000.00000002.1729847882.0000000003FD1000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1711502008.0000000003117000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000002.00000002.2962867895.00000000030A1000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000003.00000002.1860595273.0000000003CC2000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000003.00000002.1842814784.0000000002D12000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000004.00000002.2963837882.000000000293C000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000008.00000002.1926073695.0000000002A85000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000008.00000002.1939658739.0000000003A01000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000009.00000002.2962339297.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000009.00000002.2956507018.0000000000434000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://api.ipify.org
Source: Booking_0106.exe, 00000002.00000002.2962867895.00000000030A1000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000004.00000002.2963837882.000000000293C000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000009.00000002.2962339297.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://api.ipify.org/
Source: Booking_0106.exe, 00000002.00000002.2962867895.00000000030A1000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000004.00000002.2963837882.000000000293C000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000009.00000002.2962339297.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://api.ipify.org/t
Source: Booking_0106.exe, 00000000.00000002.1729847882.00000000040C1000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1731604116.00000000058F0000.00000004.08000000.00040000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1729847882.000000000419C000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/mgravell/protobuf-net
Source: Booking_0106.exe, 00000000.00000002.1729847882.00000000040C1000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1731604116.00000000058F0000.00000004.08000000.00040000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1729847882.000000000419C000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000003.00000002.1860595273.0000000003DE2000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000008.00000002.1939658739.0000000003B22000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/mgravell/protobuf-netJ
Source: Booking_0106.exe, 00000000.00000002.1729847882.00000000040C1000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1731604116.00000000058F0000.00000004.08000000.00040000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1729847882.000000000419C000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/mgravell/protobuf-neti
Source: Booking_0106.exe, 00000000.00000002.1729847882.00000000040C1000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1731604116.00000000058F0000.00000004.08000000.00040000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1729847882.000000000419C000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://stackoverflow.com/q/11564914/23354;
Source: Booking_0106.exe, 00000000.00000002.1729847882.00000000040C1000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1731604116.00000000058F0000.00000004.08000000.00040000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1711502008.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1729847882.000000000419C000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000003.00000002.1842814784.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000008.00000002.1926073695.0000000002911000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://stackoverflow.com/q/14436606/23354
Source: Booking_0106.exe, 00000000.00000002.1729847882.00000000040C1000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1731604116.00000000058F0000.00000004.08000000.00040000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1729847882.000000000419C000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://stackoverflow.com/q/2152978/23354
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49732
Source: unknown Network traffic detected: HTTP traffic on port 49734 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49743
Source: unknown Network traffic detected: HTTP traffic on port 49732 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49743 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49734
Source: unknown HTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49743 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: 0.2.Booking_0106.exe.4023d90.1.raw.unpack, SKTzxzsJw.cs .Net Code: nUAqbab

System Summary

barindex
Source: 0.2.Booking_0106.exe.4023d90.1.unpack, type: UNPACKEDPE Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
Source: 0.2.Booking_0106.exe.4023d90.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A210D8 NtResumeThread, 0_2_05A210D8
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A210D1 NtResumeThread, 0_2_05A210D1
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A3F510 NtProtectVirtualMemory, 0_2_05A3F510
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A3F50A NtProtectVirtualMemory, 0_2_05A3F50A
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_057410D8 NtResumeThread, 3_2_057410D8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05741047 NtResumeThread, 3_2_05741047
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_057410D1 NtResumeThread, 3_2_057410D1
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0575F510 NtProtectVirtualMemory, 3_2_0575F510
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0575F50B NtProtectVirtualMemory, 3_2_0575F50B
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_053610D8 NtResumeThread, 8_2_053610D8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_053610D1 NtResumeThread, 8_2_053610D1
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0537F510 NtProtectVirtualMemory, 8_2_0537F510
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0537F50A NtProtectVirtualMemory, 8_2_0537F50A
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_0143A2A2 0_2_0143A2A2
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_014335B8 0_2_014335B8
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_014317A8 0_2_014317A8
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_0143B69C 0_2_0143B69C
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_01430BB0 0_2_01430BB0
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_01437C08 0_2_01437C08
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_01430E88 0_2_01430E88
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_014321A1 0_2_014321A1
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_014320F1 0_2_014320F1
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_014335AA 0_2_014335AA
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_01434420 0_2_01434420
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_01432428 0_2_01432428
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_0143E858 0_2_0143E858
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_014318A6 0_2_014318A6
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_01430F39 0_2_01430F39
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_01430E78 0_2_01430E78
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_01430EC2 0_2_01430EC2
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_057B0048 0_2_057B0048
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_057B0001 0_2_057B0001
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05957098 0_2_05957098
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05956308 0_2_05956308
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_0595BD65 0_2_0595BD65
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05955790 0_2_05955790
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05955780 0_2_05955780
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05957601 0_2_05957601
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05950006 0_2_05950006
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05950040 0_2_05950040
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05957380 0_2_05957380
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_059562F8 0_2_059562F8
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_059E2134 0_2_059E2134
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_059E2467 0_2_059E2467
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_059E3748 0_2_059E3748
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_059FF140 0_2_059FF140
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_059F0006 0_2_059F0006
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_059F0040 0_2_059F0040
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A2CD98 0_2_05A2CD98
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A22EE9 0_2_05A22EE9
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A2A6C8 0_2_05A2A6C8
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A2D920 0_2_05A2D920
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A2C0A8 0_2_05A2C0A8
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A2CD88 0_2_05A2CD88
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A23D27 0_2_05A23D27
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A2A6B8 0_2_05A2A6B8
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A2CEF3 0_2_05A2CEF3
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A2D910 0_2_05A2D910
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A23B84 0_2_05A23B84
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A23A88 0_2_05A23A88
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A23A7A 0_2_05A23A7A
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A37F78 0_2_05A37F78
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A3C748 0_2_05A3C748
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A373B0 0_2_05A373B0
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A3D3D8 0_2_05A3D3D8
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A3F2A8 0_2_05A3F2A8
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A3C73A 0_2_05A3C73A
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A37F69 0_2_05A37F69
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A3D66E 0_2_05A3D66E
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A39978 0_2_05A39978
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A39950 0_2_05A39950
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A373A0 0_2_05A373A0
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A323F8 0_2_05A323F8
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A3D3C8 0_2_05A3D3C8
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05A3F298 0_2_05A3F298
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05C7D1A0 0_2_05C7D1A0
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05C7F038 0_2_05C7F038
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Code function: 1_2_00A11080 1_2_00A11080
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Code function: 1_2_00A10DA8 1_2_00A10DA8
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Code function: 1_2_00A122C0 1_2_00A122C0
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Code function: 1_2_00A110BA 1_2_00A110BA
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Code function: 1_2_00A11071 1_2_00A11071
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Code function: 1_2_00A11983 1_2_00A11983
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Code function: 1_2_00A125F8 1_2_00A125F8
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Code function: 1_2_00A11131 1_2_00A11131
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Code function: 1_2_00A11A81 1_2_00A11A81
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Code function: 1_2_00A12371 1_2_00A12371
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_02E841C8 2_2_02E841C8
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_02E8E508 2_2_02E8E508
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_02E84A98 2_2_02E84A98
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_02E8AA12 2_2_02E8AA12
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_02E8D990 2_2_02E8D990
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_02E83E80 2_2_02E83E80
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_06BCA198 2_2_06BCA198
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_06BCBC48 2_2_06BCBC48
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_06BD6668 2_2_06BD6668
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_06BD5640 2_2_06BD5640
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_06BD7DF0 2_2_06BD7DF0
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_06BDB2A2 2_2_06BDB2A2
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_06BDC200 2_2_06BDC200
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_06BD3100 2_2_06BD3100
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_06BD7710 2_2_06BD7710
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_06BDE418 2_2_06BDE418
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_06BD240A 2_2_06BD240A
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_06BD5D5F 2_2_06BD5D5F
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_06BD0040 2_2_06BD0040
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_06BD0006 2_2_06BD0006
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A0A2A3 3_2_02A0A2A3
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A0B69C 3_2_02A0B69C
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A017A8 3_2_02A017A8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A035B8 3_2_02A035B8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A00BB0 3_2_02A00BB0
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A00E88 3_2_02A00E88
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A07C08 3_2_02A07C08
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A042FC 3_2_02A042FC
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A020F1 3_2_02A020F1
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A021A1 3_2_02A021A1
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A04420 3_2_02A04420
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A02428 3_2_02A02428
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A035AB 3_2_02A035AB
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A018A6 3_2_02A018A6
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A0E858 3_2_02A0E858
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A00EC2 3_2_02A00EC2
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A00E78 3_2_02A00E78
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A00F39 3_2_02A00F39
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05677098 3_2_05677098
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05676308 3_2_05676308
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0567BD65 3_2_0567BD65
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05675780 3_2_05675780
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05675790 3_2_05675790
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05677602 3_2_05677602
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05670040 3_2_05670040
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05670006 3_2_05670006
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05677380 3_2_05677380
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_056762F8 3_2_056762F8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05702139 3_2_05702139
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05702467 3_2_05702467
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05703748 3_2_05703748
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0571F140 3_2_0571F140
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05710040 3_2_05710040
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05710007 3_2_05710007
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0574AD58 3_2_0574AD58
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0574C5A8 3_2_0574C5A8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0574B618 3_2_0574B618
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05742EE9 3_2_05742EE9
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0574B57A 3_2_0574B57A
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0574AD48 3_2_0574AD48
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05743D27 3_2_05743D27
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0574B773 3_2_0574B773
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0574B609 3_2_0574B609
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0574C325 3_2_0574C325
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05743B84 3_2_05743B84
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05743A7F 3_2_05743A7F
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05743A88 3_2_05743A88
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05757F78 3_2_05757F78
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0575C748 3_2_0575C748
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0575D3D8 3_2_0575D3D8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_057573B0 3_2_057573B0
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0575F2A8 3_2_0575F2A8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05757F69 3_2_05757F69
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0575C73B 3_2_0575C73B
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0575D66E 3_2_0575D66E
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05759978 3_2_05759978
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_057523F8 3_2_057523F8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0575D3C8 3_2_0575D3C8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_057573A0 3_2_057573A0
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0575F298 3_2_0575F298
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0599D1A0 3_2_0599D1A0
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_0599F038 3_2_0599F038
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_00ECE280 4_2_00ECE280
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_00ECA200 4_2_00ECA200
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_00EC4A98 4_2_00EC4A98
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_00ECAA18 4_2_00ECAA18
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_00EC3E80 4_2_00EC3E80
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_00EC41C8 4_2_00EC41C8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_00ECB16F 4_2_00ECB16F
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064CA494 4_2_064CA494
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064CA178 4_2_064CA178
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064CBC58 4_2_064CBC58
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064CD810 4_2_064CD810
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064D5640 4_2_064D5640
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064D6668 4_2_064D6668
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064D2418 4_2_064D2418
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064DC200 4_2_064DC200
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064DB2B0 4_2_064DB2B0
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064D7DF0 4_2_064D7DF0
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064D7710 4_2_064D7710
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064DE418 4_2_064DE418
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064D0040 4_2_064D0040
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064D5D70 4_2_064D5D70
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064D0006 4_2_064D0006
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_00F9A2A2 8_2_00F9A2A2
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_00F935B8 8_2_00F935B8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_00F9B69C 8_2_00F9B69C
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_00F917A8 8_2_00F917A8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_00F90BB0 8_2_00F90BB0
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_00F97C08 8_2_00F97C08
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_00F90E88 8_2_00F90E88
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_00F920F1 8_2_00F920F1
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_00F921A1 8_2_00F921A1
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_00F92428 8_2_00F92428
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_00F94420 8_2_00F94420
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_00F935AA 8_2_00F935AA
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_00F918A6 8_2_00F918A6
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_00F9E858 8_2_00F9E858
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_00F90EC2 8_2_00F90EC2
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_00F90E78 8_2_00F90E78
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_00F90F39 8_2_00F90F39
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05197098 8_2_05197098
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05196308 8_2_05196308
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0519BD65 8_2_0519BD65
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05195790 8_2_05195790
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05195780 8_2_05195780
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05197603 8_2_05197603
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05190007 8_2_05190007
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05190040 8_2_05190040
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05197380 8_2_05197380
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_051962F8 8_2_051962F8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05322134 8_2_05322134
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05322467 8_2_05322467
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05323748 8_2_05323748
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0533F140 8_2_0533F140
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05330006 8_2_05330006
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05330040 8_2_05330040
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0536AD58 8_2_0536AD58
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0536C5A8 8_2_0536C5A8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0536B618 8_2_0536B618
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05362EE9 8_2_05362EE9
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05363D27 8_2_05363D27
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0536AD48 8_2_0536AD48
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0536B773 8_2_0536B773
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0536B609 8_2_0536B609
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0536006A 8_2_0536006A
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0536C325 8_2_0536C325
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05363B84 8_2_05363B84
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05363A7F 8_2_05363A7F
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05363A88 8_2_05363A88
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05377F78 8_2_05377F78
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0537C748 8_2_0537C748
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_053773B0 8_2_053773B0
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0537D3D8 8_2_0537D3D8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0537F2A8 8_2_0537F2A8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_053732E0 8_2_053732E0
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0537DC50 8_2_0537DC50
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0537C73A 8_2_0537C73A
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05377F69 8_2_05377F69
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0537E611 8_2_0537E611
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0537D66E 8_2_0537D66E
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05379973 8_2_05379973
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05379978 8_2_05379978
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_05376898 8_2_05376898
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_053773A0 8_2_053773A0
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_053723F8 8_2_053723F8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0537D3C8 8_2_0537D3C8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0537F298 8_2_0537F298
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_055BD1A0 8_2_055BD1A0
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_055BF038 8_2_055BF038
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_02E7E270 9_2_02E7E270
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_02E74A98 9_2_02E74A98
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_02E73E80 9_2_02E73E80
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_02E741C8 9_2_02E741C8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_06B9A178 9_2_06B9A178
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_06BA6668 9_2_06BA6668
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_06BA5640 9_2_06BA5640
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_06BAB2AA 9_2_06BAB2AA
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_06BAC200 9_2_06BAC200
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_06BA3100 9_2_06BA3100
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_06BA7DF0 9_2_06BA7DF0
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_06BA7710 9_2_06BA7710
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_06BAE418 9_2_06BAE418
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_06BA2409 9_2_06BA2409
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_06BA0040 9_2_06BA0040
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_06BA5D5F 9_2_06BA5D5F
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_06BA0007 9_2_06BA0007
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7588 -s 1736
Source: Booking_0106.exe Static PE information: invalid certificate
Source: Booking_0106.exe, 00000000.00000002.1729847882.00000000040C1000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameprotobuf-net.dllJ vs Booking_0106.exe
Source: Booking_0106.exe, 00000000.00000002.1731604116.00000000058F0000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilenameprotobuf-net.dllJ vs Booking_0106.exe
Source: Booking_0106.exe, 00000000.00000000.1699060117.0000000000CBA000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenamedoc15.exeF vs Booking_0106.exe
Source: Booking_0106.exe, 00000000.00000002.1730902985.00000000056A0000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilenameDbjuzsdof.dll" vs Booking_0106.exe
Source: Booking_0106.exe, 00000000.00000002.1729847882.0000000003FD1000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs Booking_0106.exe
Source: Booking_0106.exe, 00000000.00000002.1729847882.0000000003FD1000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilename6623bc4b-fa2b-443b-b079-7932cd528c3c.exe4 vs Booking_0106.exe
Source: Booking_0106.exe, 00000000.00000002.1711502008.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilename vs Booking_0106.exe
Source: Booking_0106.exe, 00000000.00000002.1711502008.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilename6623bc4b-fa2b-443b-b079-7932cd528c3c.exe4 vs Booking_0106.exe
Source: Booking_0106.exe, 00000000.00000002.1732460118.0000000005AB0000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs Booking_0106.exe
Source: Booking_0106.exe, 00000000.00000002.1729847882.000000000419C000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameprotobuf-net.dllJ vs Booking_0106.exe
Source: Booking_0106.exe, 00000000.00000002.1711502008.0000000003117000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilename6623bc4b-fa2b-443b-b079-7932cd528c3c.exe4 vs Booking_0106.exe
Source: Booking_0106.exe, 00000000.00000002.1710777117.000000000123E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameclr.dllT vs Booking_0106.exe
Source: Booking_0106.exe, 00000002.00000002.2957702977.00000000010F9000.00000004.00000010.00020000.00000000.sdmp Binary or memory string: OriginalFilenameUNKNOWN_FILET vs Booking_0106.exe
Source: Booking_0106.exe, 00000002.00000002.2956502833.000000000043C000.00000040.00000400.00020000.00000000.sdmp Binary or memory string: OriginalFilename6623bc4b-fa2b-443b-b079-7932cd528c3c.exe4 vs Booking_0106.exe
Source: Booking_0106.exe Binary or memory string: OriginalFilenamedoc15.exeF vs Booking_0106.exe
Source: Booking_0106.exe Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: 0.2.Booking_0106.exe.4023d90.1.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
Source: 0.2.Booking_0106.exe.4023d90.1.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
Source: Booking_0106.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: ibrzb.exe.0.dr Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 0.2.Booking_0106.exe.4023d90.1.raw.unpack, 4JJG6X.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.Booking_0106.exe.4023d90.1.raw.unpack, 4JJG6X.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.Booking_0106.exe.4023d90.1.raw.unpack, 8C78isHTVco.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.Booking_0106.exe.4023d90.1.raw.unpack, 8C78isHTVco.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.Booking_0106.exe.4023d90.1.raw.unpack, 8C78isHTVco.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.Booking_0106.exe.4023d90.1.raw.unpack, 8C78isHTVco.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.Booking_0106.exe.4023d90.1.raw.unpack, CqSP68Ir.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.Booking_0106.exe.4023d90.1.raw.unpack, CqSP68Ir.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@12/8@1/3
Source: C:\Users\user\Desktop\Booking_0106.exe File created: C:\Users\user\AppData\Roaming\ibrzb.exe Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Mutant created: NULL
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7588
Source: C:\Users\user\Desktop\Booking_0106.exe File created: C:\Users\user\AppData\Local\Temp\doc-d.exe Jump to behavior
Source: Booking_0106.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: Booking_0106.exe Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\Booking_0106.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\Booking_0106.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\ibrzb.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\AppData\Roaming\ibrzb.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\ibrzb.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\AppData\Roaming\ibrzb.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\Booking_0106.exe File read: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: Booking_0106.exe ReversingLabs: Detection: 60%
Source: Booking_0106.exe Virustotal: Detection: 66%
Source: C:\Users\user\Desktop\Booking_0106.exe File read: C:\Users\user\Desktop\Booking_0106.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\Booking_0106.exe "C:\Users\user\Desktop\Booking_0106.exe"
Source: C:\Users\user\Desktop\Booking_0106.exe Process created: C:\Users\user\AppData\Local\Temp\doc-d.exe "C:\Users\user\AppData\Local\Temp\doc-d.exe"
Source: C:\Users\user\Desktop\Booking_0106.exe Process created: C:\Users\user\Desktop\Booking_0106.exe "C:\Users\user\Desktop\Booking_0106.exe"
Source: unknown Process created: C:\Users\user\AppData\Roaming\ibrzb.exe "C:\Users\user\AppData\Roaming\ibrzb.exe"
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process created: C:\Users\user\AppData\Roaming\ibrzb.exe "C:\Users\user\AppData\Roaming\ibrzb.exe"
Source: unknown Process created: C:\Users\user\AppData\Roaming\ibrzb.exe "C:\Users\user\AppData\Roaming\ibrzb.exe"
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process created: C:\Users\user\AppData\Roaming\ibrzb.exe "C:\Users\user\AppData\Roaming\ibrzb.exe"
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7588 -s 1736
Source: C:\Users\user\Desktop\Booking_0106.exe Process created: C:\Users\user\AppData\Local\Temp\doc-d.exe "C:\Users\user\AppData\Local\Temp\doc-d.exe" Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process created: C:\Users\user\Desktop\Booking_0106.exe "C:\Users\user\Desktop\Booking_0106.exe" Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process created: C:\Users\user\AppData\Roaming\ibrzb.exe "C:\Users\user\AppData\Roaming\ibrzb.exe" Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process created: C:\Users\user\AppData\Roaming\ibrzb.exe "C:\Users\user\AppData\Roaming\ibrzb.exe"
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: rasapi32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: rasman.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: rtutils.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: wtsapi32.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: winsta.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: rasapi32.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: rasman.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: rtutils.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: vaultcli.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: rasapi32.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: rasman.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: rtutils.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: vaultcli.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: mscoree.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: version.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: amsi.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: userenv.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: mscoree.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: version.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: amsi.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: userenv.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: rasapi32.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: rasman.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: rtutils.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: dhcpcsvc6.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: dhcpcsvc.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: secur32.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: vaultcli.dll
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Section loaded: wintypes.dll
Source: C:\Users\user\Desktop\Booking_0106.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\Profiles Jump to behavior
Source: Booking_0106.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Booking_0106.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: Booking_0106.exe Static file information: File size 2002368 > 1048576
Source: Booking_0106.exe Static PE information: Raw size of .text is bigger than: 0x100000 < 0x1b6e00
Source: Booking_0106.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xml.ni.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: System.pdb` source: WER6909.tmp.dmp.12.dr
Source: Binary string: System.ni.pdbRSDS source: WER6909.tmp.dmp.12.dr
Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: Booking_0106.exe, 00000000.00000002.1729847882.0000000003FD1000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1732460118.0000000005AB0000.00000004.08000000.00040000.00000000.sdmp, ibrzb.exe, 00000003.00000002.1860595273.0000000003E89000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000003.00000002.1860595273.0000000003C23000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000008.00000002.1926073695.0000000002A08000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000008.00000002.1939658739.0000000003963000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdbK source: doc-d.exe, 00000001.00000002.2269121553.0000000000851000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.pdbc source: doc-d.exe, 00000001.00000002.2269121553.0000000000851000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb8 source: WER6909.tmp.dmp.12.dr
Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbb source: doc-d.exe, 00000001.00000002.2269121553.0000000000851000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: Booking_0106.exe, 00000000.00000002.1729847882.0000000003FD1000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1732460118.0000000005AB0000.00000004.08000000.00040000.00000000.sdmp, ibrzb.exe, 00000003.00000002.1860595273.0000000003E89000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000003.00000002.1860595273.0000000003C23000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000008.00000002.1926073695.0000000002A08000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000008.00000002.1939658739.0000000003963000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: protobuf-net.pdbSHA256}Lq source: Booking_0106.exe, 00000000.00000002.1729847882.00000000040C1000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1731604116.00000000058F0000.00000004.08000000.00040000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1729847882.000000000419C000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: System.Net.Http.pdb source: doc-d.exe, 00000001.00000002.2269121553.0000000000894000.00000004.00000020.00020000.00000000.sdmp, doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp, WER6909.tmp.dmp.12.dr
Source: Binary string: \??\C:\Windows\dll\System.Net.Http.pdb source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb8 source: doc-d.exe, 00000001.00000002.2269121553.0000000000851000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdbRSDS source: WER6909.tmp.dmp.12.dr
Source: Binary string: protobuf-net.pdb source: Booking_0106.exe, 00000000.00000002.1729847882.00000000040C1000.00000004.00000800.00020000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1731604116.00000000058F0000.00000004.08000000.00040000.00000000.sdmp, Booking_0106.exe, 00000000.00000002.1729847882.000000000419C000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: System.Configuration.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.Net.Http.pdb source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xml.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: System.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: m0C:\Windows\mscorlib.pdb source: doc-d.exe, 00000001.00000002.2268824999.00000000006F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Xml.ni.pdbRSDS# source: WER6909.tmp.dmp.12.dr
Source: Binary string: System.Core.ni.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: C:\Windows\System.Net.Http.pdbpdbttp.pdb" source: doc-d.exe, 00000001.00000002.2269121553.0000000000810000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: %%.pdb source: doc-d.exe, 00000001.00000002.2268824999.00000000006F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: doc-d.exe, 00000001.00000002.2269121553.0000000000894000.00000004.00000020.00020000.00000000.sdmp, WER6909.tmp.dmp.12.dr
Source: Binary string: \??\C:\Windows\dll\System.pdb source: doc-d.exe, 00000001.00000002.2269121553.0000000000851000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Net.Http.pdb source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbJw source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Net.Http.ni.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: ~p.pdbk$ source: doc-d.exe, 00000001.00000002.2269121553.0000000000810000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: \??\C:\Windows\mscorlib.pdb source: doc-d.exe, 00000001.00000002.2269121553.0000000000851000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\doc-d.PDB source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbK source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbF source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\AppData\Local\Temp\doc-d.PDB source: doc-d.exe, 00000001.00000002.2268824999.00000000006F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER6909.tmp.dmp.12.dr
Source: Binary string: System.Net.Http.ni.pdbRSDS source: WER6909.tmp.dmp.12.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.ni.pdb source: WER6909.tmp.dmp.12.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER6909.tmp.dmp.12.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.Net.Http.pdbI source: doc-d.exe, 00000001.00000002.2269121553.000000000087D000.00000004.00000020.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: Booking_0106.exe, --.cs .Net Code: _0003 System.AppDomain.Load(byte[])
Source: Booking_0106.exe, ---.cs .Net Code: _0003
Source: 0.2.Booking_0106.exe.414c890.2.raw.unpack, TypeModel.cs .Net Code: TryDeserializeList
Source: 0.2.Booking_0106.exe.414c890.2.raw.unpack, ListDecorator.cs .Net Code: Read
Source: 0.2.Booking_0106.exe.414c890.2.raw.unpack, TypeSerializer.cs .Net Code: CreateInstance
Source: 0.2.Booking_0106.exe.414c890.2.raw.unpack, TypeSerializer.cs .Net Code: EmitCreateInstance
Source: 0.2.Booking_0106.exe.414c890.2.raw.unpack, TypeSerializer.cs .Net Code: EmitCreateIfNull
Source: Yara match File source: 0.2.Booking_0106.exe.5960000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000002.1731841032.0000000005960000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.1926073695.0000000002911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1842814784.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1711502008.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Booking_0106.exe PID: 7532, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ibrzb.exe PID: 7880, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ibrzb.exe PID: 7276, type: MEMORYSTR
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_014341E5 push ebx; ret 0_2_014342DA
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_0143C839 push 54056796h; ret 0_2_0143C845
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 0_2_05C66822 push ds; retf 0_2_05C66823
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_02E80C55 push edi; retf 2_2_02E80C7A
Source: C:\Users\user\Desktop\Booking_0106.exe Code function: 2_2_06BCFAF3 push es; ret 2_2_06BCFAF4
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_02A0C839 push 54052996h; ret 3_2_02A0C845
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_057485BE push ds; retf 3_2_057485BF
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 3_2_05986822 push ds; retf 3_2_05986823
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_00EC0C55 push edi; retf 4_2_00EC0C7A
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064C5150 push es; ret 4_2_064C5160
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064CFB44 push es; iretd 4_2_064CFB54
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064CFB55 push es; iretd 4_2_064CFB5C
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064CFB6D push es; iretd 4_2_064CFB70
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064CFB7D push es; iretd 4_2_064CFB88
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064CFB71 push es; iretd 4_2_064CFB7C
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064CFB10 push es; iretd 4_2_064CFB24
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064CFBCD push es; iretd 4_2_064CFBDC
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064CFBC9 push es; iretd 4_2_064CFBCC
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064CFBDD push es; iretd 4_2_064CFBE0
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 4_2_064CFB99 push es; iretd 4_2_064CFBC8
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_00F9C839 push 54050B96h; ret 8_2_00F9C845
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0519B1FA push ss; retf 8_2_0519B200
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_0519C225 push es; retf 8_2_0519C226
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_053685BE push ds; retf 8_2_053685BF
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 8_2_055A6822 push ds; retf 8_2_055A6823
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_02E70C55 push edi; retf 9_2_02E70C7A
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_06B9FB95 push es; iretd 9_2_06B9FBCC
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_06B9FBD5 push es; iretd 9_2_06B9FBDC
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_06B9FBCD push es; iretd 9_2_06B9FBD4
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_06B9FB23 push es; iretd 9_2_06B9FB24
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Code function: 9_2_06B9FB10 push es; iretd 9_2_06B9FB20
Source: Booking_0106.exe Static PE information: section name: .text entropy: 7.388391889899485
Source: ibrzb.exe.0.dr Static PE information: section name: .text entropy: 7.388391889899485
Source: C:\Users\user\Desktop\Booking_0106.exe File created: C:\Users\user\AppData\Roaming\ibrzb.exe Jump to dropped file
Source: C:\Users\user\Desktop\Booking_0106.exe File created: C:\Users\user\AppData\Local\Temp\doc-d.exe Jump to dropped file
Source: C:\Users\user\Desktop\Booking_0106.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ibrzb Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ibrzb Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Registry key monitored for changes: HKEY_CURRENT_USER_Classes Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: Yara match File source: Process Memory Space: Booking_0106.exe PID: 7532, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ibrzb.exe PID: 7880, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ibrzb.exe PID: 7276, type: MEMORYSTR
Source: C:\Users\user\Desktop\Booking_0106.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Source: C:\Users\user\AppData\Roaming\ibrzb.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Source: C:\Users\user\AppData\Roaming\ibrzb.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Source: Booking_0106.exe, 00000000.00000002.1711502008.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000003.00000002.1842814784.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, ibrzb.exe, 00000008.00000002.1926073695.0000000002911000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: SBIEDLL.DLL
Source: C:\Users\user\Desktop\Booking_0106.exe Memory allocated: 1430000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Memory allocated: 2FD0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Memory allocated: 4FD0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Memory allocated: A10000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Memory allocated: 26D0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Memory allocated: BE0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Memory allocated: 2E40000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Memory allocated: 30A0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Memory allocated: 2FB0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Memory allocated: 2A00000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Memory allocated: 2BD0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Memory allocated: 4BD0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Memory allocated: C50000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Memory allocated: 2930000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Memory allocated: 26B0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Memory allocated: F90000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Memory allocated: 2910000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Memory allocated: 4910000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Memory allocated: 2E30000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Memory allocated: 2FF0000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Memory allocated: 4FF0000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 3000000 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2999857 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2999734 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2999600 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2999172 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2999030 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2998906 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2998794 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2998687 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2998578 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2998468 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2998359 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2998241 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2998139 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2998031 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2997921 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2997803 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2997687 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2997576 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2997468 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2997359 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2997250 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2997140 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2997031 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2996922 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2996812 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2996703 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2996593 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2996484 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2996365 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2996246 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2996140 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2996031 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2995921 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2995812 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2995702 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2995590 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2995484 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2995375 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2995265 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2995156 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2995046 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2994937 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2994828 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2994718 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2994604 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2994500 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2994390 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Window / User API: threadDelayed 2655 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Window / User API: threadDelayed 7185 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Window / User API: threadDelayed 2984 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Window / User API: threadDelayed 1196 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Window / User API: threadDelayed 700 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Window / User API: threadDelayed 2687 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Window / User API: threadDelayed 1414
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Window / User API: threadDelayed 2566
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep count: 32 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -29514790517935264s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -3000000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7660 Thread sleep count: 2655 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7660 Thread sleep count: 7185 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2999857s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2999734s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2999600s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2999172s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2999030s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2998906s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2998794s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2998687s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2998578s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2998468s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2998359s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2998241s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2998139s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2998031s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2997921s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2997803s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2997687s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2997576s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2997468s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2997359s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2997250s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2997140s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2997031s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2996922s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2996812s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2996703s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2996593s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2996484s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2996365s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2996246s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2996140s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2996031s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2995921s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2995812s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2995702s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2995590s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2995484s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2995375s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2995265s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2995156s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2995046s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2994937s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2994828s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2994718s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2994604s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2994500s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe TID: 7620 Thread sleep time: -2994390s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -11068046444225724s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -100000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7796 Thread sleep count: 2984 > 30 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -99875s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7796 Thread sleep count: 1196 > 30 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -99766s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -99657s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -99532s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -99422s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -99313s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -99188s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -99063s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -98938s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -98813s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -98703s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -98594s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -98469s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -98343s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -98193s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -98063s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -97953s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -97844s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -97735s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -97610s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe TID: 7792 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -11990383647911201s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -100000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -99890s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8048 Thread sleep count: 700 > 30 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8048 Thread sleep count: 2687 > 30 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -99781s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -99672s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -99562s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -99453s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -99343s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -99234s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -99124s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -99015s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -98906s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -98797s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -98687s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -98571s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -98453s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -98343s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -98232s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 8044 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -12912720851596678s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -100000s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 2008 Thread sleep count: 1414 > 30
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -99875s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 2008 Thread sleep count: 2566 > 30
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -99766s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -99641s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -99531s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -99421s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -99312s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -99200s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -99078s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -98960s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -98858s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -98734s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -98625s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -98516s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -98406s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -98297s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -98187s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -98078s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -97968s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -97859s >= -30000s
Source: C:\Users\user\AppData\Roaming\ibrzb.exe TID: 1188 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\Desktop\Booking_0106.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Source: C:\Users\user\AppData\Roaming\ibrzb.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Source: C:\Users\user\AppData\Roaming\ibrzb.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Source: C:\Users\user\Desktop\Booking_0106.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\Booking_0106.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\ibrzb.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\AppData\Roaming\ibrzb.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\ibrzb.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\AppData\Roaming\ibrzb.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 3000000 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2999857 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2999734 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2999600 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2999172 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2999030 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2998906 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2998794 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2998687 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2998578 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2998468 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2998359 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2998241 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2998139 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2998031 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2997921 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2997803 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2997687 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2997576 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2997468 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2997359 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2997250 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2997140 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2997031 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2996922 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2996812 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2996703 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2996593 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2996484 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2996365 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2996246 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2996140 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2996031 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2995921 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2995812 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2995702 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2995590 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2995484 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2995375 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2995265 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2995156 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2995046 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2994937 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2994828 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2994718 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2994604 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2994500 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Thread delayed: delay time: 2994390 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 100000 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 99875 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 99766 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 99657 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 99532 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 99422 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 99313 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 99188 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 99063 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 98938 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 98813 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 98703 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 98594 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 98469 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 98343 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 98193 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 98063 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 97953 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 97844 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 97735 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 97610 Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 100000 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 99890 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 99781 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 99672 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 99562 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 99453 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 99343 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 99234 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 99124 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 99015 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 98906 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 98797 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 98687 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 98571 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 98453 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 98343 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 98232 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 100000
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 99875
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 99766
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 99641
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 99531
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 99421
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 99312
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 99200
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 99078
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 98960
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 98858
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 98734
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 98625
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 98516
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 98406
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 98297
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 98187
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 98078
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 97968
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 97859
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Thread delayed: delay time: 922337203685477
Source: Booking_0106.exe, 00000000.00000002.1730902985.00000000056A0000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: bUQemUjXJw
Source: Amcache.hve.12.dr Binary or memory string: VMware
Source: ibrzb.exe.0.dr Binary or memory string: ProductNameVMware Workstation>
Source: Amcache.hve.12.dr Binary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.12.dr Binary or memory string: vmci.syshbin
Source: ibrzb.exe.0.dr Binary or memory string: VMware, Inc.
Source: ibrzb.exe.0.dr Binary or memory string: CommentsVMware Player:
Source: Amcache.hve.12.dr Binary or memory string: VMware20,1hbin@
Source: Amcache.hve.12.dr Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.12.dr Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.12.dr Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.12.dr Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: ibrzb.exe.0.dr Binary or memory string: VMware, Inc.1
Source: ibrzb.exe.0.dr Binary or memory string: VMware, Inc.0
Source: ibrzb.exe.0.dr Binary or memory string: VMware Workstation%
Source: Amcache.hve.12.dr Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.12.dr Binary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.12.dr Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: doc-d.exe, 00000001.00000002.2269121553.0000000000851000.00000004.00000020.00020000.00000000.sdmp, ibrzb.exe, 00000004.00000002.2959629553.0000000000D32000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Booking_0106.exe, 00000002.00000002.2984901096.00000000063E0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllHA
Source: Amcache.hve.12.dr Binary or memory string: vmci.sys
Source: ibrzb.exe.0.dr Binary or memory string: CompanyNameVMware, Inc.D
Source: Amcache.hve.12.dr Binary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.12.dr Binary or memory string: vmci.syshbin`
Source: Amcache.hve.12.dr Binary or memory string: \driver\vmci,\driver\pci
Source: ibrzb.exe, 00000009.00000002.2958088003.00000000011E1000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll-
Source: Amcache.hve.12.dr Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.12.dr Binary or memory string: VMware20,1
Source: ibrzb.exe, 00000008.00000002.1926073695.0000000002911000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: SerialNumber0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
Source: Amcache.hve.12.dr Binary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.12.dr Binary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.12.dr Binary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.12.dr Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.12.dr Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.12.dr Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.12.dr Binary or memory string: VMware PCI VMCI Bus Device
Source: ibrzb.exe, 00000008.00000002.1926073695.0000000002911000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: model0Microsoft|VMWare|Virtual
Source: Amcache.hve.12.dr Binary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.12.dr Binary or memory string: VMware Virtual RAM
Source: ibrzb.exe.0.dr Binary or memory string: FileDescriptionVMware Player:
Source: Amcache.hve.12.dr Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: ibrzb.exe.0.dr Binary or memory string: noreply@vmware.com
Source: ibrzb.exe.0.dr Binary or memory string: VMware Player
Source: ibrzb.exe.0.dr Binary or memory string: VMware Workstation
Source: Amcache.hve.12.dr Binary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\Booking_0106.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\Booking_0106.exe Memory written: C:\Users\user\Desktop\Booking_0106.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Memory written: C:\Users\user\AppData\Roaming\ibrzb.exe base: 570000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Memory written: C:\Users\user\AppData\Roaming\ibrzb.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Booking_0106.exe Process created: C:\Users\user\AppData\Local\Temp\doc-d.exe "C:\Users\user\AppData\Local\Temp\doc-d.exe" Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Process created: C:\Users\user\Desktop\Booking_0106.exe "C:\Users\user\Desktop\Booking_0106.exe" Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process created: C:\Users\user\AppData\Roaming\ibrzb.exe "C:\Users\user\AppData\Roaming\ibrzb.exe" Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Process created: C:\Users\user\AppData\Roaming\ibrzb.exe "C:\Users\user\AppData\Roaming\ibrzb.exe"
Source: C:\Users\user\Desktop\Booking_0106.exe Queries volume information: C:\Users\user\Desktop\Booking_0106.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\doc-d.exe Queries volume information: C:\Users\user\AppData\Local\Temp\doc-d.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Queries volume information: C:\Users\user\Desktop\Booking_0106.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Queries volume information: C:\Users\user\AppData\Roaming\ibrzb.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Queries volume information: C:\Users\user\AppData\Roaming\ibrzb.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Queries volume information: C:\Users\user\AppData\Roaming\ibrzb.exe VolumeInformation
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Queries volume information: C:\Users\user\AppData\Roaming\ibrzb.exe VolumeInformation
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\Booking_0106.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: Amcache.hve.12.dr Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.12.dr Binary or memory string: msmpeng.exe
Source: Amcache.hve.12.dr Binary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.12.dr Binary or memory string: MsMpEng.exe

Stealing of Sensitive Information

barindex
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: 0.2.Booking_0106.exe.4023d90.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Booking_0106.exe.4023d90.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000009.00000002.2962339297.000000000306C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2962339297.0000000003074000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2962867895.0000000003117000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2963837882.00000000029AB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.1926073695.0000000002A85000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1860595273.0000000003CC2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.1939658739.0000000003A01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2962339297.0000000003041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1729847882.0000000003FD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2962867895.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2963837882.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1711502008.0000000003117000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1842814784.0000000002D12000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2962867895.000000000312A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2962339297.000000000307A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2963837882.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Booking_0106.exe PID: 7532, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: Booking_0106.exe PID: 7628, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ibrzb.exe PID: 7880, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ibrzb.exe PID: 7924, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ibrzb.exe PID: 7276, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ibrzb.exe PID: 6096, type: MEMORYSTR
Source: C:\Users\user\Desktop\Booking_0106.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
Source: C:\Users\user\AppData\Roaming\ibrzb.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
Source: C:\Users\user\AppData\Roaming\ibrzb.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
Source: C:\Users\user\AppData\Roaming\ibrzb.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
Source: C:\Users\user\AppData\Roaming\ibrzb.exe File opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
Source: C:\Users\user\AppData\Roaming\ibrzb.exe File opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
Source: C:\Users\user\AppData\Roaming\ibrzb.exe File opened: C:\FTP Navigator\Ftplist.txt
Source: C:\Users\user\Desktop\Booking_0106.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles Jump to behavior
Source: C:\Users\user\Desktop\Booking_0106.exe Key opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Key opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities Jump to behavior
Source: C:\Users\user\AppData\Roaming\ibrzb.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
Source: C:\Users\user\AppData\Roaming\ibrzb.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
Source: C:\Users\user\AppData\Roaming\ibrzb.exe Key opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
Source: Yara match File source: 0.2.Booking_0106.exe.4023d90.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Booking_0106.exe.4023d90.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000008.00000002.1926073695.0000000002A85000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1860595273.0000000003CC2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.1939658739.0000000003A01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2962339297.0000000003041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1729847882.0000000003FD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2962867895.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2963837882.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1711502008.0000000003117000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1842814784.0000000002D12000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Booking_0106.exe PID: 7532, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: Booking_0106.exe PID: 7628, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ibrzb.exe PID: 7880, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ibrzb.exe PID: 7924, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ibrzb.exe PID: 7276, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ibrzb.exe PID: 6096, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: 0.2.Booking_0106.exe.4023d90.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Booking_0106.exe.4023d90.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000009.00000002.2962339297.000000000306C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2962339297.0000000003074000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2962867895.0000000003117000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2963837882.00000000029AB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.1926073695.0000000002A85000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1860595273.0000000003CC2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.1939658739.0000000003A01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2962339297.0000000003041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1729847882.0000000003FD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2962867895.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2963837882.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1711502008.0000000003117000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1842814784.0000000002D12000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2962867895.000000000312A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2962339297.000000000307A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2963837882.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Booking_0106.exe PID: 7532, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: Booking_0106.exe PID: 7628, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ibrzb.exe PID: 7880, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ibrzb.exe PID: 7924, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ibrzb.exe PID: 7276, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ibrzb.exe PID: 6096, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs