Windows Analysis Report
vTHGfiwMDeoOH5a.exe

Overview

General Information

Sample name: vTHGfiwMDeoOH5a.exe
Analysis ID: 1527610
MD5: 3aa5992e9a518e4d1a7042a16b10e31d
SHA1: 5bce77192abbf2a71a2b19d6b00f08685f569b64
SHA256: cfad352d8c9e907269c76b22b73f7a9fa47c3782c99ec48598a310a35d3bdaac
Tags: exeuser-threatcat_ch
Infos:

Detection

FormBook
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected FormBook
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

AV Detection

barindex
Source: vTHGfiwMDeoOH5a.exe Virustotal: Detection: 36% Perma Link
Source: Yara match File source: 3.2.vTHGfiwMDeoOH5a.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.vTHGfiwMDeoOH5a.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000003.00000002.1818968282.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1819365139.0000000000FF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: vTHGfiwMDeoOH5a.exe Joe Sandbox ML: detected
Source: vTHGfiwMDeoOH5a.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: vTHGfiwMDeoOH5a.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: wntdll.pdbUGP source: vTHGfiwMDeoOH5a.exe, 00000003.00000002.1819818662.00000000014E0000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: wntdll.pdb source: vTHGfiwMDeoOH5a.exe, vTHGfiwMDeoOH5a.exe, 00000003.00000002.1819818662.00000000014E0000.00000040.00001000.00020000.00000000.sdmp
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1737733029.0000000002B1A000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.carterandcone.coml
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.fontbureau.com
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.fontbureau.com/designers
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.fontbureau.com/designers/?
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.fontbureau.com/designers8
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.fontbureau.com/designers?
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.fontbureau.com/designersG
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.fonts.com
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.founder.com.cn/cn
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.goodfont.co.kr
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.sajatypeworks.com
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.sakkal.com
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.sandoll.co.kr
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.tiro.com
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.typography.netD
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.urwpp.deDPlease
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1755243147.0000000006D72000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.zhongyicts.com.cn

E-Banking Fraud

barindex
Source: Yara match File source: 3.2.vTHGfiwMDeoOH5a.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.vTHGfiwMDeoOH5a.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000003.00000002.1818968282.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1819365139.0000000000FF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

System Summary

barindex
Source: 3.2.vTHGfiwMDeoOH5a.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 3.2.vTHGfiwMDeoOH5a.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000003.00000002.1818968282.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000003.00000002.1819365139.0000000000FF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0042C8B3 NtClose, 3_2_0042C8B3
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552B60 NtClose,LdrInitializeThunk, 3_2_01552B60
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552DF0 NtQuerySystemInformation,LdrInitializeThunk, 3_2_01552DF0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552C70 NtFreeVirtualMemory,LdrInitializeThunk, 3_2_01552C70
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015535C0 NtCreateMutant,LdrInitializeThunk, 3_2_015535C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01554340 NtSetContextThread, 3_2_01554340
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01554650 NtSuspendThread, 3_2_01554650
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552BF0 NtAllocateVirtualMemory, 3_2_01552BF0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552BE0 NtQueryValueKey, 3_2_01552BE0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552B80 NtQueryInformationFile, 3_2_01552B80
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552BA0 NtEnumerateValueKey, 3_2_01552BA0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552AD0 NtReadFile, 3_2_01552AD0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552AF0 NtWriteFile, 3_2_01552AF0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552AB0 NtWaitForSingleObject, 3_2_01552AB0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552D10 NtMapViewOfSection, 3_2_01552D10
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552D00 NtSetInformationFile, 3_2_01552D00
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552D30 NtUnmapViewOfSection, 3_2_01552D30
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552DD0 NtDelayExecution, 3_2_01552DD0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552DB0 NtEnumerateKey, 3_2_01552DB0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552C60 NtCreateKey, 3_2_01552C60
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552C00 NtQueryInformationProcess, 3_2_01552C00
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552CC0 NtQueryVirtualMemory, 3_2_01552CC0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552CF0 NtOpenProcess, 3_2_01552CF0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552CA0 NtQueryInformationToken, 3_2_01552CA0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552F60 NtCreateProcessEx, 3_2_01552F60
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552F30 NtCreateSection, 3_2_01552F30
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552FE0 NtCreateFile, 3_2_01552FE0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552F90 NtProtectVirtualMemory, 3_2_01552F90
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552FB0 NtResumeThread, 3_2_01552FB0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552FA0 NtQuerySection, 3_2_01552FA0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552E30 NtWriteVirtualMemory, 3_2_01552E30
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552EE0 NtQueueApcThread, 3_2_01552EE0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552E80 NtReadVirtualMemory, 3_2_01552E80
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552EA0 NtAdjustPrivilegesToken, 3_2_01552EA0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01553010 NtOpenDirectoryObject, 3_2_01553010
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01553090 NtSetValueKey, 3_2_01553090
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015539B0 NtGetContextThread, 3_2_015539B0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01553D70 NtOpenThread, 3_2_01553D70
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01553D10 NtOpenProcessToken, 3_2_01553D10
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 0_2_029FE828 0_2_029FE828
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 0_2_075AA570 0_2_075AA570
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 0_2_075A8C70 0_2_075A8C70
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 0_2_075A2591 0_2_075A2591
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 0_2_075A25A0 0_2_075A25A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 0_2_075A4A30 0_2_075A4A30
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 0_2_075A2148 0_2_075A2148
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 0_2_075A29D8 0_2_075A29D8
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 0_2_075A29C8 0_2_075A29C8
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 0_2_075A4071 0_2_075A4071
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 0_2_075A4080 0_2_075A4080
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_00410073 3_2_00410073
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_004028F0 3_2_004028F0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_00401150 3_2_00401150
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_00403120 3_2_00403120
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_004169CE 3_2_004169CE
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_004169D3 3_2_004169D3
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_00410293 3_2_00410293
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0040E313 3_2_0040E313
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_00402400 3_2_00402400
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_004025A0 3_2_004025A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0042EF03 3_2_0042EF03
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A8158 3_2_015A8158
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BA118 3_2_015BA118
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01510100 3_2_01510100
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D81CC 3_2_015D81CC
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E01AA 3_2_015E01AA
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D41A2 3_2_015D41A2
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B2000 3_2_015B2000
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015DA352 3_2_015DA352
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152E3F0 3_2_0152E3F0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E03E6 3_2_015E03E6
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C0274 3_2_015C0274
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A02C0 3_2_015A02C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520535 3_2_01520535
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E0591 3_2_015E0591
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D2446 3_2_015D2446
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C4420 3_2_015C4420
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015CE4F6 3_2_015CE4F6
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01544750 3_2_01544750
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520770 3_2_01520770
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151C7C0 3_2_0151C7C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153C6E0 3_2_0153C6E0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01536962 3_2_01536962
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015229A0 3_2_015229A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015EA9A6 3_2_015EA9A6
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01522840 3_2_01522840
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152A840 3_2_0152A840
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154E8F0 3_2_0154E8F0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015068B8 3_2_015068B8
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015DAB40 3_2_015DAB40
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D6BD7 3_2_015D6BD7
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151EA80 3_2_0151EA80
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BCD1F 3_2_015BCD1F
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152AD00 3_2_0152AD00
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151ADE0 3_2_0151ADE0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01538DBF 3_2_01538DBF
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520C00 3_2_01520C00
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01510CF2 3_2_01510CF2
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C0CB5 3_2_015C0CB5
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01594F40 3_2_01594F40
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01540F30 3_2_01540F30
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C2F30 3_2_015C2F30
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01562F28 3_2_01562F28
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01512FC8 3_2_01512FC8
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159EFA0 3_2_0159EFA0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520E59 3_2_01520E59
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015DEE26 3_2_015DEE26
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015DEEDB 3_2_015DEEDB
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01532E90 3_2_01532E90
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015DCE93 3_2_015DCE93
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150F172 3_2_0150F172
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015EB16B 3_2_015EB16B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0155516C 3_2_0155516C
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152B1B0 3_2_0152B1B0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015CF0CC 3_2_015CF0CC
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015270C0 3_2_015270C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D70E9 3_2_015D70E9
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015DF0E0 3_2_015DF0E0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150D34C 3_2_0150D34C
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D132D 3_2_015D132D
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0156739A 3_2_0156739A
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153B2C0 3_2_0153B2C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C12ED 3_2_015C12ED
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015252A0 3_2_015252A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D7571 3_2_015D7571
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E95C3 3_2_015E95C3
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BD5B0 3_2_015BD5B0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01511460 3_2_01511460
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015DF43F 3_2_015DF43F
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015DF7B0 3_2_015DF7B0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01565630 3_2_01565630
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D16CC 3_2_015D16CC
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01529950 3_2_01529950
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153B950 3_2_0153B950
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B5910 3_2_015B5910
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158D800 3_2_0158D800
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015238E0 3_2_015238E0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015DFB76 3_2_015DFB76
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01595BF0 3_2_01595BF0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0155DBF9 3_2_0155DBF9
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153FB80 3_2_0153FB80
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015DFA49 3_2_015DFA49
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D7A46 3_2_015D7A46
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01593A6C 3_2_01593A6C
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015CDAC6 3_2_015CDAC6
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01565AA0 3_2_01565AA0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BDAAC 3_2_015BDAAC
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C1AA3 3_2_015C1AA3
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D1D5A 3_2_015D1D5A
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01523D40 3_2_01523D40
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D7D73 3_2_015D7D73
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153FDC0 3_2_0153FDC0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01599C32 3_2_01599C32
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015DFCF2 3_2_015DFCF2
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015DFF09 3_2_015DFF09
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_014E3FD5 3_2_014E3FD5
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_014E3FD2 3_2_014E3FD2
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01521F92 3_2_01521F92
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015DFFB1 3_2_015DFFB1
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01529EB0 3_2_01529EB0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: String function: 0159F290 appears 105 times
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: String function: 01555130 appears 58 times
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: String function: 01567E54 appears 108 times
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: String function: 0158EA12 appears 86 times
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: String function: 0150B970 appears 265 times
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1757630550.0000000007500000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilenameTyrone.dll8 vs vTHGfiwMDeoOH5a.exe
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1749534423.0000000003D25000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameTyrone.dll8 vs vTHGfiwMDeoOH5a.exe
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1749534423.0000000003AFD000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameTyrone.dll8 vs vTHGfiwMDeoOH5a.exe
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1736246551.0000000000CEE000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameclr.dllT vs vTHGfiwMDeoOH5a.exe
Source: vTHGfiwMDeoOH5a.exe, 00000003.00000002.1819818662.000000000160D000.00000040.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs vTHGfiwMDeoOH5a.exe
Source: vTHGfiwMDeoOH5a.exe Binary or memory string: OriginalFilenameHRjb.exe4 vs vTHGfiwMDeoOH5a.exe
Source: vTHGfiwMDeoOH5a.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 3.2.vTHGfiwMDeoOH5a.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 3.2.vTHGfiwMDeoOH5a.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000003.00000002.1818968282.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000003.00000002.1819365139.0000000000FF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: vTHGfiwMDeoOH5a.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, LDl5nPYufdFH3nVylB.cs Security API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, LDl5nPYufdFH3nVylB.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, qM4DLCUWw1tQ9OXMGh.cs Security API names: _0020.SetAccessControl
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, qM4DLCUWw1tQ9OXMGh.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, qM4DLCUWw1tQ9OXMGh.cs Security API names: _0020.AddAccessRule
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, qM4DLCUWw1tQ9OXMGh.cs Security API names: _0020.SetAccessControl
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, qM4DLCUWw1tQ9OXMGh.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, qM4DLCUWw1tQ9OXMGh.cs Security API names: _0020.AddAccessRule
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, LDl5nPYufdFH3nVylB.cs Security API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, LDl5nPYufdFH3nVylB.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, LDl5nPYufdFH3nVylB.cs Security API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, LDl5nPYufdFH3nVylB.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, qM4DLCUWw1tQ9OXMGh.cs Security API names: _0020.SetAccessControl
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, qM4DLCUWw1tQ9OXMGh.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, qM4DLCUWw1tQ9OXMGh.cs Security API names: _0020.AddAccessRule
Source: classification engine Classification label: mal100.troj.evad.winEXE@7/6@0/0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vTHGfiwMDeoOH5a.exe.log Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Mutant created: NULL
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4908:120:WilError_03
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mr1kh3f1.hqq.ps1 Jump to behavior
Source: vTHGfiwMDeoOH5a.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: vTHGfiwMDeoOH5a.exe Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe File read: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: vTHGfiwMDeoOH5a.exe Virustotal: Detection: 36%
Source: unknown Process created: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe "C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe"
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe"
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process created: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe "C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe" Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process created: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe "C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe" Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: dwrite.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: msvcp140_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: atl.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: msisip.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wshext.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: appxsip.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: opcservices.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: microsoft.management.infrastructure.native.unmanaged.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: mi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: miutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wmidcom.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: fastprox.dll Jump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: ncobjapi.dll Jump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: mpclient.dll Jump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: wmitomi.dll Jump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: mi.dll Jump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: miutils.dll Jump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: miutils.dll Jump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll Jump to behavior
Source: vTHGfiwMDeoOH5a.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: vTHGfiwMDeoOH5a.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: wntdll.pdbUGP source: vTHGfiwMDeoOH5a.exe, 00000003.00000002.1819818662.00000000014E0000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: wntdll.pdb source: vTHGfiwMDeoOH5a.exe, vTHGfiwMDeoOH5a.exe, 00000003.00000002.1819818662.00000000014E0000.00000040.00001000.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: vTHGfiwMDeoOH5a.exe, frmTimer.cs .Net Code: InitializeComponent contains xor as well as GetObject
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, qM4DLCUWw1tQ9OXMGh.cs .Net Code: LiS9qqXQIm System.Reflection.Assembly.Load(byte[])
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, qM4DLCUWw1tQ9OXMGh.cs .Net Code: LiS9qqXQIm System.Reflection.Assembly.Load(byte[])
Source: 0.2.vTHGfiwMDeoOH5a.exe.2b4f4dc.0.raw.unpack, RZ.cs .Net Code: System.Reflection.Assembly.Load(byte[])
Source: 0.2.vTHGfiwMDeoOH5a.exe.7390000.3.raw.unpack, RZ.cs .Net Code: System.Reflection.Assembly.Load(byte[])
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, qM4DLCUWw1tQ9OXMGh.cs .Net Code: LiS9qqXQIm System.Reflection.Assembly.Load(byte[])
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 0_2_029F0E75 pushfd ; iretd 0_2_029F0E79
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 0_2_029F0D62 push D000005Fh; iretd 0_2_029F0F49
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_00405130 push 276952D9h; iretd 3_2_00405135
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0041E990 push edx; ret 3_2_0041E991
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_00404A47 push edi; retf 3_2_00404A48
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0041F2F5 push edi; iretd 3_2_0041F30F
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0041AA8F push ebx; ret 3_2_0041AB40
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0041F303 push edi; iretd 3_2_0041F30F
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_00411B28 pushad ; ret 3_2_00411B29
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_004033A0 push eax; ret 3_2_004033A2
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_00415C53 push 4D40979Fh; retf AA07h 3_2_00415DF1
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_00426DE3 push edi; ret 3_2_00426DEE
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0041EDBB push eax; iretd 3_2_0041EDD2
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_00404E7A push ebp; ret 3_2_00404E7B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_00404EC0 push A00DC95Eh; retf 3_2_00404EF3
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_00408686 pushad ; retf 3_2_00408687
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_014E225F pushad ; ret 3_2_014E27F9
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_014E27FA pushad ; ret 3_2_014E27F9
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015109AD push ecx; mov dword ptr [esp], ecx 3_2_015109B6
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_014E283D push eax; iretd 3_2_014E2858
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_014E135E push eax; iretd 3_2_014E1369
Source: vTHGfiwMDeoOH5a.exe Static PE information: section name: .text entropy: 7.9436966526072
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, ba3N88TDtu18m3oEJG.cs High entropy of concatenated method names: 'sfxR1vnkcy', 'cZyRtXXKbT', 'KEsRmMt8BO', 'P2sR3PoVQd', 'xyORe1YVj3', 'cbfRS3wEYR', 'Next', 'Next', 'Next', 'NextBytes'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, XRfSFDcZcXQwjKUsfE.cs High entropy of concatenated method names: 'JquwOcRAT9', 'qgiwhaKSpA', 'ToString', 'aiFwAnoJ2P', 'XnPw4dtLWE', 'Eu3wP5Cl7C', 'Folwk9xCgc', 'FW7wFBaSoc', 'l3Iw6eWeX5', 'GrowUGVeti'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, uZMfQ7W5mcV2JUnSvu.cs High entropy of concatenated method names: 'wMnPDXW1Vt', 'QaEPiZeicV', 'H6bPYsGkyp', 'I03PW68kI7', 'KteP0POv3G', 'xO6PuY1k4f', 'sYCPwINGfB', 'WdtPRjjbVo', 'uqoPIBJa3E', 'EraPQeNN6o'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, qM4DLCUWw1tQ9OXMGh.cs High entropy of concatenated method names: 'VpNjrxn3cp', 'SXbjAc64wE', 'Hw8j4d70Gh', 'De7jPVf9dv', 'TDXjklypNd', 'ib0jF5bXqA', 'PiNj6eBXIc', 'SoAjU5NVsf', 'e93jK50RBW', 'YNZjOyqfdg'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, aKNnsRVCfJNmAfWqCf.cs High entropy of concatenated method names: 'Px3RAs5lUU', 'O1pR4gfdqB', 'iFTRP4D0Sl', 'VuGRk3Hcj2', 'VsFRFYKs6P', 'jKJR6GGkQF', 'EhORUX9Du5', 'kc5RKwE9IP', 'EsdROmKPfZ', 'YAcRhmyqIh'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, ungGyadj3kweUfFhOD.cs High entropy of concatenated method names: 'ToString', 'Ok7uHwZfld', 'c1NutCew9G', 'dqEumware3', 'X5Nu3Qs1MF', 'jAcuSuWoJg', 'JJIupNImUU', 'yNWulVYg32', 'KQHufx6aFI', 'TsFu83uJ4a'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, zwktOcBtRG25EyF05A.cs High entropy of concatenated method names: 'WIj5YeD0sg', 'wJI5WDdQif', 'ERC51HOurh', 'EBW5t7PIlf', 'CNW53CNZq8', 'V1l5S9TbH4', 'Mal5l3SueH', 'GUX5f8pPxF', 'Jam5aBQenl', 'f3C5HroIyA'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, fyBJnA47PFDPUrY7MM.cs High entropy of concatenated method names: 'Dispose', 'LQ0XToDhAW', 'WgCMtXUXqC', 'tDUAAVjfRx', 'T2KXgNnsRC', 'LJNXzmAfWq', 'ProcessDialogKey', 'vfXM2a3N88', 'ztuMX18m3o', 'WJGMMH18xK'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, yw2kqeehMuA8ix6S61.cs High entropy of concatenated method names: 'sGs0anNbuW', 'XQ10NiFdyG', 'Qwu0e5RLOb', 'l5J0yModel', 'k0k0t9FUmL', 'BYy0mMLU2y', 'NeD03yqY2Z', 'r8K0SXvT6R', 'CNt0pfdnNR', 'K5G0lfxCUK'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, eWaGr1GlYIqflv0XjW.cs High entropy of concatenated method names: 'h8kkLjp5pf', 'RrEkbYPX6H', 'mghPmFCHHc', 'KL8P3gKcc0', 'wEsPSKx5wg', 'ImqPpcVSYt', 'eAiPldTkFE', 'LvSPfquUuI', 'KKEP81Hkmo', 'MYtPaH5CTQ'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, z4sGsw1Z1CEdqFou2M.cs High entropy of concatenated method names: 'RfKFrCH2E3', 'A3QF4ZacWZ', 'kRSFkDmjEW', 'x0pF6QUWWQ', 'pKIFU1w06q', 'uV6k7rR0j1', 'RqPknOOM3D', 'UTYkEcQlq2', 'x6OkViXiIg', 'uvnkTG7PfG'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, O18xKxgJqHQNNkpSib.cs High entropy of concatenated method names: 'ULUIXMF4im', 'H4qIjytDi4', 'd1FI95N6EB', 'gkVIAGOdg0', 'dvlI42CrrA', 'IROIkvs87R', 'oVtIFIhPpC', 'fr4REl6afq', 'OviRVO1bon', 'lhgRT2K0Ak'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, aTjkFcXjE1tol7hKHl8.cs High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'jbHQeZQItB', 'PAcQy2FBTy', 'R8kQdFQZwm', 'fLbQcdc9Xi', 'yCRQ7Pt3ND', 'Mb8Qnylg85', 'PRxQE2qRbH'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, V8PwcoX2UxgibwWX6lg.cs High entropy of concatenated method names: 'gwAIJ35faH', 'LN4Ix573FH', 'MoxIqQG5HQ', 'DVLIDF1YrI', 'NQyILjmULA', 'kp9IijNpSk', 'LllIb8g1M5', 'tF9IY6vcTy', 'EGeIWcXpFK', 'qQvIG1Ktap'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, QCMdZSMUiyxjUBPGg7.cs High entropy of concatenated method names: 'R8uqbPwkm', 'tDdDxgXg9', 'HZkiZtyIW', 'C3AbVRP3P', 'HF4WO4h0S', 'VMAGxwMd4', 'tXHLOFoQIZKV2CW9AL', 'uLxodbROYSqt1yiFCG', 'GLvR3NERB', 'ckRQxQU1B'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, WuQWPVnccAOMVU5SBt.cs High entropy of concatenated method names: 'HDqwVEpD5i', 'hMjwgS0Y4u', 'oSJR2ZJC5B', 'ThhRXdfBSE', 'oDWwH8t8O2', 'PwLwNydWSf', 'oR3wBDCcXd', 'gDBwey0kSu', 'oQZwyBahbm', 'JbHwdhKG1N'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, LDl5nPYufdFH3nVylB.cs High entropy of concatenated method names: 'vil4eRved5', 'pGR4yVvbPM', 'N9Y4dPSiXM', 'J6F4cWKJo9', 'ABB47LDFpc', 'Wu64nHo1vd', 'lt54E1Bwik', 'QWn4Vs7POR', 'u6X4TUOC7M', 'zA24g1DZK8'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, BQrxGT8pP9gJrmxrsh.cs High entropy of concatenated method names: 'FGy6J6v4lb', 'R1l6xqLVSZ', 'cqZ6qYFd3t', 'Qj16DJ5HCa', 'mI06LxgvqG', 'RcB6i41CNs', 'R4a6biuBRU', 'z346YcIDkf', 'LCj6W5F84M', 'wc26G1Iqg4'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, PlItGS92uBjpgRuUCT.cs High entropy of concatenated method names: 'WAfX6Dl5nP', 'pfdXUFH3nV', 'U5mXOcV2JU', 'USvXhurWaG', 'w0XX0jWq4s', 'FswXuZ1CEd', 'uslxavlmufF4Tin0jy', 'ycovvUAqKfuXcHMy3M', 'hBBXXJWeUG', 'rOlXjIhIj5'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, qIUTxLzvQK6sRcgxxP.cs High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'NEgI5vGAL5', 'EwrI0PdhQ9', 'dP7IuC10Is', 'acTIwG3JIu', 'fhEIRothww', 'S95II6R8BX', 'Il9IQHYro4'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3db7fe0.1.raw.unpack, uiKGN9lRraX3UpGJ5h.cs High entropy of concatenated method names: 'Fim6AZ9627', 'VT86PIr48c', 'Cla6FGsTd9', 'JNGFgVYeGx', 'D4wFzd51lm', 'jw362mQDG2', 'igp6XN3NLj', 'i506MmXxcW', 'wPl6j53U1Q', 'aWT69SJp8P'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, ba3N88TDtu18m3oEJG.cs High entropy of concatenated method names: 'sfxR1vnkcy', 'cZyRtXXKbT', 'KEsRmMt8BO', 'P2sR3PoVQd', 'xyORe1YVj3', 'cbfRS3wEYR', 'Next', 'Next', 'Next', 'NextBytes'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, XRfSFDcZcXQwjKUsfE.cs High entropy of concatenated method names: 'JquwOcRAT9', 'qgiwhaKSpA', 'ToString', 'aiFwAnoJ2P', 'XnPw4dtLWE', 'Eu3wP5Cl7C', 'Folwk9xCgc', 'FW7wFBaSoc', 'l3Iw6eWeX5', 'GrowUGVeti'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, uZMfQ7W5mcV2JUnSvu.cs High entropy of concatenated method names: 'wMnPDXW1Vt', 'QaEPiZeicV', 'H6bPYsGkyp', 'I03PW68kI7', 'KteP0POv3G', 'xO6PuY1k4f', 'sYCPwINGfB', 'WdtPRjjbVo', 'uqoPIBJa3E', 'EraPQeNN6o'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, qM4DLCUWw1tQ9OXMGh.cs High entropy of concatenated method names: 'VpNjrxn3cp', 'SXbjAc64wE', 'Hw8j4d70Gh', 'De7jPVf9dv', 'TDXjklypNd', 'ib0jF5bXqA', 'PiNj6eBXIc', 'SoAjU5NVsf', 'e93jK50RBW', 'YNZjOyqfdg'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, aKNnsRVCfJNmAfWqCf.cs High entropy of concatenated method names: 'Px3RAs5lUU', 'O1pR4gfdqB', 'iFTRP4D0Sl', 'VuGRk3Hcj2', 'VsFRFYKs6P', 'jKJR6GGkQF', 'EhORUX9Du5', 'kc5RKwE9IP', 'EsdROmKPfZ', 'YAcRhmyqIh'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, ungGyadj3kweUfFhOD.cs High entropy of concatenated method names: 'ToString', 'Ok7uHwZfld', 'c1NutCew9G', 'dqEumware3', 'X5Nu3Qs1MF', 'jAcuSuWoJg', 'JJIupNImUU', 'yNWulVYg32', 'KQHufx6aFI', 'TsFu83uJ4a'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, zwktOcBtRG25EyF05A.cs High entropy of concatenated method names: 'WIj5YeD0sg', 'wJI5WDdQif', 'ERC51HOurh', 'EBW5t7PIlf', 'CNW53CNZq8', 'V1l5S9TbH4', 'Mal5l3SueH', 'GUX5f8pPxF', 'Jam5aBQenl', 'f3C5HroIyA'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, fyBJnA47PFDPUrY7MM.cs High entropy of concatenated method names: 'Dispose', 'LQ0XToDhAW', 'WgCMtXUXqC', 'tDUAAVjfRx', 'T2KXgNnsRC', 'LJNXzmAfWq', 'ProcessDialogKey', 'vfXM2a3N88', 'ztuMX18m3o', 'WJGMMH18xK'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, yw2kqeehMuA8ix6S61.cs High entropy of concatenated method names: 'sGs0anNbuW', 'XQ10NiFdyG', 'Qwu0e5RLOb', 'l5J0yModel', 'k0k0t9FUmL', 'BYy0mMLU2y', 'NeD03yqY2Z', 'r8K0SXvT6R', 'CNt0pfdnNR', 'K5G0lfxCUK'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, eWaGr1GlYIqflv0XjW.cs High entropy of concatenated method names: 'h8kkLjp5pf', 'RrEkbYPX6H', 'mghPmFCHHc', 'KL8P3gKcc0', 'wEsPSKx5wg', 'ImqPpcVSYt', 'eAiPldTkFE', 'LvSPfquUuI', 'KKEP81Hkmo', 'MYtPaH5CTQ'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, z4sGsw1Z1CEdqFou2M.cs High entropy of concatenated method names: 'RfKFrCH2E3', 'A3QF4ZacWZ', 'kRSFkDmjEW', 'x0pF6QUWWQ', 'pKIFU1w06q', 'uV6k7rR0j1', 'RqPknOOM3D', 'UTYkEcQlq2', 'x6OkViXiIg', 'uvnkTG7PfG'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, O18xKxgJqHQNNkpSib.cs High entropy of concatenated method names: 'ULUIXMF4im', 'H4qIjytDi4', 'd1FI95N6EB', 'gkVIAGOdg0', 'dvlI42CrrA', 'IROIkvs87R', 'oVtIFIhPpC', 'fr4REl6afq', 'OviRVO1bon', 'lhgRT2K0Ak'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, aTjkFcXjE1tol7hKHl8.cs High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'jbHQeZQItB', 'PAcQy2FBTy', 'R8kQdFQZwm', 'fLbQcdc9Xi', 'yCRQ7Pt3ND', 'Mb8Qnylg85', 'PRxQE2qRbH'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, V8PwcoX2UxgibwWX6lg.cs High entropy of concatenated method names: 'gwAIJ35faH', 'LN4Ix573FH', 'MoxIqQG5HQ', 'DVLIDF1YrI', 'NQyILjmULA', 'kp9IijNpSk', 'LllIb8g1M5', 'tF9IY6vcTy', 'EGeIWcXpFK', 'qQvIG1Ktap'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, QCMdZSMUiyxjUBPGg7.cs High entropy of concatenated method names: 'R8uqbPwkm', 'tDdDxgXg9', 'HZkiZtyIW', 'C3AbVRP3P', 'HF4WO4h0S', 'VMAGxwMd4', 'tXHLOFoQIZKV2CW9AL', 'uLxodbROYSqt1yiFCG', 'GLvR3NERB', 'ckRQxQU1B'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, WuQWPVnccAOMVU5SBt.cs High entropy of concatenated method names: 'HDqwVEpD5i', 'hMjwgS0Y4u', 'oSJR2ZJC5B', 'ThhRXdfBSE', 'oDWwH8t8O2', 'PwLwNydWSf', 'oR3wBDCcXd', 'gDBwey0kSu', 'oQZwyBahbm', 'JbHwdhKG1N'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, LDl5nPYufdFH3nVylB.cs High entropy of concatenated method names: 'vil4eRved5', 'pGR4yVvbPM', 'N9Y4dPSiXM', 'J6F4cWKJo9', 'ABB47LDFpc', 'Wu64nHo1vd', 'lt54E1Bwik', 'QWn4Vs7POR', 'u6X4TUOC7M', 'zA24g1DZK8'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, BQrxGT8pP9gJrmxrsh.cs High entropy of concatenated method names: 'FGy6J6v4lb', 'R1l6xqLVSZ', 'cqZ6qYFd3t', 'Qj16DJ5HCa', 'mI06LxgvqG', 'RcB6i41CNs', 'R4a6biuBRU', 'z346YcIDkf', 'LCj6W5F84M', 'wc26G1Iqg4'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, PlItGS92uBjpgRuUCT.cs High entropy of concatenated method names: 'WAfX6Dl5nP', 'pfdXUFH3nV', 'U5mXOcV2JU', 'USvXhurWaG', 'w0XX0jWq4s', 'FswXuZ1CEd', 'uslxavlmufF4Tin0jy', 'ycovvUAqKfuXcHMy3M', 'hBBXXJWeUG', 'rOlXjIhIj5'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, qIUTxLzvQK6sRcgxxP.cs High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'NEgI5vGAL5', 'EwrI0PdhQ9', 'dP7IuC10Is', 'acTIwG3JIu', 'fhEIRothww', 'S95II6R8BX', 'Il9IQHYro4'
Source: 0.2.vTHGfiwMDeoOH5a.exe.7500000.4.raw.unpack, uiKGN9lRraX3UpGJ5h.cs High entropy of concatenated method names: 'Fim6AZ9627', 'VT86PIr48c', 'Cla6FGsTd9', 'JNGFgVYeGx', 'D4wFzd51lm', 'jw362mQDG2', 'igp6XN3NLj', 'i506MmXxcW', 'wPl6j53U1Q', 'aWT69SJp8P'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, ba3N88TDtu18m3oEJG.cs High entropy of concatenated method names: 'sfxR1vnkcy', 'cZyRtXXKbT', 'KEsRmMt8BO', 'P2sR3PoVQd', 'xyORe1YVj3', 'cbfRS3wEYR', 'Next', 'Next', 'Next', 'NextBytes'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, XRfSFDcZcXQwjKUsfE.cs High entropy of concatenated method names: 'JquwOcRAT9', 'qgiwhaKSpA', 'ToString', 'aiFwAnoJ2P', 'XnPw4dtLWE', 'Eu3wP5Cl7C', 'Folwk9xCgc', 'FW7wFBaSoc', 'l3Iw6eWeX5', 'GrowUGVeti'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, uZMfQ7W5mcV2JUnSvu.cs High entropy of concatenated method names: 'wMnPDXW1Vt', 'QaEPiZeicV', 'H6bPYsGkyp', 'I03PW68kI7', 'KteP0POv3G', 'xO6PuY1k4f', 'sYCPwINGfB', 'WdtPRjjbVo', 'uqoPIBJa3E', 'EraPQeNN6o'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, qM4DLCUWw1tQ9OXMGh.cs High entropy of concatenated method names: 'VpNjrxn3cp', 'SXbjAc64wE', 'Hw8j4d70Gh', 'De7jPVf9dv', 'TDXjklypNd', 'ib0jF5bXqA', 'PiNj6eBXIc', 'SoAjU5NVsf', 'e93jK50RBW', 'YNZjOyqfdg'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, aKNnsRVCfJNmAfWqCf.cs High entropy of concatenated method names: 'Px3RAs5lUU', 'O1pR4gfdqB', 'iFTRP4D0Sl', 'VuGRk3Hcj2', 'VsFRFYKs6P', 'jKJR6GGkQF', 'EhORUX9Du5', 'kc5RKwE9IP', 'EsdROmKPfZ', 'YAcRhmyqIh'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, ungGyadj3kweUfFhOD.cs High entropy of concatenated method names: 'ToString', 'Ok7uHwZfld', 'c1NutCew9G', 'dqEumware3', 'X5Nu3Qs1MF', 'jAcuSuWoJg', 'JJIupNImUU', 'yNWulVYg32', 'KQHufx6aFI', 'TsFu83uJ4a'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, zwktOcBtRG25EyF05A.cs High entropy of concatenated method names: 'WIj5YeD0sg', 'wJI5WDdQif', 'ERC51HOurh', 'EBW5t7PIlf', 'CNW53CNZq8', 'V1l5S9TbH4', 'Mal5l3SueH', 'GUX5f8pPxF', 'Jam5aBQenl', 'f3C5HroIyA'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, fyBJnA47PFDPUrY7MM.cs High entropy of concatenated method names: 'Dispose', 'LQ0XToDhAW', 'WgCMtXUXqC', 'tDUAAVjfRx', 'T2KXgNnsRC', 'LJNXzmAfWq', 'ProcessDialogKey', 'vfXM2a3N88', 'ztuMX18m3o', 'WJGMMH18xK'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, yw2kqeehMuA8ix6S61.cs High entropy of concatenated method names: 'sGs0anNbuW', 'XQ10NiFdyG', 'Qwu0e5RLOb', 'l5J0yModel', 'k0k0t9FUmL', 'BYy0mMLU2y', 'NeD03yqY2Z', 'r8K0SXvT6R', 'CNt0pfdnNR', 'K5G0lfxCUK'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, eWaGr1GlYIqflv0XjW.cs High entropy of concatenated method names: 'h8kkLjp5pf', 'RrEkbYPX6H', 'mghPmFCHHc', 'KL8P3gKcc0', 'wEsPSKx5wg', 'ImqPpcVSYt', 'eAiPldTkFE', 'LvSPfquUuI', 'KKEP81Hkmo', 'MYtPaH5CTQ'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, z4sGsw1Z1CEdqFou2M.cs High entropy of concatenated method names: 'RfKFrCH2E3', 'A3QF4ZacWZ', 'kRSFkDmjEW', 'x0pF6QUWWQ', 'pKIFU1w06q', 'uV6k7rR0j1', 'RqPknOOM3D', 'UTYkEcQlq2', 'x6OkViXiIg', 'uvnkTG7PfG'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, O18xKxgJqHQNNkpSib.cs High entropy of concatenated method names: 'ULUIXMF4im', 'H4qIjytDi4', 'd1FI95N6EB', 'gkVIAGOdg0', 'dvlI42CrrA', 'IROIkvs87R', 'oVtIFIhPpC', 'fr4REl6afq', 'OviRVO1bon', 'lhgRT2K0Ak'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, aTjkFcXjE1tol7hKHl8.cs High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'jbHQeZQItB', 'PAcQy2FBTy', 'R8kQdFQZwm', 'fLbQcdc9Xi', 'yCRQ7Pt3ND', 'Mb8Qnylg85', 'PRxQE2qRbH'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, V8PwcoX2UxgibwWX6lg.cs High entropy of concatenated method names: 'gwAIJ35faH', 'LN4Ix573FH', 'MoxIqQG5HQ', 'DVLIDF1YrI', 'NQyILjmULA', 'kp9IijNpSk', 'LllIb8g1M5', 'tF9IY6vcTy', 'EGeIWcXpFK', 'qQvIG1Ktap'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, QCMdZSMUiyxjUBPGg7.cs High entropy of concatenated method names: 'R8uqbPwkm', 'tDdDxgXg9', 'HZkiZtyIW', 'C3AbVRP3P', 'HF4WO4h0S', 'VMAGxwMd4', 'tXHLOFoQIZKV2CW9AL', 'uLxodbROYSqt1yiFCG', 'GLvR3NERB', 'ckRQxQU1B'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, WuQWPVnccAOMVU5SBt.cs High entropy of concatenated method names: 'HDqwVEpD5i', 'hMjwgS0Y4u', 'oSJR2ZJC5B', 'ThhRXdfBSE', 'oDWwH8t8O2', 'PwLwNydWSf', 'oR3wBDCcXd', 'gDBwey0kSu', 'oQZwyBahbm', 'JbHwdhKG1N'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, LDl5nPYufdFH3nVylB.cs High entropy of concatenated method names: 'vil4eRved5', 'pGR4yVvbPM', 'N9Y4dPSiXM', 'J6F4cWKJo9', 'ABB47LDFpc', 'Wu64nHo1vd', 'lt54E1Bwik', 'QWn4Vs7POR', 'u6X4TUOC7M', 'zA24g1DZK8'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, BQrxGT8pP9gJrmxrsh.cs High entropy of concatenated method names: 'FGy6J6v4lb', 'R1l6xqLVSZ', 'cqZ6qYFd3t', 'Qj16DJ5HCa', 'mI06LxgvqG', 'RcB6i41CNs', 'R4a6biuBRU', 'z346YcIDkf', 'LCj6W5F84M', 'wc26G1Iqg4'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, PlItGS92uBjpgRuUCT.cs High entropy of concatenated method names: 'WAfX6Dl5nP', 'pfdXUFH3nV', 'U5mXOcV2JU', 'USvXhurWaG', 'w0XX0jWq4s', 'FswXuZ1CEd', 'uslxavlmufF4Tin0jy', 'ycovvUAqKfuXcHMy3M', 'hBBXXJWeUG', 'rOlXjIhIj5'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, qIUTxLzvQK6sRcgxxP.cs High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'NEgI5vGAL5', 'EwrI0PdhQ9', 'dP7IuC10Is', 'acTIwG3JIu', 'fhEIRothww', 'S95II6R8BX', 'Il9IQHYro4'
Source: 0.2.vTHGfiwMDeoOH5a.exe.3c13290.2.raw.unpack, uiKGN9lRraX3UpGJ5h.cs High entropy of concatenated method names: 'Fim6AZ9627', 'VT86PIr48c', 'Cla6FGsTd9', 'JNGFgVYeGx', 'D4wFzd51lm', 'jw362mQDG2', 'igp6XN3NLj', 'i506MmXxcW', 'wPl6j53U1Q', 'aWT69SJp8P'

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1 Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: Yara match File source: Process Memory Space: vTHGfiwMDeoOH5a.exe PID: 6640, type: MEMORYSTR
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Memory allocated: 10A0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Memory allocated: 2AF0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Memory allocated: 10A0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Memory allocated: 7A10000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Memory allocated: 8A10000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Memory allocated: 8BC0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Memory allocated: 9BC0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0041AA8F rdtsc 3_2_0041AA8F
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 7610 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 1762 Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe API coverage: 0.6 %
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe TID: 6720 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4296 Thread sleep time: -2767011611056431s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2412 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe TID: 5780 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1736350267.0000000000D68000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: vTHGfiwMDeoOH5a.exe, 00000000.00000002.1736350267.0000000000D68000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} /
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0041AA8F rdtsc 3_2_0041AA8F
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_00417983 LdrLoadDll, 3_2_00417983
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A8158 mov eax, dword ptr fs:[00000030h] 3_2_015A8158
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01516154 mov eax, dword ptr fs:[00000030h] 3_2_01516154
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01516154 mov eax, dword ptr fs:[00000030h] 3_2_01516154
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150C156 mov eax, dword ptr fs:[00000030h] 3_2_0150C156
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A4144 mov eax, dword ptr fs:[00000030h] 3_2_015A4144
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A4144 mov eax, dword ptr fs:[00000030h] 3_2_015A4144
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A4144 mov ecx, dword ptr fs:[00000030h] 3_2_015A4144
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A4144 mov eax, dword ptr fs:[00000030h] 3_2_015A4144
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A4144 mov eax, dword ptr fs:[00000030h] 3_2_015A4144
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E4164 mov eax, dword ptr fs:[00000030h] 3_2_015E4164
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E4164 mov eax, dword ptr fs:[00000030h] 3_2_015E4164
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BA118 mov ecx, dword ptr fs:[00000030h] 3_2_015BA118
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BA118 mov eax, dword ptr fs:[00000030h] 3_2_015BA118
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BA118 mov eax, dword ptr fs:[00000030h] 3_2_015BA118
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BA118 mov eax, dword ptr fs:[00000030h] 3_2_015BA118
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D0115 mov eax, dword ptr fs:[00000030h] 3_2_015D0115
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BE10E mov eax, dword ptr fs:[00000030h] 3_2_015BE10E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BE10E mov ecx, dword ptr fs:[00000030h] 3_2_015BE10E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BE10E mov eax, dword ptr fs:[00000030h] 3_2_015BE10E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BE10E mov eax, dword ptr fs:[00000030h] 3_2_015BE10E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BE10E mov ecx, dword ptr fs:[00000030h] 3_2_015BE10E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BE10E mov eax, dword ptr fs:[00000030h] 3_2_015BE10E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BE10E mov eax, dword ptr fs:[00000030h] 3_2_015BE10E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BE10E mov ecx, dword ptr fs:[00000030h] 3_2_015BE10E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BE10E mov eax, dword ptr fs:[00000030h] 3_2_015BE10E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BE10E mov ecx, dword ptr fs:[00000030h] 3_2_015BE10E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01540124 mov eax, dword ptr fs:[00000030h] 3_2_01540124
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158E1D0 mov eax, dword ptr fs:[00000030h] 3_2_0158E1D0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158E1D0 mov eax, dword ptr fs:[00000030h] 3_2_0158E1D0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158E1D0 mov ecx, dword ptr fs:[00000030h] 3_2_0158E1D0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158E1D0 mov eax, dword ptr fs:[00000030h] 3_2_0158E1D0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158E1D0 mov eax, dword ptr fs:[00000030h] 3_2_0158E1D0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D61C3 mov eax, dword ptr fs:[00000030h] 3_2_015D61C3
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D61C3 mov eax, dword ptr fs:[00000030h] 3_2_015D61C3
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015401F8 mov eax, dword ptr fs:[00000030h] 3_2_015401F8
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E61E5 mov eax, dword ptr fs:[00000030h] 3_2_015E61E5
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159019F mov eax, dword ptr fs:[00000030h] 3_2_0159019F
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159019F mov eax, dword ptr fs:[00000030h] 3_2_0159019F
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159019F mov eax, dword ptr fs:[00000030h] 3_2_0159019F
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159019F mov eax, dword ptr fs:[00000030h] 3_2_0159019F
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150A197 mov eax, dword ptr fs:[00000030h] 3_2_0150A197
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150A197 mov eax, dword ptr fs:[00000030h] 3_2_0150A197
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150A197 mov eax, dword ptr fs:[00000030h] 3_2_0150A197
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01550185 mov eax, dword ptr fs:[00000030h] 3_2_01550185
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015CC188 mov eax, dword ptr fs:[00000030h] 3_2_015CC188
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015CC188 mov eax, dword ptr fs:[00000030h] 3_2_015CC188
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B4180 mov eax, dword ptr fs:[00000030h] 3_2_015B4180
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B4180 mov eax, dword ptr fs:[00000030h] 3_2_015B4180
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01512050 mov eax, dword ptr fs:[00000030h] 3_2_01512050
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01596050 mov eax, dword ptr fs:[00000030h] 3_2_01596050
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153C073 mov eax, dword ptr fs:[00000030h] 3_2_0153C073
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152E016 mov eax, dword ptr fs:[00000030h] 3_2_0152E016
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152E016 mov eax, dword ptr fs:[00000030h] 3_2_0152E016
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152E016 mov eax, dword ptr fs:[00000030h] 3_2_0152E016
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152E016 mov eax, dword ptr fs:[00000030h] 3_2_0152E016
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01594000 mov ecx, dword ptr fs:[00000030h] 3_2_01594000
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B2000 mov eax, dword ptr fs:[00000030h] 3_2_015B2000
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B2000 mov eax, dword ptr fs:[00000030h] 3_2_015B2000
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B2000 mov eax, dword ptr fs:[00000030h] 3_2_015B2000
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B2000 mov eax, dword ptr fs:[00000030h] 3_2_015B2000
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B2000 mov eax, dword ptr fs:[00000030h] 3_2_015B2000
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B2000 mov eax, dword ptr fs:[00000030h] 3_2_015B2000
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B2000 mov eax, dword ptr fs:[00000030h] 3_2_015B2000
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B2000 mov eax, dword ptr fs:[00000030h] 3_2_015B2000
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A6030 mov eax, dword ptr fs:[00000030h] 3_2_015A6030
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150A020 mov eax, dword ptr fs:[00000030h] 3_2_0150A020
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150C020 mov eax, dword ptr fs:[00000030h] 3_2_0150C020
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015920DE mov eax, dword ptr fs:[00000030h] 3_2_015920DE
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150C0F0 mov eax, dword ptr fs:[00000030h] 3_2_0150C0F0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015520F0 mov ecx, dword ptr fs:[00000030h] 3_2_015520F0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150A0E3 mov ecx, dword ptr fs:[00000030h] 3_2_0150A0E3
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015180E9 mov eax, dword ptr fs:[00000030h] 3_2_015180E9
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015960E0 mov eax, dword ptr fs:[00000030h] 3_2_015960E0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151208A mov eax, dword ptr fs:[00000030h] 3_2_0151208A
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D60B8 mov eax, dword ptr fs:[00000030h] 3_2_015D60B8
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D60B8 mov ecx, dword ptr fs:[00000030h] 3_2_015D60B8
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015080A0 mov eax, dword ptr fs:[00000030h] 3_2_015080A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A80A8 mov eax, dword ptr fs:[00000030h] 3_2_015A80A8
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159035C mov eax, dword ptr fs:[00000030h] 3_2_0159035C
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159035C mov eax, dword ptr fs:[00000030h] 3_2_0159035C
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159035C mov eax, dword ptr fs:[00000030h] 3_2_0159035C
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159035C mov ecx, dword ptr fs:[00000030h] 3_2_0159035C
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159035C mov eax, dword ptr fs:[00000030h] 3_2_0159035C
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159035C mov eax, dword ptr fs:[00000030h] 3_2_0159035C
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B8350 mov ecx, dword ptr fs:[00000030h] 3_2_015B8350
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015DA352 mov eax, dword ptr fs:[00000030h] 3_2_015DA352
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01592349 mov eax, dword ptr fs:[00000030h] 3_2_01592349
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01592349 mov eax, dword ptr fs:[00000030h] 3_2_01592349
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01592349 mov eax, dword ptr fs:[00000030h] 3_2_01592349
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01592349 mov eax, dword ptr fs:[00000030h] 3_2_01592349
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01592349 mov eax, dword ptr fs:[00000030h] 3_2_01592349
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01592349 mov eax, dword ptr fs:[00000030h] 3_2_01592349
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01592349 mov eax, dword ptr fs:[00000030h] 3_2_01592349
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01592349 mov eax, dword ptr fs:[00000030h] 3_2_01592349
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01592349 mov eax, dword ptr fs:[00000030h] 3_2_01592349
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01592349 mov eax, dword ptr fs:[00000030h] 3_2_01592349
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01592349 mov eax, dword ptr fs:[00000030h] 3_2_01592349
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01592349 mov eax, dword ptr fs:[00000030h] 3_2_01592349
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01592349 mov eax, dword ptr fs:[00000030h] 3_2_01592349
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01592349 mov eax, dword ptr fs:[00000030h] 3_2_01592349
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01592349 mov eax, dword ptr fs:[00000030h] 3_2_01592349
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E634F mov eax, dword ptr fs:[00000030h] 3_2_015E634F
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B437C mov eax, dword ptr fs:[00000030h] 3_2_015B437C
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150C310 mov ecx, dword ptr fs:[00000030h] 3_2_0150C310
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01530310 mov ecx, dword ptr fs:[00000030h] 3_2_01530310
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154A30B mov eax, dword ptr fs:[00000030h] 3_2_0154A30B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154A30B mov eax, dword ptr fs:[00000030h] 3_2_0154A30B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154A30B mov eax, dword ptr fs:[00000030h] 3_2_0154A30B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E8324 mov eax, dword ptr fs:[00000030h] 3_2_015E8324
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E8324 mov ecx, dword ptr fs:[00000030h] 3_2_015E8324
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E8324 mov eax, dword ptr fs:[00000030h] 3_2_015E8324
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E8324 mov eax, dword ptr fs:[00000030h] 3_2_015E8324
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BE3DB mov eax, dword ptr fs:[00000030h] 3_2_015BE3DB
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BE3DB mov eax, dword ptr fs:[00000030h] 3_2_015BE3DB
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BE3DB mov ecx, dword ptr fs:[00000030h] 3_2_015BE3DB
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BE3DB mov eax, dword ptr fs:[00000030h] 3_2_015BE3DB
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B43D4 mov eax, dword ptr fs:[00000030h] 3_2_015B43D4
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B43D4 mov eax, dword ptr fs:[00000030h] 3_2_015B43D4
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015CC3CD mov eax, dword ptr fs:[00000030h] 3_2_015CC3CD
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151A3C0 mov eax, dword ptr fs:[00000030h] 3_2_0151A3C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151A3C0 mov eax, dword ptr fs:[00000030h] 3_2_0151A3C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151A3C0 mov eax, dword ptr fs:[00000030h] 3_2_0151A3C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151A3C0 mov eax, dword ptr fs:[00000030h] 3_2_0151A3C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151A3C0 mov eax, dword ptr fs:[00000030h] 3_2_0151A3C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151A3C0 mov eax, dword ptr fs:[00000030h] 3_2_0151A3C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015183C0 mov eax, dword ptr fs:[00000030h] 3_2_015183C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015183C0 mov eax, dword ptr fs:[00000030h] 3_2_015183C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015183C0 mov eax, dword ptr fs:[00000030h] 3_2_015183C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015183C0 mov eax, dword ptr fs:[00000030h] 3_2_015183C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015963C0 mov eax, dword ptr fs:[00000030h] 3_2_015963C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152E3F0 mov eax, dword ptr fs:[00000030h] 3_2_0152E3F0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152E3F0 mov eax, dword ptr fs:[00000030h] 3_2_0152E3F0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152E3F0 mov eax, dword ptr fs:[00000030h] 3_2_0152E3F0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015463FF mov eax, dword ptr fs:[00000030h] 3_2_015463FF
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015203E9 mov eax, dword ptr fs:[00000030h] 3_2_015203E9
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015203E9 mov eax, dword ptr fs:[00000030h] 3_2_015203E9
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015203E9 mov eax, dword ptr fs:[00000030h] 3_2_015203E9
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015203E9 mov eax, dword ptr fs:[00000030h] 3_2_015203E9
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015203E9 mov eax, dword ptr fs:[00000030h] 3_2_015203E9
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015203E9 mov eax, dword ptr fs:[00000030h] 3_2_015203E9
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015203E9 mov eax, dword ptr fs:[00000030h] 3_2_015203E9
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015203E9 mov eax, dword ptr fs:[00000030h] 3_2_015203E9
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01508397 mov eax, dword ptr fs:[00000030h] 3_2_01508397
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01508397 mov eax, dword ptr fs:[00000030h] 3_2_01508397
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01508397 mov eax, dword ptr fs:[00000030h] 3_2_01508397
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150E388 mov eax, dword ptr fs:[00000030h] 3_2_0150E388
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150E388 mov eax, dword ptr fs:[00000030h] 3_2_0150E388
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150E388 mov eax, dword ptr fs:[00000030h] 3_2_0150E388
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153438F mov eax, dword ptr fs:[00000030h] 3_2_0153438F
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153438F mov eax, dword ptr fs:[00000030h] 3_2_0153438F
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150A250 mov eax, dword ptr fs:[00000030h] 3_2_0150A250
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E625D mov eax, dword ptr fs:[00000030h] 3_2_015E625D
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01516259 mov eax, dword ptr fs:[00000030h] 3_2_01516259
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015CA250 mov eax, dword ptr fs:[00000030h] 3_2_015CA250
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015CA250 mov eax, dword ptr fs:[00000030h] 3_2_015CA250
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01598243 mov eax, dword ptr fs:[00000030h] 3_2_01598243
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01598243 mov ecx, dword ptr fs:[00000030h] 3_2_01598243
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C0274 mov eax, dword ptr fs:[00000030h] 3_2_015C0274
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C0274 mov eax, dword ptr fs:[00000030h] 3_2_015C0274
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C0274 mov eax, dword ptr fs:[00000030h] 3_2_015C0274
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C0274 mov eax, dword ptr fs:[00000030h] 3_2_015C0274
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C0274 mov eax, dword ptr fs:[00000030h] 3_2_015C0274
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C0274 mov eax, dword ptr fs:[00000030h] 3_2_015C0274
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C0274 mov eax, dword ptr fs:[00000030h] 3_2_015C0274
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C0274 mov eax, dword ptr fs:[00000030h] 3_2_015C0274
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C0274 mov eax, dword ptr fs:[00000030h] 3_2_015C0274
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C0274 mov eax, dword ptr fs:[00000030h] 3_2_015C0274
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C0274 mov eax, dword ptr fs:[00000030h] 3_2_015C0274
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C0274 mov eax, dword ptr fs:[00000030h] 3_2_015C0274
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01514260 mov eax, dword ptr fs:[00000030h] 3_2_01514260
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01514260 mov eax, dword ptr fs:[00000030h] 3_2_01514260
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01514260 mov eax, dword ptr fs:[00000030h] 3_2_01514260
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150826B mov eax, dword ptr fs:[00000030h] 3_2_0150826B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150823B mov eax, dword ptr fs:[00000030h] 3_2_0150823B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E62D6 mov eax, dword ptr fs:[00000030h] 3_2_015E62D6
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151A2C3 mov eax, dword ptr fs:[00000030h] 3_2_0151A2C3
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151A2C3 mov eax, dword ptr fs:[00000030h] 3_2_0151A2C3
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151A2C3 mov eax, dword ptr fs:[00000030h] 3_2_0151A2C3
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151A2C3 mov eax, dword ptr fs:[00000030h] 3_2_0151A2C3
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151A2C3 mov eax, dword ptr fs:[00000030h] 3_2_0151A2C3
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015202E1 mov eax, dword ptr fs:[00000030h] 3_2_015202E1
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015202E1 mov eax, dword ptr fs:[00000030h] 3_2_015202E1
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015202E1 mov eax, dword ptr fs:[00000030h] 3_2_015202E1
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154E284 mov eax, dword ptr fs:[00000030h] 3_2_0154E284
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154E284 mov eax, dword ptr fs:[00000030h] 3_2_0154E284
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01590283 mov eax, dword ptr fs:[00000030h] 3_2_01590283
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01590283 mov eax, dword ptr fs:[00000030h] 3_2_01590283
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01590283 mov eax, dword ptr fs:[00000030h] 3_2_01590283
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015202A0 mov eax, dword ptr fs:[00000030h] 3_2_015202A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015202A0 mov eax, dword ptr fs:[00000030h] 3_2_015202A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A62A0 mov eax, dword ptr fs:[00000030h] 3_2_015A62A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A62A0 mov ecx, dword ptr fs:[00000030h] 3_2_015A62A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A62A0 mov eax, dword ptr fs:[00000030h] 3_2_015A62A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A62A0 mov eax, dword ptr fs:[00000030h] 3_2_015A62A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A62A0 mov eax, dword ptr fs:[00000030h] 3_2_015A62A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A62A0 mov eax, dword ptr fs:[00000030h] 3_2_015A62A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01518550 mov eax, dword ptr fs:[00000030h] 3_2_01518550
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01518550 mov eax, dword ptr fs:[00000030h] 3_2_01518550
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154656A mov eax, dword ptr fs:[00000030h] 3_2_0154656A
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154656A mov eax, dword ptr fs:[00000030h] 3_2_0154656A
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154656A mov eax, dword ptr fs:[00000030h] 3_2_0154656A
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A6500 mov eax, dword ptr fs:[00000030h] 3_2_015A6500
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E4500 mov eax, dword ptr fs:[00000030h] 3_2_015E4500
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E4500 mov eax, dword ptr fs:[00000030h] 3_2_015E4500
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E4500 mov eax, dword ptr fs:[00000030h] 3_2_015E4500
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E4500 mov eax, dword ptr fs:[00000030h] 3_2_015E4500
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E4500 mov eax, dword ptr fs:[00000030h] 3_2_015E4500
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E4500 mov eax, dword ptr fs:[00000030h] 3_2_015E4500
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E4500 mov eax, dword ptr fs:[00000030h] 3_2_015E4500
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520535 mov eax, dword ptr fs:[00000030h] 3_2_01520535
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520535 mov eax, dword ptr fs:[00000030h] 3_2_01520535
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520535 mov eax, dword ptr fs:[00000030h] 3_2_01520535
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520535 mov eax, dword ptr fs:[00000030h] 3_2_01520535
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520535 mov eax, dword ptr fs:[00000030h] 3_2_01520535
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520535 mov eax, dword ptr fs:[00000030h] 3_2_01520535
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153E53E mov eax, dword ptr fs:[00000030h] 3_2_0153E53E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153E53E mov eax, dword ptr fs:[00000030h] 3_2_0153E53E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153E53E mov eax, dword ptr fs:[00000030h] 3_2_0153E53E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153E53E mov eax, dword ptr fs:[00000030h] 3_2_0153E53E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153E53E mov eax, dword ptr fs:[00000030h] 3_2_0153E53E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015165D0 mov eax, dword ptr fs:[00000030h] 3_2_015165D0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154A5D0 mov eax, dword ptr fs:[00000030h] 3_2_0154A5D0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154A5D0 mov eax, dword ptr fs:[00000030h] 3_2_0154A5D0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154E5CF mov eax, dword ptr fs:[00000030h] 3_2_0154E5CF
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154E5CF mov eax, dword ptr fs:[00000030h] 3_2_0154E5CF
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015125E0 mov eax, dword ptr fs:[00000030h] 3_2_015125E0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153E5E7 mov eax, dword ptr fs:[00000030h] 3_2_0153E5E7
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153E5E7 mov eax, dword ptr fs:[00000030h] 3_2_0153E5E7
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153E5E7 mov eax, dword ptr fs:[00000030h] 3_2_0153E5E7
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153E5E7 mov eax, dword ptr fs:[00000030h] 3_2_0153E5E7
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153E5E7 mov eax, dword ptr fs:[00000030h] 3_2_0153E5E7
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153E5E7 mov eax, dword ptr fs:[00000030h] 3_2_0153E5E7
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153E5E7 mov eax, dword ptr fs:[00000030h] 3_2_0153E5E7
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153E5E7 mov eax, dword ptr fs:[00000030h] 3_2_0153E5E7
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154C5ED mov eax, dword ptr fs:[00000030h] 3_2_0154C5ED
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154C5ED mov eax, dword ptr fs:[00000030h] 3_2_0154C5ED
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154E59C mov eax, dword ptr fs:[00000030h] 3_2_0154E59C
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01512582 mov eax, dword ptr fs:[00000030h] 3_2_01512582
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01512582 mov ecx, dword ptr fs:[00000030h] 3_2_01512582
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01544588 mov eax, dword ptr fs:[00000030h] 3_2_01544588
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015345B1 mov eax, dword ptr fs:[00000030h] 3_2_015345B1
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015345B1 mov eax, dword ptr fs:[00000030h] 3_2_015345B1
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015905A7 mov eax, dword ptr fs:[00000030h] 3_2_015905A7
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015905A7 mov eax, dword ptr fs:[00000030h] 3_2_015905A7
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015905A7 mov eax, dword ptr fs:[00000030h] 3_2_015905A7
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153245A mov eax, dword ptr fs:[00000030h] 3_2_0153245A
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015CA456 mov eax, dword ptr fs:[00000030h] 3_2_015CA456
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150645D mov eax, dword ptr fs:[00000030h] 3_2_0150645D
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154E443 mov eax, dword ptr fs:[00000030h] 3_2_0154E443
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154E443 mov eax, dword ptr fs:[00000030h] 3_2_0154E443
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154E443 mov eax, dword ptr fs:[00000030h] 3_2_0154E443
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154E443 mov eax, dword ptr fs:[00000030h] 3_2_0154E443
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154E443 mov eax, dword ptr fs:[00000030h] 3_2_0154E443
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154E443 mov eax, dword ptr fs:[00000030h] 3_2_0154E443
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154E443 mov eax, dword ptr fs:[00000030h] 3_2_0154E443
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154E443 mov eax, dword ptr fs:[00000030h] 3_2_0154E443
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153A470 mov eax, dword ptr fs:[00000030h] 3_2_0153A470
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153A470 mov eax, dword ptr fs:[00000030h] 3_2_0153A470
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153A470 mov eax, dword ptr fs:[00000030h] 3_2_0153A470
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159C460 mov ecx, dword ptr fs:[00000030h] 3_2_0159C460
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01548402 mov eax, dword ptr fs:[00000030h] 3_2_01548402
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01548402 mov eax, dword ptr fs:[00000030h] 3_2_01548402
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01548402 mov eax, dword ptr fs:[00000030h] 3_2_01548402
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154A430 mov eax, dword ptr fs:[00000030h] 3_2_0154A430
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150E420 mov eax, dword ptr fs:[00000030h] 3_2_0150E420
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150E420 mov eax, dword ptr fs:[00000030h] 3_2_0150E420
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150E420 mov eax, dword ptr fs:[00000030h] 3_2_0150E420
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150C427 mov eax, dword ptr fs:[00000030h] 3_2_0150C427
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01596420 mov eax, dword ptr fs:[00000030h] 3_2_01596420
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01596420 mov eax, dword ptr fs:[00000030h] 3_2_01596420
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01596420 mov eax, dword ptr fs:[00000030h] 3_2_01596420
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01596420 mov eax, dword ptr fs:[00000030h] 3_2_01596420
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01596420 mov eax, dword ptr fs:[00000030h] 3_2_01596420
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01596420 mov eax, dword ptr fs:[00000030h] 3_2_01596420
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01596420 mov eax, dword ptr fs:[00000030h] 3_2_01596420
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015104E5 mov ecx, dword ptr fs:[00000030h] 3_2_015104E5
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015CA49A mov eax, dword ptr fs:[00000030h] 3_2_015CA49A
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015444B0 mov ecx, dword ptr fs:[00000030h] 3_2_015444B0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159A4B0 mov eax, dword ptr fs:[00000030h] 3_2_0159A4B0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015164AB mov eax, dword ptr fs:[00000030h] 3_2_015164AB
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01510750 mov eax, dword ptr fs:[00000030h] 3_2_01510750
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159E75D mov eax, dword ptr fs:[00000030h] 3_2_0159E75D
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552750 mov eax, dword ptr fs:[00000030h] 3_2_01552750
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552750 mov eax, dword ptr fs:[00000030h] 3_2_01552750
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01594755 mov eax, dword ptr fs:[00000030h] 3_2_01594755
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154674D mov esi, dword ptr fs:[00000030h] 3_2_0154674D
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154674D mov eax, dword ptr fs:[00000030h] 3_2_0154674D
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154674D mov eax, dword ptr fs:[00000030h] 3_2_0154674D
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01518770 mov eax, dword ptr fs:[00000030h] 3_2_01518770
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520770 mov eax, dword ptr fs:[00000030h] 3_2_01520770
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520770 mov eax, dword ptr fs:[00000030h] 3_2_01520770
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520770 mov eax, dword ptr fs:[00000030h] 3_2_01520770
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520770 mov eax, dword ptr fs:[00000030h] 3_2_01520770
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520770 mov eax, dword ptr fs:[00000030h] 3_2_01520770
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520770 mov eax, dword ptr fs:[00000030h] 3_2_01520770
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520770 mov eax, dword ptr fs:[00000030h] 3_2_01520770
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520770 mov eax, dword ptr fs:[00000030h] 3_2_01520770
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520770 mov eax, dword ptr fs:[00000030h] 3_2_01520770
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520770 mov eax, dword ptr fs:[00000030h] 3_2_01520770
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520770 mov eax, dword ptr fs:[00000030h] 3_2_01520770
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520770 mov eax, dword ptr fs:[00000030h] 3_2_01520770
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01510710 mov eax, dword ptr fs:[00000030h] 3_2_01510710
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01540710 mov eax, dword ptr fs:[00000030h] 3_2_01540710
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154C700 mov eax, dword ptr fs:[00000030h] 3_2_0154C700
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154273C mov eax, dword ptr fs:[00000030h] 3_2_0154273C
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154273C mov ecx, dword ptr fs:[00000030h] 3_2_0154273C
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154273C mov eax, dword ptr fs:[00000030h] 3_2_0154273C
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158C730 mov eax, dword ptr fs:[00000030h] 3_2_0158C730
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154C720 mov eax, dword ptr fs:[00000030h] 3_2_0154C720
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154C720 mov eax, dword ptr fs:[00000030h] 3_2_0154C720
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151C7C0 mov eax, dword ptr fs:[00000030h] 3_2_0151C7C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015907C3 mov eax, dword ptr fs:[00000030h] 3_2_015907C3
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015147FB mov eax, dword ptr fs:[00000030h] 3_2_015147FB
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015147FB mov eax, dword ptr fs:[00000030h] 3_2_015147FB
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159E7E1 mov eax, dword ptr fs:[00000030h] 3_2_0159E7E1
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015327ED mov eax, dword ptr fs:[00000030h] 3_2_015327ED
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015327ED mov eax, dword ptr fs:[00000030h] 3_2_015327ED
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015327ED mov eax, dword ptr fs:[00000030h] 3_2_015327ED
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B678E mov eax, dword ptr fs:[00000030h] 3_2_015B678E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C47A0 mov eax, dword ptr fs:[00000030h] 3_2_015C47A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015107AF mov eax, dword ptr fs:[00000030h] 3_2_015107AF
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152C640 mov eax, dword ptr fs:[00000030h] 3_2_0152C640
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01542674 mov eax, dword ptr fs:[00000030h] 3_2_01542674
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D866E mov eax, dword ptr fs:[00000030h] 3_2_015D866E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D866E mov eax, dword ptr fs:[00000030h] 3_2_015D866E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154A660 mov eax, dword ptr fs:[00000030h] 3_2_0154A660
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154A660 mov eax, dword ptr fs:[00000030h] 3_2_0154A660
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01552619 mov eax, dword ptr fs:[00000030h] 3_2_01552619
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158E609 mov eax, dword ptr fs:[00000030h] 3_2_0158E609
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152260B mov eax, dword ptr fs:[00000030h] 3_2_0152260B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152260B mov eax, dword ptr fs:[00000030h] 3_2_0152260B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152260B mov eax, dword ptr fs:[00000030h] 3_2_0152260B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152260B mov eax, dword ptr fs:[00000030h] 3_2_0152260B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152260B mov eax, dword ptr fs:[00000030h] 3_2_0152260B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152260B mov eax, dword ptr fs:[00000030h] 3_2_0152260B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152260B mov eax, dword ptr fs:[00000030h] 3_2_0152260B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01546620 mov eax, dword ptr fs:[00000030h] 3_2_01546620
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01548620 mov eax, dword ptr fs:[00000030h] 3_2_01548620
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0152E627 mov eax, dword ptr fs:[00000030h] 3_2_0152E627
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151262C mov eax, dword ptr fs:[00000030h] 3_2_0151262C
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154A6C7 mov ebx, dword ptr fs:[00000030h] 3_2_0154A6C7
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154A6C7 mov eax, dword ptr fs:[00000030h] 3_2_0154A6C7
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015906F1 mov eax, dword ptr fs:[00000030h] 3_2_015906F1
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015906F1 mov eax, dword ptr fs:[00000030h] 3_2_015906F1
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158E6F2 mov eax, dword ptr fs:[00000030h] 3_2_0158E6F2
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158E6F2 mov eax, dword ptr fs:[00000030h] 3_2_0158E6F2
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158E6F2 mov eax, dword ptr fs:[00000030h] 3_2_0158E6F2
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158E6F2 mov eax, dword ptr fs:[00000030h] 3_2_0158E6F2
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01514690 mov eax, dword ptr fs:[00000030h] 3_2_01514690
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01514690 mov eax, dword ptr fs:[00000030h] 3_2_01514690
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015466B0 mov eax, dword ptr fs:[00000030h] 3_2_015466B0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154C6A6 mov eax, dword ptr fs:[00000030h] 3_2_0154C6A6
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E4940 mov eax, dword ptr fs:[00000030h] 3_2_015E4940
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01590946 mov eax, dword ptr fs:[00000030h] 3_2_01590946
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B4978 mov eax, dword ptr fs:[00000030h] 3_2_015B4978
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B4978 mov eax, dword ptr fs:[00000030h] 3_2_015B4978
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159C97C mov eax, dword ptr fs:[00000030h] 3_2_0159C97C
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01536962 mov eax, dword ptr fs:[00000030h] 3_2_01536962
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01536962 mov eax, dword ptr fs:[00000030h] 3_2_01536962
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01536962 mov eax, dword ptr fs:[00000030h] 3_2_01536962
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0155096E mov eax, dword ptr fs:[00000030h] 3_2_0155096E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0155096E mov edx, dword ptr fs:[00000030h] 3_2_0155096E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0155096E mov eax, dword ptr fs:[00000030h] 3_2_0155096E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01508918 mov eax, dword ptr fs:[00000030h] 3_2_01508918
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01508918 mov eax, dword ptr fs:[00000030h] 3_2_01508918
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159C912 mov eax, dword ptr fs:[00000030h] 3_2_0159C912
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158E908 mov eax, dword ptr fs:[00000030h] 3_2_0158E908
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158E908 mov eax, dword ptr fs:[00000030h] 3_2_0158E908
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A892B mov eax, dword ptr fs:[00000030h] 3_2_015A892B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159892A mov eax, dword ptr fs:[00000030h] 3_2_0159892A
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151A9D0 mov eax, dword ptr fs:[00000030h] 3_2_0151A9D0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151A9D0 mov eax, dword ptr fs:[00000030h] 3_2_0151A9D0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151A9D0 mov eax, dword ptr fs:[00000030h] 3_2_0151A9D0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151A9D0 mov eax, dword ptr fs:[00000030h] 3_2_0151A9D0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151A9D0 mov eax, dword ptr fs:[00000030h] 3_2_0151A9D0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151A9D0 mov eax, dword ptr fs:[00000030h] 3_2_0151A9D0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015449D0 mov eax, dword ptr fs:[00000030h] 3_2_015449D0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015DA9D3 mov eax, dword ptr fs:[00000030h] 3_2_015DA9D3
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A69C0 mov eax, dword ptr fs:[00000030h] 3_2_015A69C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015429F9 mov eax, dword ptr fs:[00000030h] 3_2_015429F9
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015429F9 mov eax, dword ptr fs:[00000030h] 3_2_015429F9
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159E9E0 mov eax, dword ptr fs:[00000030h] 3_2_0159E9E0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015989B3 mov esi, dword ptr fs:[00000030h] 3_2_015989B3
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015989B3 mov eax, dword ptr fs:[00000030h] 3_2_015989B3
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015989B3 mov eax, dword ptr fs:[00000030h] 3_2_015989B3
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015229A0 mov eax, dword ptr fs:[00000030h] 3_2_015229A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015229A0 mov eax, dword ptr fs:[00000030h] 3_2_015229A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015229A0 mov eax, dword ptr fs:[00000030h] 3_2_015229A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015229A0 mov eax, dword ptr fs:[00000030h] 3_2_015229A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015229A0 mov eax, dword ptr fs:[00000030h] 3_2_015229A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015229A0 mov eax, dword ptr fs:[00000030h] 3_2_015229A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015229A0 mov eax, dword ptr fs:[00000030h] 3_2_015229A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015229A0 mov eax, dword ptr fs:[00000030h] 3_2_015229A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015229A0 mov eax, dword ptr fs:[00000030h] 3_2_015229A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015229A0 mov eax, dword ptr fs:[00000030h] 3_2_015229A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015229A0 mov eax, dword ptr fs:[00000030h] 3_2_015229A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015229A0 mov eax, dword ptr fs:[00000030h] 3_2_015229A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015229A0 mov eax, dword ptr fs:[00000030h] 3_2_015229A0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015109AD mov eax, dword ptr fs:[00000030h] 3_2_015109AD
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015109AD mov eax, dword ptr fs:[00000030h] 3_2_015109AD
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01540854 mov eax, dword ptr fs:[00000030h] 3_2_01540854
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01514859 mov eax, dword ptr fs:[00000030h] 3_2_01514859
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01514859 mov eax, dword ptr fs:[00000030h] 3_2_01514859
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01522840 mov ecx, dword ptr fs:[00000030h] 3_2_01522840
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A6870 mov eax, dword ptr fs:[00000030h] 3_2_015A6870
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A6870 mov eax, dword ptr fs:[00000030h] 3_2_015A6870
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159E872 mov eax, dword ptr fs:[00000030h] 3_2_0159E872
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159E872 mov eax, dword ptr fs:[00000030h] 3_2_0159E872
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159C810 mov eax, dword ptr fs:[00000030h] 3_2_0159C810
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B483A mov eax, dword ptr fs:[00000030h] 3_2_015B483A
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B483A mov eax, dword ptr fs:[00000030h] 3_2_015B483A
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154A830 mov eax, dword ptr fs:[00000030h] 3_2_0154A830
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01532835 mov eax, dword ptr fs:[00000030h] 3_2_01532835
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01532835 mov eax, dword ptr fs:[00000030h] 3_2_01532835
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01532835 mov eax, dword ptr fs:[00000030h] 3_2_01532835
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01532835 mov ecx, dword ptr fs:[00000030h] 3_2_01532835
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01532835 mov eax, dword ptr fs:[00000030h] 3_2_01532835
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01532835 mov eax, dword ptr fs:[00000030h] 3_2_01532835
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153E8C0 mov eax, dword ptr fs:[00000030h] 3_2_0153E8C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E08C0 mov eax, dword ptr fs:[00000030h] 3_2_015E08C0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154C8F9 mov eax, dword ptr fs:[00000030h] 3_2_0154C8F9
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154C8F9 mov eax, dword ptr fs:[00000030h] 3_2_0154C8F9
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015DA8E4 mov eax, dword ptr fs:[00000030h] 3_2_015DA8E4
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159C89D mov eax, dword ptr fs:[00000030h] 3_2_0159C89D
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01510887 mov eax, dword ptr fs:[00000030h] 3_2_01510887
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01508B50 mov eax, dword ptr fs:[00000030h] 3_2_01508B50
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E2B57 mov eax, dword ptr fs:[00000030h] 3_2_015E2B57
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E2B57 mov eax, dword ptr fs:[00000030h] 3_2_015E2B57
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E2B57 mov eax, dword ptr fs:[00000030h] 3_2_015E2B57
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E2B57 mov eax, dword ptr fs:[00000030h] 3_2_015E2B57
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BEB50 mov eax, dword ptr fs:[00000030h] 3_2_015BEB50
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C4B4B mov eax, dword ptr fs:[00000030h] 3_2_015C4B4B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C4B4B mov eax, dword ptr fs:[00000030h] 3_2_015C4B4B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015B8B42 mov eax, dword ptr fs:[00000030h] 3_2_015B8B42
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A6B40 mov eax, dword ptr fs:[00000030h] 3_2_015A6B40
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015A6B40 mov eax, dword ptr fs:[00000030h] 3_2_015A6B40
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015DAB40 mov eax, dword ptr fs:[00000030h] 3_2_015DAB40
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0150CB7E mov eax, dword ptr fs:[00000030h] 3_2_0150CB7E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158EB1D mov eax, dword ptr fs:[00000030h] 3_2_0158EB1D
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158EB1D mov eax, dword ptr fs:[00000030h] 3_2_0158EB1D
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158EB1D mov eax, dword ptr fs:[00000030h] 3_2_0158EB1D
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158EB1D mov eax, dword ptr fs:[00000030h] 3_2_0158EB1D
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158EB1D mov eax, dword ptr fs:[00000030h] 3_2_0158EB1D
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158EB1D mov eax, dword ptr fs:[00000030h] 3_2_0158EB1D
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158EB1D mov eax, dword ptr fs:[00000030h] 3_2_0158EB1D
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158EB1D mov eax, dword ptr fs:[00000030h] 3_2_0158EB1D
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158EB1D mov eax, dword ptr fs:[00000030h] 3_2_0158EB1D
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015E4B00 mov eax, dword ptr fs:[00000030h] 3_2_015E4B00
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153EB20 mov eax, dword ptr fs:[00000030h] 3_2_0153EB20
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153EB20 mov eax, dword ptr fs:[00000030h] 3_2_0153EB20
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D8B28 mov eax, dword ptr fs:[00000030h] 3_2_015D8B28
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015D8B28 mov eax, dword ptr fs:[00000030h] 3_2_015D8B28
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BEBD0 mov eax, dword ptr fs:[00000030h] 3_2_015BEBD0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01530BCB mov eax, dword ptr fs:[00000030h] 3_2_01530BCB
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01530BCB mov eax, dword ptr fs:[00000030h] 3_2_01530BCB
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01530BCB mov eax, dword ptr fs:[00000030h] 3_2_01530BCB
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01510BCD mov eax, dword ptr fs:[00000030h] 3_2_01510BCD
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01510BCD mov eax, dword ptr fs:[00000030h] 3_2_01510BCD
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01510BCD mov eax, dword ptr fs:[00000030h] 3_2_01510BCD
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01518BF0 mov eax, dword ptr fs:[00000030h] 3_2_01518BF0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01518BF0 mov eax, dword ptr fs:[00000030h] 3_2_01518BF0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01518BF0 mov eax, dword ptr fs:[00000030h] 3_2_01518BF0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159CBF0 mov eax, dword ptr fs:[00000030h] 3_2_0159CBF0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153EBFC mov eax, dword ptr fs:[00000030h] 3_2_0153EBFC
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520BBE mov eax, dword ptr fs:[00000030h] 3_2_01520BBE
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520BBE mov eax, dword ptr fs:[00000030h] 3_2_01520BBE
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C4BB0 mov eax, dword ptr fs:[00000030h] 3_2_015C4BB0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015C4BB0 mov eax, dword ptr fs:[00000030h] 3_2_015C4BB0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01516A50 mov eax, dword ptr fs:[00000030h] 3_2_01516A50
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01516A50 mov eax, dword ptr fs:[00000030h] 3_2_01516A50
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01516A50 mov eax, dword ptr fs:[00000030h] 3_2_01516A50
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01516A50 mov eax, dword ptr fs:[00000030h] 3_2_01516A50
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01516A50 mov eax, dword ptr fs:[00000030h] 3_2_01516A50
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01516A50 mov eax, dword ptr fs:[00000030h] 3_2_01516A50
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01516A50 mov eax, dword ptr fs:[00000030h] 3_2_01516A50
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520A5B mov eax, dword ptr fs:[00000030h] 3_2_01520A5B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01520A5B mov eax, dword ptr fs:[00000030h] 3_2_01520A5B
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158CA72 mov eax, dword ptr fs:[00000030h] 3_2_0158CA72
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0158CA72 mov eax, dword ptr fs:[00000030h] 3_2_0158CA72
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154CA6F mov eax, dword ptr fs:[00000030h] 3_2_0154CA6F
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154CA6F mov eax, dword ptr fs:[00000030h] 3_2_0154CA6F
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154CA6F mov eax, dword ptr fs:[00000030h] 3_2_0154CA6F
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_015BEA60 mov eax, dword ptr fs:[00000030h] 3_2_015BEA60
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0159CA11 mov eax, dword ptr fs:[00000030h] 3_2_0159CA11
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01534A35 mov eax, dword ptr fs:[00000030h] 3_2_01534A35
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01534A35 mov eax, dword ptr fs:[00000030h] 3_2_01534A35
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154CA38 mov eax, dword ptr fs:[00000030h] 3_2_0154CA38
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154CA24 mov eax, dword ptr fs:[00000030h] 3_2_0154CA24
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0153EA2E mov eax, dword ptr fs:[00000030h] 3_2_0153EA2E
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01510AD0 mov eax, dword ptr fs:[00000030h] 3_2_01510AD0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01544AD0 mov eax, dword ptr fs:[00000030h] 3_2_01544AD0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01544AD0 mov eax, dword ptr fs:[00000030h] 3_2_01544AD0
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01566ACC mov eax, dword ptr fs:[00000030h] 3_2_01566ACC
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01566ACC mov eax, dword ptr fs:[00000030h] 3_2_01566ACC
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01566ACC mov eax, dword ptr fs:[00000030h] 3_2_01566ACC
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154AAEE mov eax, dword ptr fs:[00000030h] 3_2_0154AAEE
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0154AAEE mov eax, dword ptr fs:[00000030h] 3_2_0154AAEE
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_01548A90 mov edx, dword ptr fs:[00000030h] 3_2_01548A90
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151EA80 mov eax, dword ptr fs:[00000030h] 3_2_0151EA80
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Code function: 3_2_0151EA80 mov eax, dword ptr fs:[00000030h] 3_2_0151EA80
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe"
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe" Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Memory written: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe" Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Process created: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe "C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe" Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\flat_officeFontsPreview.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: 3.2.vTHGfiwMDeoOH5a.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.vTHGfiwMDeoOH5a.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000003.00000002.1818968282.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1819365139.0000000000FF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

Remote Access Functionality

barindex
Source: Yara match File source: 3.2.vTHGfiwMDeoOH5a.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.vTHGfiwMDeoOH5a.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000003.00000002.1818968282.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1819365139.0000000000FF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
No contacted IP infos