Windows Analysis Report
jyU2NpOg5L.exe

Overview

General Information

Sample name: jyU2NpOg5L.exe
renamed because original name is a hash value
Original sample name: da6dc2aa7debc477cac388afed610cb6.exe
Analysis ID: 1528054
MD5: da6dc2aa7debc477cac388afed610cb6
SHA1: bcd158f451086583aad3f0d5d99fa5ad0d72c31b
SHA256: 38e5b4b58195827c00f0dc4cfc31bd70bef392a6d9b2bf62b01b9eb4f50e5f82
Tags: 32exetrojan
Infos:

Detection

Socks5Systemz
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
Found API chain indicative of debugger detection
Machine Learning detection for dropped file
PE file has a writeable .text section
Binary contains a suspicious time stamp
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

AV Detection

barindex
Source: jyU2NpOg5L.exe Avira: detected
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Avira: detection malicious, Label: HEUR/AGEN.1329998
Source: C:\ProgramData\ET Ammeter Side 10.7.46\ET Ammeter Side 10.7.46.exe Avira: detection malicious, Label: HEUR/AGEN.1329998
Source: jennyvideoconverter32.exe.7416.2.memstrmin Malware Configuration Extractor: Socks5Systemz {"C2 list": ["gwbnnsd.com"]}
Source: jyU2NpOg5L.exe ReversingLabs: Detection: 21%
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Joe Sandbox ML: detected
Source: C:\ProgramData\ET Ammeter Side 10.7.46\ET Ammeter Side 10.7.46.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0045D4EC GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion, 1_2_0045D4EC
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0045D5A0 ArcFourCrypt, 1_2_0045D5A0
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0045D5B8 ArcFourCrypt, 1_2_0045D5B8
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_10001000 ISCryptGetVersion, 1_2_10001000
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_10001130 ArcFourCrypt, 1_2_10001130

Compliance

barindex
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Unpacked PE file: 2.2.jennyvideoconverter32.exe.400000.0.unpack
Source: jyU2NpOg5L.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00452A4C FindFirstFileA,GetLastError, 1_2_00452A4C
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004751F8 FindFirstFileA,FindNextFileA,FindClose, 1_2_004751F8
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00464048 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode, 1_2_00464048
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004644C4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode, 1_2_004644C4
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00462ABC FindFirstFileA,FindNextFileA,FindClose, 1_2_00462ABC
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00497A74 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose, 1_2_00497A74

Networking

barindex
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59204 -> 185.196.8.214:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59204 -> 185.196.8.214:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59230 -> 185.196.8.214:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59230 -> 185.196.8.214:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59335 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59335 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59313 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59313 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59268 -> 185.196.8.214:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59268 -> 185.196.8.214:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59380 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59380 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59342 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59342 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59360 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59348 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59395 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59354 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59354 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59395 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59401 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59401 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59425 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59425 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59413 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59386 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59413 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59386 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59360 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59366 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59348 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59460 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59460 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59431 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59431 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59466 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59472 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59366 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59472 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59443 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59491 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59454 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59466 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59454 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59443 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59500 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59500 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59392 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59392 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59523 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59495 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59408 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59478 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59508 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59511 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59511 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59523 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59522 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59515 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59515 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59513 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59504 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59408 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59513 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59504 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59522 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59508 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59506 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59506 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59505 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59526 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59478 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59527 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59505 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59495 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59527 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59491 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59520 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59520 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59526 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59484 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59419 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59521 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59521 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59371 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59371 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59419 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59437 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59518 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59518 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59519 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59437 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59528 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59524 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59517 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59517 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59484 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59519 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59514 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59524 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59514 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59512 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59512 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59528 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59507 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59510 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59510 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59507 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59525 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59509 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59525 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59509 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:59516 -> 45.155.249.117:80
Source: Network traffic Suricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:59516 -> 45.155.249.117:80
Source: Malware configuration extractor URLs: gwbnnsd.com
Source: global traffic TCP traffic: 192.168.2.4:59318 -> 89.105.201.183:2023
Source: Joe Sandbox View IP Address: 45.155.249.117 45.155.249.117
Source: Joe Sandbox View IP Address: 185.196.8.214 185.196.8.214
Source: Joe Sandbox View IP Address: 89.105.201.183 89.105.201.183
Source: Joe Sandbox View ASN Name: MEER-ASmeerfarbigGmbHCoKGDE MEER-ASmeerfarbigGmbHCoKGDE
Source: Joe Sandbox View ASN Name: SIMPLECARRER2IT SIMPLECARRER2IT
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c445db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c0ea929c3a HTTP/1.1Host: bfjiqqr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c445db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c0ea929c3a HTTP/1.1Host: bfjiqqr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c445db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c0ea929c3a HTTP/1.1Host: bfjiqqr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c445db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c0ea929c3a HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: unknown TCP traffic detected without corresponding DNS query: 89.105.201.183
Source: unknown TCP traffic detected without corresponding DNS query: 89.105.201.183
Source: unknown TCP traffic detected without corresponding DNS query: 89.105.201.183
Source: unknown TCP traffic detected without corresponding DNS query: 89.105.201.183
Source: unknown TCP traffic detected without corresponding DNS query: 89.105.201.183
Source: unknown TCP traffic detected without corresponding DNS query: 89.105.201.183
Source: unknown TCP traffic detected without corresponding DNS query: 89.105.201.183
Source: unknown TCP traffic detected without corresponding DNS query: 89.105.201.183
Source: unknown TCP traffic detected without corresponding DNS query: 89.105.201.183
Source: unknown TCP traffic detected without corresponding DNS query: 89.105.201.183
Source: unknown UDP traffic detected without corresponding DNS query: 152.89.198.214
Source: unknown UDP traffic detected without corresponding DNS query: 141.98.234.31
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02D772AB Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_strtok,_swscanf,_strtok,_free,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_sprintf,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_free, 2_2_02D772AB
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c445db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c0ea929c3a HTTP/1.1Host: bfjiqqr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c445db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c0ea929c3a HTTP/1.1Host: bfjiqqr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c445db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c0ea929c3a HTTP/1.1Host: bfjiqqr.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c445db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c0ea929c3a HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic HTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017 HTTP/1.1Host: gwbnnsd.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Source: global traffic DNS traffic detected: DNS query: bfjiqqr.com
Source: global traffic DNS traffic detected: DNS query: gwbnnsd.com
Source: jennyvideoconverter32.exe, 00000002.00000002.2939825050.0000000000B08000.00000004.00000020.00020000.00000000.sdmp, jennyvideoconverter32.exe, 00000002.00000002.2939825050.0000000000B43000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.196.8.214/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df1
Source: jennyvideoconverter32.exe, 00000002.00000002.2939825050.0000000000B08000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://45.155.249.117/
Source: jennyvideoconverter32.exe, 00000002.00000002.2939825050.0000000000B43000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://45.155.249.117/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee9481
Source: jennyvideoconverter32.exe, 00000002.00000002.2941462665.0000000003376000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://45.155.249.117/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df
Source: jennyvideoconverter32.exe, 00000002.00000002.2939825050.0000000000B08000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://45.155.249.117/uFd
Source: jyU2NpOg5L.exe, 00000000.00000003.1677672249.0000000002360000.00000004.00001000.00020000.00000000.sdmp, jyU2NpOg5L.exe, 00000000.00000002.2939713687.0000000002138000.00000004.00001000.00020000.00000000.sdmp, jyU2NpOg5L.tmp, 00000001.00000002.2939894927.0000000002168000.00000004.00001000.00020000.00000000.sdmp, jyU2NpOg5L.tmp, 00000001.00000003.1679363434.0000000002170000.00000004.00001000.00020000.00000000.sdmp, jyU2NpOg5L.tmp, 00000001.00000003.1683355640.000000000073F000.00000004.00000020.00020000.00000000.sdmp, jyU2NpOg5L.tmp, 00000001.00000002.2939713077.000000000073F000.00000004.00000020.00020000.00000000.sdmp, jyU2NpOg5L.tmp, 00000001.00000003.1679261872.0000000003120000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://fsf.org/
Source: is-I1MM7.tmp.1.dr String found in binary or memory: http://mingw-w64.sourceforge.net/X
Source: is-95O1F.tmp.1.dr String found in binary or memory: http://tukaani.org/
Source: is-95O1F.tmp.1.dr String found in binary or memory: http://tukaani.org/xz/
Source: jyU2NpOg5L.exe, 00000000.00000003.1677672249.0000000002360000.00000004.00001000.00020000.00000000.sdmp, jyU2NpOg5L.exe, 00000000.00000002.2939713687.0000000002138000.00000004.00001000.00020000.00000000.sdmp, jyU2NpOg5L.tmp, 00000001.00000002.2939894927.0000000002168000.00000004.00001000.00020000.00000000.sdmp, jyU2NpOg5L.tmp, 00000001.00000003.1679363434.0000000002170000.00000004.00001000.00020000.00000000.sdmp, jyU2NpOg5L.tmp, 00000001.00000003.1683355640.000000000073F000.00000004.00000020.00020000.00000000.sdmp, jyU2NpOg5L.tmp, 00000001.00000002.2939713077.000000000073F000.00000004.00000020.00020000.00000000.sdmp, jyU2NpOg5L.tmp, 00000001.00000003.1679261872.0000000003120000.00000004.00001000.00020000.00000000.sdmp, is-H0NOD.tmp.1.dr String found in binary or memory: http://www.gnu.org/licenses/
Source: jyU2NpOg5L.tmp, jyU2NpOg5L.tmp, 00000001.00000000.1678528161.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-O41ML.tmp.1.dr, jyU2NpOg5L.tmp.0.dr String found in binary or memory: http://www.innosetup.com/
Source: jyU2NpOg5L.exe, 00000000.00000003.1678162647.0000000002144000.00000004.00001000.00020000.00000000.sdmp, jyU2NpOg5L.exe, 00000000.00000003.1678028969.0000000002360000.00000004.00001000.00020000.00000000.sdmp, jyU2NpOg5L.tmp, jyU2NpOg5L.tmp, 00000001.00000000.1678528161.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-O41ML.tmp.1.dr, jyU2NpOg5L.tmp.0.dr String found in binary or memory: http://www.remobjects.com/ps
Source: jyU2NpOg5L.exe, 00000000.00000003.1678162647.0000000002144000.00000004.00001000.00020000.00000000.sdmp, jyU2NpOg5L.exe, 00000000.00000003.1678028969.0000000002360000.00000004.00001000.00020000.00000000.sdmp, jyU2NpOg5L.tmp, 00000001.00000000.1678528161.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-O41ML.tmp.1.dr, jyU2NpOg5L.tmp.0.dr String found in binary or memory: http://www.remobjects.com/psU

System Summary

barindex
Source: jennyvideoconverter32.exe.1.dr Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: ET Ammeter Side 10.7.46.exe.2.dr Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0042F530 NtdllDefWindowProc_A, 1_2_0042F530
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00423B94 NtdllDefWindowProc_A, 1_2_00423B94
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004125E8 NtdllDefWindowProc_A, 1_2_004125E8
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004789DC NtdllDefWindowProc_A, 1_2_004789DC
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004573CC PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A, 1_2_004573CC
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0042E944: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError, 1_2_0042E944
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Code function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx, 0_2_00409448
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004555D0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx, 1_2_004555D0
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Code function: 0_2_0040840C 0_2_0040840C
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004804C6 1_2_004804C6
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00470950 1_2_00470950
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004352D8 1_2_004352D8
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00467710 1_2_00467710
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0043036C 1_2_0043036C
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004444D8 1_2_004444D8
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004345D4 1_2_004345D4
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00486604 1_2_00486604
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00444A80 1_2_00444A80
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00430EF8 1_2_00430EF8
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00445178 1_2_00445178
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0045F430 1_2_0045F430
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0045B4D8 1_2_0045B4D8
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00487564 1_2_00487564
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00445584 1_2_00445584
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00469770 1_2_00469770
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0048D8C4 1_2_0048D8C4
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004519A8 1_2_004519A8
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0043DD60 1_2_0043DD60
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_00401051 2_2_00401051
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_00401C26 2_2_00401C26
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02DAE002 2_2_02DAE002
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02DABCEB 2_2_02DABCEB
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02DAB4E5 2_2_02DAB4E5
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02DABD58 2_2_02DABD58
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02D8E18D 2_2_02D8E18D
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02D89E84 2_2_02D89E84
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02D94E29 2_2_02D94E29
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02D7EFAD 2_2_02D7EFAD
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02D8DC99 2_2_02D8DC99
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02D88442 2_2_02D88442
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02D8AC3A 2_2_02D8AC3A
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02D92DB4 2_2_02D92DB4
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02D8E5A5 2_2_02D8E5A5
Source: Joe Sandbox View Dropped File: C:\Users\user\AppData\Local\Jenny Video Converter\is-008N6.tmp AFB9779C4D24D0CE660272533B70D2B56704F8C39F63DAB0592C203D8AE74673
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: String function: 02D88AE0 appears 37 times
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: String function: 02D95330 appears 139 times
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: String function: 00405964 appears 116 times
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: String function: 00408C14 appears 45 times
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: String function: 00406ACC appears 41 times
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: String function: 00403400 appears 61 times
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: String function: 00445DE4 appears 45 times
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: String function: 004078FC appears 43 times
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: String function: 004344EC appears 32 times
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: String function: 00403494 appears 82 times
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: String function: 00457D58 appears 73 times
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: String function: 00453330 appears 93 times
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: String function: 00457B4C appears 98 times
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: String function: 00403684 appears 221 times
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: String function: 004460B4 appears 59 times
Source: jyU2NpOg5L.exe Static PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: jyU2NpOg5L.tmp.0.dr Static PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: jyU2NpOg5L.tmp.0.dr Static PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
Source: jyU2NpOg5L.tmp.0.dr Static PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: jyU2NpOg5L.tmp.0.dr Static PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
Source: is-O41ML.tmp.1.dr Static PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: is-O41ML.tmp.1.dr Static PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
Source: is-O41ML.tmp.1.dr Static PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: is-O41ML.tmp.1.dr Static PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
Source: is-8PQMK.tmp.1.dr Static PE information: Number of sections : 11 > 10
Source: is-I1MM7.tmp.1.dr Static PE information: Number of sections : 11 > 10
Source: is-LDF51.tmp.1.dr Static PE information: Number of sections : 11 > 10
Source: is-09E0C.tmp.1.dr Static PE information: Number of sections : 11 > 10
Source: is-JA411.tmp.1.dr Static PE information: Number of sections : 11 > 10
Source: is-95O1F.tmp.1.dr Static PE information: Number of sections : 11 > 10
Source: is-B5LL1.tmp.1.dr Static PE information: Number of sections : 11 > 10
Source: is-9DL1V.tmp.1.dr Static PE information: Number of sections : 11 > 10
Source: is-TBLNP.tmp.1.dr Static PE information: Number of sections : 11 > 10
Source: is-H0NOD.tmp.1.dr Static PE information: Number of sections : 11 > 10
Source: is-008N6.tmp.1.dr Static PE information: Number of sections : 11 > 10
Source: jyU2NpOg5L.exe, 00000000.00000003.1678162647.0000000002144000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameshfolder.dll~/ vs jyU2NpOg5L.exe
Source: jyU2NpOg5L.exe, 00000000.00000003.1678028969.0000000002360000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameshfolder.dll~/ vs jyU2NpOg5L.exe
Source: jyU2NpOg5L.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: _RegDLL.tmp.1.dr Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: classification engine Classification label: mal100.troj.evad.winEXE@5/69@2/3
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02D808B8 FormatMessageA,GetLastError, 2_2_02D808B8
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Code function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx, 0_2_00409448
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004555D0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx, 1_2_004555D0
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00455DF8 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA, 1_2_00455DF8
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: CreateServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle, 2_2_00402524
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0046E38C GetVersion,CoCreateInstance, 1_2_0046E38C
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Code function: 0_2_00409BEC FindResourceA,SizeofResource,LoadResource,LockResource, 0_2_00409BEC
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_0040224F lstrcmpiW,SetEvent,StartServiceCtrlDispatcherA, 2_2_0040224F
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_0040224F lstrcmpiW,SetEvent,StartServiceCtrlDispatcherA, 2_2_0040224F
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_0040B218 StartServiceCtrlDispatcherA, 2_2_0040B218
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_004021F7 StartServiceCtrlDispatcherA, 2_2_004021F7
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter Jump to behavior
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe File created: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File read: C:\Windows\win.ini Jump to behavior
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganization Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: jyU2NpOg5L.exe ReversingLabs: Detection: 21%
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe File read: C:\Users\user\Desktop\jyU2NpOg5L.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\jyU2NpOg5L.exe "C:\Users\user\Desktop\jyU2NpOg5L.exe"
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Process created: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp "C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp" /SL5="$10454,4254940,54272,C:\Users\user\Desktop\jyU2NpOg5L.exe"
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Process created: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe "C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe" -i
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Process created: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp "C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp" /SL5="$10454,4254940,54272,C:\Users\user\Desktop\jyU2NpOg5L.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Process created: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe "C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe" -i Jump to behavior
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: shfolder.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: rstrtmgr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: msacm32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: winmmbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: winmmbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: riched20.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: usp10.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: msls31.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: explorerframe.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: sfc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Section loaded: sfc_os.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: dsound.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: powrprof.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: powrprof.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: winmmbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: umpdc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: appxsip.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: opcservices.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwner Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Window found: window name: TMainForm Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: jyU2NpOg5L.exe Static file information: File size 4536218 > 1048576

Data Obfuscation

barindex
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Unpacked PE file: 2.2.jennyvideoconverter32.exe.400000.0.unpack .text:EW;.rdata:R;_cde_3:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Unpacked PE file: 2.2.jennyvideoconverter32.exe.400000.0.unpack
Source: is-7KAH0.tmp.1.dr Static PE information: 0x8C00008C [Mon Jun 6 07:19:40 2044 UTC]
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004502AC GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 1_2_004502AC
Source: jennyvideoconverter32.exe.1.dr Static PE information: section name: _cde_3
Source: is-7T2P6.tmp.1.dr Static PE information: section name: /4
Source: is-09E0C.tmp.1.dr Static PE information: section name: /4
Source: is-8PQMK.tmp.1.dr Static PE information: section name: /4
Source: is-73912.tmp.1.dr Static PE information: section name: /4
Source: is-VB2TG.tmp.1.dr Static PE information: section name: /4
Source: is-QT7KU.tmp.1.dr Static PE information: section name: /4
Source: is-H0NOD.tmp.1.dr Static PE information: section name: /4
Source: is-7KAH0.tmp.1.dr Static PE information: section name: /4
Source: is-UFRG7.tmp.1.dr Static PE information: section name: /4
Source: is-95O1F.tmp.1.dr Static PE information: section name: /4
Source: is-4CRJH.tmp.1.dr Static PE information: section name: /4
Source: is-B5LL1.tmp.1.dr Static PE information: section name: /4
Source: is-PQQIR.tmp.1.dr Static PE information: section name: /4
Source: is-008N6.tmp.1.dr Static PE information: section name: /4
Source: is-9DL1V.tmp.1.dr Static PE information: section name: /4
Source: is-TBLNP.tmp.1.dr Static PE information: section name: /4
Source: is-LDF51.tmp.1.dr Static PE information: section name: /4
Source: is-DP48L.tmp.1.dr Static PE information: section name: /4
Source: is-JA411.tmp.1.dr Static PE information: section name: /4
Source: is-9UPQ4.tmp.1.dr Static PE information: section name: /4
Source: is-CC1JP.tmp.1.dr Static PE information: section name: /4
Source: is-9FN1B.tmp.1.dr Static PE information: section name: /4
Source: is-VUI7C.tmp.1.dr Static PE information: section name: /4
Source: is-V1IGP.tmp.1.dr Static PE information: section name: /4
Source: is-RVLO5.tmp.1.dr Static PE information: section name: /4
Source: is-I1MM7.tmp.1.dr Static PE information: section name: /4
Source: is-P6NAN.tmp.1.dr Static PE information: section name: /4
Source: ET Ammeter Side 10.7.46.exe.2.dr Static PE information: section name: _cde_3
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Code function: 0_2_004065B8 push 004065F5h; ret 0_2_004065ED
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Code function: 0_2_004040B5 push eax; ret 0_2_004040F1
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Code function: 0_2_00408104 push ecx; mov dword ptr [esp], eax 0_2_00408109
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Code function: 0_2_00404185 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Code function: 0_2_00404206 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Code function: 0_2_0040C218 push eax; ret 0_2_0040C219
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Code function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Code function: 0_2_00404283 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Code function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00409954 push 00409991h; ret 1_2_00409989
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0040A04F push ds; ret 1_2_0040A050
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0040A023 push ds; ret 1_2_0040A04D
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00460088 push ecx; mov dword ptr [esp], ecx 1_2_0046008C
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004062CC push ecx; mov dword ptr [esp], eax 1_2_004062CD
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0049467C push ecx; mov dword ptr [esp], ecx 1_2_00494681
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004106E0 push ecx; mov dword ptr [esp], edx 1_2_004106E5
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00412938 push 0041299Bh; ret 1_2_00412993
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0040D038 push ecx; mov dword ptr [esp], edx 1_2_0040D03A
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004850AC push ecx; mov dword ptr [esp], ecx 1_2_004850B1
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00443450 push ecx; mov dword ptr [esp], ecx 1_2_00443454
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0040546D push eax; ret 1_2_004054A9
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0040553D push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0040F598 push ecx; mov dword ptr [esp], edx 1_2_0040F59A
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004055BE push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00459634 push 00459678h; ret 1_2_00459670
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0040563B push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004517E4 push 00451817h; ret 1_2_0045180F
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004519A8 push ecx; mov dword ptr [esp], eax 1_2_004519AD
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00483A08 push 00483AF7h; ret 1_2_00483AEF
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00477A24 push ecx; mov dword ptr [esp], edx 1_2_00477A25

Persistence and Installation Behavior

barindex
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive0 2_2_00401A4F
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive0 2_2_02D7F7D6
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libpango-1.0-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\zlib1.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-VB2TG.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-UFRG7.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libwinpthread-1.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libpng16-16.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-DP48L.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-LDF51.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libgobject-2.0-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-V1IGP.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-QT7KU.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-JA411.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-I1MM7.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libgdkmm-2.4-1.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libjpeg-8.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-B5LL1.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-7KAH0.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libpcre-1.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libgmodule-2.0-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-9UPQ4.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-PQQIR.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-VUI7C.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-9DL1V.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-TBLNP.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libgomp-1.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libpangoft2-1.0-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libpangowin32-1.0-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Temp\is-PEK7B.tmp\_isetup\_RegDLL.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libglibmm-2.4-1.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\liblzma-5.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libpixman-1-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\liblcms2-2.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-7T2P6.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-9FN1B.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libpangomm-1.4-1.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libpangocairo-1.0-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\is-O41ML.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\librsvg-2-2.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-008N6.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-8PQMK.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libtiff-5.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe File created: C:\ProgramData\ET Ammeter Side 10.7.46\ET Ammeter Side 10.7.46.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libsigc-2.0-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libgcc_s_dw2-1.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libintl-8.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libharfbuzz-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\unins000.exe (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Temp\is-PEK7B.tmp\_isetup\_setup64.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-P6NAN.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libgraphite2.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Temp\is-PEK7B.tmp\_isetup\_shfoldr.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-09E0C.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libgdk_pixbuf-2.0-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\libgdk-win32-2.0-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-H0NOD.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-95O1F.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Temp\is-PEK7B.tmp\_isetup\_iscrypt.dll Jump to dropped file
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe File created: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-RVLO5.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-73912.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-CC1JP.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp File created: C:\Users\user\AppData\Local\Jenny Video Converter\is-4CRJH.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe File created: C:\ProgramData\ET Ammeter Side 10.7.46\ET Ammeter Side 10.7.46.exe Jump to dropped file

Boot Survival

barindex
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive0 2_2_00401A4F
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive0 2_2_02D7F7D6
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_0040224F lstrcmpiW,SetEvent,StartServiceCtrlDispatcherA, 2_2_0040224F
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus, 1_2_00423C1C
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus, 1_2_00423C1C
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004241EC IsIconic,SetActiveWindow,SetFocus, 1_2_004241EC
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004241A4 IsIconic,SetActiveWindow, 1_2_004241A4
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00418394 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient, 1_2_00418394
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0042286C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow, 1_2_0042286C
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004833BC IsIconic,GetWindowLongA,ShowWindow,ShowWindow, 1_2_004833BC
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004175A8 IsIconic,GetCapture, 1_2_004175A8
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00417CDE IsIconic,SetWindowPos, 1_2_00417CDE
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00417CE0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement, 1_2_00417CE0
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0041F128 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary, 1_2_0041F128
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary, 2_2_00401B4B
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary, 2_2_02D7F8DA
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Window / User API: threadDelayed 932 Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Window / User API: threadDelayed 8953 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\zlib1.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpango-1.0-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-UFRG7.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-VB2TG.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libwinpthread-1.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpng16-16.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-DP48L.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-LDF51.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgobject-2.0-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-V1IGP.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-QT7KU.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-JA411.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-I1MM7.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgdkmm-2.4-1.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libjpeg-8.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-B5LL1.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-7KAH0.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpcre-1.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgmodule-2.0-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-9UPQ4.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-VUI7C.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-PQQIR.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-9DL1V.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-TBLNP.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgomp-1.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpangoft2-1.0-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpangowin32-1.0-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-PEK7B.tmp\_isetup\_RegDLL.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libglibmm-2.4-1.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\liblzma-5.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpixman-1-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\liblcms2-2.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-7T2P6.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpangomm-1.4-1.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-9FN1B.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libpangocairo-1.0-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\librsvg-2-2.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\is-O41ML.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-008N6.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libtiff-5.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-8PQMK.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libsigc-2.0-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgcc_s_dw2-1.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libintl-8.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libharfbuzz-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\unins000.exe (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-PEK7B.tmp\_isetup\_setup64.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-P6NAN.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgraphite2.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-PEK7B.tmp\_isetup\_shfoldr.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgdk_pixbuf-2.0-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-09E0C.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\libgdk-win32-2.0-0.dll (copy) Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-H0NOD.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-95O1F.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-PEK7B.tmp\_isetup\_iscrypt.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-RVLO5.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-73912.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-CC1JP.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Jenny Video Converter\is-4CRJH.tmp Jump to dropped file
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Evasive API call chain: GetSystemTime,DecisionNodes
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Evasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe TID: 7420 Thread sleep count: 932 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe TID: 7420 Thread sleep time: -1864000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe TID: 7848 Thread sleep count: 39 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe TID: 7848 Thread sleep time: -2340000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe TID: 7420 Thread sleep count: 8953 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe TID: 7420 Thread sleep time: -17906000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe File opened: PhysicalDrive0 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00452A4C FindFirstFileA,GetLastError, 1_2_00452A4C
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004751F8 FindFirstFileA,FindNextFileA,FindClose, 1_2_004751F8
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00464048 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode, 1_2_00464048
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004644C4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode, 1_2_004644C4
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00462ABC FindFirstFileA,FindNextFileA,FindClose, 1_2_00462ABC
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00497A74 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose, 1_2_00497A74
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Code function: 0_2_00409B30 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery, 0_2_00409B30
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Thread delayed: delay time: 60000 Jump to behavior
Source: jennyvideoconverter32.exe.1.dr, is-NCE8H.tmp.1.dr, ET Ammeter Side 10.7.46.exe.2.dr Binary or memory string: h'qemU
Source: jennyvideoconverter32.exe, 00000002.00000002.2941462665.0000000003370000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWq
Source: jennyvideoconverter32.exe, 00000002.00000002.2941462665.0000000003370000.00000004.00000020.00020000.00000000.sdmp, jennyvideoconverter32.exe, 00000002.00000002.2939825050.0000000000A58000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Process information queried: ProcessInformation Jump to behavior

Anti Debugging

barindex
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Debugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleep
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02D900FE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer, 2_2_02D900FE
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02D900FE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer, 2_2_02D900FE
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_004502AC GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 1_2_004502AC
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02D7648B RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection, 2_2_02D7648B
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02D89468 SetUnhandledExceptionFilter,UnhandledExceptionFilter, 2_2_02D89468
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00478420 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle, 1_2_00478420
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0042E0AC AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid, 1_2_0042E0AC
Source: C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe Code function: 2_2_02D7F78E cpuid 2_2_02D7F78E
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Code function: GetLocaleInfoA, 0_2_004051FC
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Code function: GetLocaleInfoA, 0_2_00405248
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: GetLocaleInfoA, 1_2_00408570
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: GetLocaleInfoA, 1_2_004085BC
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_0045892C GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle, 1_2_0045892C
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Code function: 0_2_004026C4 GetSystemTime, 0_2_004026C4
Source: C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp Code function: 1_2_00455588 GetUserNameA, 1_2_00455588
Source: C:\Users\user\Desktop\jyU2NpOg5L.exe Code function: 0_2_00405CE4 GetVersionExA, 0_2_00405CE4

Stealing of Sensitive Information

barindex
Source: Yara match File source: 00000002.00000002.2941014625.0000000002D71000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2940927298.0000000002CCE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: jennyvideoconverter32.exe PID: 7416, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 00000002.00000002.2941014625.0000000002D71000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2940927298.0000000002CCE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: jennyvideoconverter32.exe PID: 7416, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs