Windows Analysis Report
Ot7EdLwo881ajbV.exe

Overview

General Information

Sample name: Ot7EdLwo881ajbV.exe
Analysis ID: 1538476
MD5: f99cdd71043a75d4fe553fb39de6d3e5
SHA1: 28d123dd5f049724ec34cea59a73fb7385b3f904
SHA256: 356dd4d1abe930b8189e5d5a1870c6a70236a12db73b24c19d0e461056c15dfa
Tags: exeuser-TeamDreier
Infos:

Detection

FormBook, PureLog Stealer
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected FormBook
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Reads the DNS cache
Sample uses process hollowing technique
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to resolve many domain names, but no domain seems valid
Uses ipconfig to lookup or modify the Windows network settings
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

AV Detection

barindex
Source: 00000006.00000002.3768270082.0000000000710000.00000040.80000000.00040000.00000000.sdmp Malware Configuration Extractor: FormBook {"C2 list": ["www.ractice-eiddyy.xyz/dr14/"], "decoy": ["ypewriter.pro", "conoficina.shop", "etrules.net", "bwuc-ball.xyz", "obis.xyz", "tpbuncistoto.xyz", "lhakikas.net", "long-ybzxgm.xyz", "ray-east.xyz", "hild-rbfij.xyz", "imself-kyac.xyz", "ftuu-government.xyz", "om-tracksi.top", "olicy-yzipy.xyz", "ntalaxlesbabbool.cfd", "ingleyou.top", "ieryfiertzframing.cfd", "pon-nacgrz.xyz", "aomei515.top", "alzgroup.net", "7032.vip", "evel100slot.pro", "ideplace.click", "jxjxj.lat", "ransplant-la1am-hair.today", "pkge-last.xyz", "rniesphotos.net", "uildbin.net", "lobalwealth.institute", "inairo.pro", "oneydewsolutions.net", "8630.photo", "udience-mgiq.xyz", "xpressdiamondscar.shop", "umberlestari.net", "itringmorbiermugient.cfd", "yegle.net", "aaqn-safe.xyz", "resident-clvedb.xyz", "ltj-democratic.xyz", "a-tickets45.top", "adgeter.xyz", "ig02sp5gbps11-mnqrsd.xyz", "dtqu.shop", "qctdb-race.xyz", "test-octopus.click", "pioux.xyz", "idde.shop", "ronereagerereaver.cfd", "lo4zj.top", "hikiss.net", "reast-augmentation12.live", "uxj-include.xyz", "onnectdesert.click", "vailable-qopsca.xyz", "ery-ghlbqs.xyz", "88886.net", "useinidismyerbas.cfd", "iadomus.net", "ymoviz2012.pro", "kin-tozde.xyz", "pon-nmlkk.xyz", "ywquo.top", "onoyekorerolaothoe.cfd"]}
Source: Ot7EdLwo881ajbV.exe ReversingLabs: Detection: 28%
Source: Yara match File source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Ot7EdLwo881ajbV.exe.343e790.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000006.00000002.3768270082.0000000000710000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.1418673624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.3769161456.0000000002D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.3769205652.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1361586111.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: Ot7EdLwo881ajbV.exe Joe Sandbox ML: detected
Source: Ot7EdLwo881ajbV.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Ot7EdLwo881ajbV.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: ipconfig.pdb source: Ot7EdLwo881ajbV.exe, 00000004.00000002.1419016125.0000000001110000.00000040.10000000.00040000.00000000.sdmp, Ot7EdLwo881ajbV.exe, 00000004.00000002.1419170298.0000000001178000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, ipconfig.exe, 00000006.00000002.3769037540.0000000000D40000.00000040.80000000.00040000.00000000.sdmp
Source: Binary string: ipconfig.pdbGCTL source: Ot7EdLwo881ajbV.exe, 00000004.00000002.1419016125.0000000001110000.00000040.10000000.00040000.00000000.sdmp, Ot7EdLwo881ajbV.exe, 00000004.00000002.1419170298.0000000001178000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, 00000006.00000002.3769037540.0000000000D40000.00000040.80000000.00040000.00000000.sdmp
Source: Binary string: Wovy.pdb source: Ot7EdLwo881ajbV.exe
Source: Binary string: wntdll.pdbUGP source: Ot7EdLwo881ajbV.exe, 00000004.00000002.1419367496.00000000015D0000.00000040.00001000.00020000.00000000.sdmp, ipconfig.exe, 00000006.00000003.1423548845.0000000002F36000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, 00000006.00000003.1418648965.0000000000B91000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, 00000006.00000002.3769604243.000000000327E000.00000040.00001000.00020000.00000000.sdmp, ipconfig.exe, 00000006.00000002.3769604243.00000000030E0000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: wntdll.pdb source: Ot7EdLwo881ajbV.exe, Ot7EdLwo881ajbV.exe, 00000004.00000002.1419367496.00000000015D0000.00000040.00001000.00020000.00000000.sdmp, ipconfig.exe, ipconfig.exe, 00000006.00000003.1423548845.0000000002F36000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, 00000006.00000003.1418648965.0000000000B91000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, 00000006.00000002.3769604243.000000000327E000.00000040.00001000.00020000.00000000.sdmp, ipconfig.exe, 00000006.00000002.3769604243.00000000030E0000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Wovy.pdbSHA256 source: Ot7EdLwo881ajbV.exe
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4x nop then pop esi 4_2_004172F2
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4x nop then pop edi 4_2_00416CC0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4x nop then pop edi 4_2_00417D7D
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 4x nop then pop esi 6_2_007272F2
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 4x nop then pop edi 6_2_00726CC0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 4x nop then pop edi 6_2_00727D7D

Networking

barindex
Source: Malware configuration extractor URLs: www.ractice-eiddyy.xyz/dr14/
Source: DNS query: www.adgeter.xyz
Source: DNS query: www.olicy-yzipy.xyz
Source: DNS query: www.pon-nacgrz.xyz
Source: DNS query: www.bwuc-ball.xyz
Source: unknown DNS traffic detected: query: www.alzgroup.net replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.ieryfiertzframing.cfd replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.bwuc-ball.xyz replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.adgeter.xyz replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.pon-nacgrz.xyz replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 198.187.3.20.in-addr.arpa replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.olicy-yzipy.xyz replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.lhakikas.net replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.oneydewsolutions.net replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.ntalaxlesbabbool.cfd replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.ypewriter.pro replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.iadomus.net replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.alzgroup.net replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.ieryfiertzframing.cfd replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.bwuc-ball.xyz replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.adgeter.xyz replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.pon-nacgrz.xyz replaycode: Name error (3)
Source: unknown DNS traffic detected: query: 198.187.3.20.in-addr.arpa replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.olicy-yzipy.xyz replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.lhakikas.net replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.oneydewsolutions.net replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.ntalaxlesbabbool.cfd replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.ypewriter.pro replaycode: Name error (3)
Source: unknown DNS traffic detected: query: www.iadomus.net replaycode: Name error (3)
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic DNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
Source: global traffic DNS traffic detected: DNS query: www.oneydewsolutions.net
Source: global traffic DNS traffic detected: DNS query: www.adgeter.xyz
Source: global traffic DNS traffic detected: DNS query: www.lhakikas.net
Source: global traffic DNS traffic detected: DNS query: www.olicy-yzipy.xyz
Source: global traffic DNS traffic detected: DNS query: www.pon-nacgrz.xyz
Source: global traffic DNS traffic detected: DNS query: www.ypewriter.pro
Source: global traffic DNS traffic detected: DNS query: www.bwuc-ball.xyz
Source: global traffic DNS traffic detected: DNS query: www.iadomus.net
Source: global traffic DNS traffic detected: DNS query: www.alzgroup.net
Source: global traffic DNS traffic detected: DNS query: www.ieryfiertzframing.cfd
Source: global traffic DNS traffic detected: DNS query: www.ntalaxlesbabbool.cfd
Source: explorer.exe, 00000005.00000002.3775588613.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1373593359.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271877116.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274265821.0000000007306000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: explorer.exe, 00000005.00000002.3775588613.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1373593359.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271877116.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274265821.0000000007306000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: explorer.exe, 00000005.00000002.3775588613.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1373593359.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271877116.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274265821.0000000007306000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: explorer.exe, 00000005.00000002.3775588613.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1373593359.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271877116.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274265821.0000000007306000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
Source: explorer.exe, 00000005.00000002.3773443635.0000000008820000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000002.3773414956.0000000008810000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.1372069344.0000000007C70000.00000002.00000001.00040000.00000000.sdmp String found in binary or memory: http://schemas.micro
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.adgeter.xyz
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.adgeter.xyz/dr14/
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.adgeter.xyz/dr14/www.lhakikas.net
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.adgeter.xyzReferer:
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.alzgroup.net
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.alzgroup.net/dr14/
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.alzgroup.net/dr14/www.ieryfiertzframing.cfd
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.alzgroup.netReferer:
Source: explorer.exe, 00000005.00000003.2272269182.000000000C44D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271807121.000000000C430000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1375956423.000000000C3F7000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.autoitscript.com/autoit3/J
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.bwuc-ball.xyz
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.bwuc-ball.xyz/dr14/
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.bwuc-ball.xyz/dr14/www.iadomus.net
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.bwuc-ball.xyzReferer:
Source: explorer.exe, 00000005.00000002.3771427420.00000000071A4000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.foreca.com
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.iadomus.net
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.iadomus.net/dr14/
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.iadomus.net/dr14/www.alzgroup.net
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.iadomus.netReferer:
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ieryfiertzframing.cfd
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ieryfiertzframing.cfd/dr14/
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ieryfiertzframing.cfd/dr14/www.ntalaxlesbabbool.cfd
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ieryfiertzframing.cfdReferer:
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.lhakikas.net
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.lhakikas.net/dr14/
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.lhakikas.net/dr14/www.olicy-yzipy.xyz
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.lhakikas.netReferer:
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ltj-democratic.xyz
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ltj-democratic.xyz/dr14/
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ltj-democratic.xyz/dr14/www.onoyekorerolaothoe.cfd
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ltj-democratic.xyzReferer:
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ntalaxlesbabbool.cfd
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ntalaxlesbabbool.cfd/dr14/
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ntalaxlesbabbool.cfd/dr14/www.ltj-democratic.xyz
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ntalaxlesbabbool.cfdReferer:
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.olicy-yzipy.xyz
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.olicy-yzipy.xyz/dr14/
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.olicy-yzipy.xyz/dr14/www.pioux.xyz
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.olicy-yzipy.xyzReferer:
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.oneydewsolutions.net
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.oneydewsolutions.net/dr14/
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.oneydewsolutions.net/dr14/www.adgeter.xyz
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.oneydewsolutions.netReferer:
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.onoyekorerolaothoe.cfd
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.onoyekorerolaothoe.cfd/dr14/
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.onoyekorerolaothoe.cfd/dr14/www.test-octopus.click
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.onoyekorerolaothoe.cfdReferer:
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.pioux.xyz
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.pioux.xyz/dr14/
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.pioux.xyz/dr14/www.pon-nacgrz.xyz
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.pioux.xyzReferer:
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.pon-nacgrz.xyz
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.pon-nacgrz.xyz/dr14/
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.pon-nacgrz.xyz/dr14/www.ypewriter.pro
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.pon-nacgrz.xyzReferer:
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ractice-eiddyy.xyz
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ractice-eiddyy.xyz/dr14/
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ractice-eiddyy.xyz/dr14/P
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ractice-eiddyy.xyzReferer:
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.test-octopus.click
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.test-octopus.click/dr14/
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.test-octopus.click/dr14/www.ractice-eiddyy.xyz
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.test-octopus.clickReferer:
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ypewriter.pro
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ypewriter.pro/dr14/
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ypewriter.pro/dr14/www.bwuc-ball.xyz
Source: explorer.exe, 00000005.00000003.2271845822.000000000C544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271390445.000000000C4E2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3781630237.000000000C54D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://www.ypewriter.proReferer:
Source: explorer.exe, 00000005.00000002.3775588613.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1373593359.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271877116.0000000008F83000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
Source: explorer.exe, 00000005.00000000.1373593359.0000000008F09000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/
Source: explorer.exe, 00000005.00000003.2272963365.0000000008DAD000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
Source: explorer.exe, 00000005.00000002.3775588613.0000000008F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3075191865.0000000008F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2272963365.0000000008F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1373593359.0000000008F09000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&oc
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
Source: explorer.exe, 00000005.00000002.3771427420.0000000007276000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.0000000007276000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?t
Source: explorer.exe, 00000005.00000002.3775588613.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3075191865.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2272963365.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1373593359.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://arc.msn.com
Source: explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
Source: explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
Source: explorer.exe, 00000005.00000000.1375956423.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3779271070.000000000C091000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://excel.office.com
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA11f7Wa.img
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1bjET8.img
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1c9Jin.img
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBNvr53.img
Source: explorer.exe, 00000005.00000000.1375956423.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3779271070.000000000C091000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://outlook.com
Source: explorer.exe, 00000005.00000000.1375956423.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3779271070.000000000C091000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://powerpoint.office.com
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
Source: explorer.exe, 00000005.00000003.2273487584.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1373593359.00000000090F2000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://wns.windows.com/
Source: explorer.exe, 00000005.00000000.1375956423.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3779271070.000000000C091000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://word.office.com
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/music/news/6-rock-ballads-that-tug-at-the-heartstrings/ar-AA1hIdsm
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/weather/topstories/accuweather-el-ni
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winter
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
Source: explorer.exe, 00000005.00000002.3771427420.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1365767121.00000000071FC000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com:443/en-us/feed
Source: explorer.exe, 00000005.00000002.3771427420.00000000071A4000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://www.pollensense.com/

E-Banking Fraud

barindex
Source: Yara match File source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Ot7EdLwo881ajbV.exe.343e790.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000006.00000002.3768270082.0000000000710000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.1418673624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.3769161456.0000000002D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.3769205652.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1361586111.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

System Summary

barindex
Source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0.2.Ot7EdLwo881ajbV.exe.343e790.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 0.2.Ot7EdLwo881ajbV.exe.343e790.1.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0.2.Ot7EdLwo881ajbV.exe.343e790.1.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000006.00000002.3768270082.0000000000710000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000006.00000002.3768270082.0000000000710000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000006.00000002.3768270082.0000000000710000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000004.00000002.1418673624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000004.00000002.1418673624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000004.00000002.1418673624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000006.00000002.3769161456.0000000002D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000006.00000002.3769161456.0000000002D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000006.00000002.3769161456.0000000002D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000006.00000002.3769205652.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000006.00000002.3769205652.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000006.00000002.3769205652.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000000.00000002.1361586111.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000000.00000002.1361586111.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000000.00000002.1361586111.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: Process Memory Space: Ot7EdLwo881ajbV.exe PID: 7572, type: MEMORYSTR Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: Process Memory Space: Ot7EdLwo881ajbV.exe PID: 7908, type: MEMORYSTR Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: Process Memory Space: ipconfig.exe PID: 7972, type: MEMORYSTR Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0041A330 NtCreateFile, 4_2_0041A330
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0041A3E0 NtReadFile, 4_2_0041A3E0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0041A460 NtClose, 4_2_0041A460
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0041A510 NtAllocateVirtualMemory, 4_2_0041A510
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0041A32F NtCreateFile, 4_2_0041A32F
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0041A45A NtClose, 4_2_0041A45A
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0041A42B NtReadFile, 4_2_0041A42B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0041A50B NtAllocateVirtualMemory, 4_2_0041A50B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0041A58A NtAllocateVirtualMemory, 4_2_0041A58A
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642B60 NtClose,LdrInitializeThunk, 4_2_01642B60
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642BF0 NtAllocateVirtualMemory,LdrInitializeThunk, 4_2_01642BF0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642AD0 NtReadFile,LdrInitializeThunk, 4_2_01642AD0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642D30 NtUnmapViewOfSection,LdrInitializeThunk, 4_2_01642D30
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642D10 NtMapViewOfSection,LdrInitializeThunk, 4_2_01642D10
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642DF0 NtQuerySystemInformation,LdrInitializeThunk, 4_2_01642DF0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642DD0 NtDelayExecution,LdrInitializeThunk, 4_2_01642DD0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642C70 NtFreeVirtualMemory,LdrInitializeThunk, 4_2_01642C70
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642CA0 NtQueryInformationToken,LdrInitializeThunk, 4_2_01642CA0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642F30 NtCreateSection,LdrInitializeThunk, 4_2_01642F30
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642FE0 NtCreateFile,LdrInitializeThunk, 4_2_01642FE0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642FB0 NtResumeThread,LdrInitializeThunk, 4_2_01642FB0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642F90 NtProtectVirtualMemory,LdrInitializeThunk, 4_2_01642F90
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642EA0 NtAdjustPrivilegesToken,LdrInitializeThunk, 4_2_01642EA0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642E80 NtReadVirtualMemory,LdrInitializeThunk, 4_2_01642E80
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01644340 NtSetContextThread, 4_2_01644340
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01644650 NtSuspendThread, 4_2_01644650
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642BE0 NtQueryValueKey, 4_2_01642BE0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642BA0 NtEnumerateValueKey, 4_2_01642BA0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642B80 NtQueryInformationFile, 4_2_01642B80
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642AF0 NtWriteFile, 4_2_01642AF0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642AB0 NtWaitForSingleObject, 4_2_01642AB0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642D00 NtSetInformationFile, 4_2_01642D00
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642DB0 NtEnumerateKey, 4_2_01642DB0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642C60 NtCreateKey, 4_2_01642C60
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642C00 NtQueryInformationProcess, 4_2_01642C00
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642CF0 NtOpenProcess, 4_2_01642CF0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642CC0 NtQueryVirtualMemory, 4_2_01642CC0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642F60 NtCreateProcessEx, 4_2_01642F60
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642FA0 NtQuerySection, 4_2_01642FA0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642E30 NtWriteVirtualMemory, 4_2_01642E30
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642EE0 NtQueueApcThread, 4_2_01642EE0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01643010 NtOpenDirectoryObject, 4_2_01643010
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01643090 NtSetValueKey, 4_2_01643090
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016435C0 NtCreateMutant, 4_2_016435C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016439B0 NtGetContextThread, 4_2_016439B0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01643D70 NtOpenThread, 4_2_01643D70
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01643D10 NtOpenProcessToken, 4_2_01643D10
Source: C:\Windows\explorer.exe Code function: 5_2_1169F232 NtCreateFile, 5_2_1169F232
Source: C:\Windows\explorer.exe Code function: 5_2_116A0E12 NtProtectVirtualMemory, 5_2_116A0E12
Source: C:\Windows\explorer.exe Code function: 5_2_116A0E0A NtProtectVirtualMemory, 5_2_116A0E0A
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152B60 NtClose,LdrInitializeThunk, 6_2_03152B60
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152AD0 NtReadFile,LdrInitializeThunk, 6_2_03152AD0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152F30 NtCreateSection,LdrInitializeThunk, 6_2_03152F30
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152FE0 NtCreateFile,LdrInitializeThunk, 6_2_03152FE0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152EA0 NtAdjustPrivilegesToken,LdrInitializeThunk, 6_2_03152EA0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152D10 NtMapViewOfSection,LdrInitializeThunk, 6_2_03152D10
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152DD0 NtDelayExecution,LdrInitializeThunk, 6_2_03152DD0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152DF0 NtQuerySystemInformation,LdrInitializeThunk, 6_2_03152DF0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152C70 NtFreeVirtualMemory,LdrInitializeThunk, 6_2_03152C70
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152C60 NtCreateKey,LdrInitializeThunk, 6_2_03152C60
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152CA0 NtQueryInformationToken,LdrInitializeThunk, 6_2_03152CA0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031535C0 NtCreateMutant,LdrInitializeThunk, 6_2_031535C0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03154340 NtSetContextThread, 6_2_03154340
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03154650 NtSuspendThread, 6_2_03154650
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152B80 NtQueryInformationFile, 6_2_03152B80
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152BA0 NtEnumerateValueKey, 6_2_03152BA0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152BF0 NtAllocateVirtualMemory, 6_2_03152BF0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152BE0 NtQueryValueKey, 6_2_03152BE0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152AB0 NtWaitForSingleObject, 6_2_03152AB0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152AF0 NtWriteFile, 6_2_03152AF0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152F60 NtCreateProcessEx, 6_2_03152F60
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152F90 NtProtectVirtualMemory, 6_2_03152F90
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152FB0 NtResumeThread, 6_2_03152FB0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152FA0 NtQuerySection, 6_2_03152FA0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152E30 NtWriteVirtualMemory, 6_2_03152E30
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152E80 NtReadVirtualMemory, 6_2_03152E80
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152EE0 NtQueueApcThread, 6_2_03152EE0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152D00 NtSetInformationFile, 6_2_03152D00
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152D30 NtUnmapViewOfSection, 6_2_03152D30
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152DB0 NtEnumerateKey, 6_2_03152DB0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152C00 NtQueryInformationProcess, 6_2_03152C00
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152CC0 NtQueryVirtualMemory, 6_2_03152CC0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03152CF0 NtOpenProcess, 6_2_03152CF0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03153010 NtOpenDirectoryObject, 6_2_03153010
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03153090 NtSetValueKey, 6_2_03153090
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031539B0 NtGetContextThread, 6_2_031539B0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03153D10 NtOpenProcessToken, 6_2_03153D10
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03153D70 NtOpenThread, 6_2_03153D70
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0072A330 NtCreateFile, 6_2_0072A330
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0072A3E0 NtReadFile, 6_2_0072A3E0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0072A460 NtClose, 6_2_0072A460
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0072A32F NtCreateFile, 6_2_0072A32F
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0072A45A NtClose, 6_2_0072A45A
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0072A42B NtReadFile, 6_2_0072A42B
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_02FD9BAF NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtUnmapViewOfSection,NtClose, 6_2_02FD9BAF
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_02FDA036 NtQueryInformationProcess,NtSuspendThread,NtSetContextThread,NtQueueApcThread,NtResumeThread, 6_2_02FDA036
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_02FD9BB2 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 6_2_02FD9BB2
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_02FDA042 NtQueryInformationProcess, 6_2_02FDA042
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 0_2_0228DE8C 0_2_0228DE8C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 0_2_069C845F 0_2_069C845F
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 0_2_069C8470 0_2_069C8470
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 0_2_069C6508 0_2_069C6508
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 0_2_069CCF08 0_2_069CCF08
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 0_2_069C6D78 0_2_069C6D78
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 0_2_069C88A8 0_2_069C88A8
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 0_2_069C6930 0_2_069C6930
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 0_2_069C6940 0_2_069C6940
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_00401030 4_2_00401030
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0041EA9E 4_2_0041EA9E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0041E4B7 4_2_0041E4B7
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0041ED69 4_2_0041ED69
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_00402D87 4_2_00402D87
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_00402D90 4_2_00402D90
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_00409E5C 4_2_00409E5C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_00409E60 4_2_00409E60
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0041EE02 4_2_0041EE02
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_00402FB0 4_2_00402FB0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01698158 4_2_01698158
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01600100 4_2_01600100
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AA118 4_2_016AA118
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C81CC 4_2_016C81CC
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D01AA 4_2_016D01AA
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C41A2 4_2_016C41A2
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A2000 4_2_016A2000
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016CA352 4_2_016CA352
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D03E6 4_2_016D03E6
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161E3F0 4_2_0161E3F0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B0274 4_2_016B0274
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016902C0 4_2_016902C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610535 4_2_01610535
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D0591 4_2_016D0591
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C2446 4_2_016C2446
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B4420 4_2_016B4420
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016BE4F6 4_2_016BE4F6
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610770 4_2_01610770
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01634750 4_2_01634750
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160C7C0 4_2_0160C7C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162C6E0 4_2_0162C6E0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01626962 4_2_01626962
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016129A0 4_2_016129A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016DA9A6 4_2_016DA9A6
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161A840 4_2_0161A840
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01612840 4_2_01612840
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163E8F0 4_2_0163E8F0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015F68B8 4_2_015F68B8
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016CAB40 4_2_016CAB40
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C6BD7 4_2_016C6BD7
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160EA80 4_2_0160EA80
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161AD00 4_2_0161AD00
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016ACD1F 4_2_016ACD1F
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160ADE0 4_2_0160ADE0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01628DBF 4_2_01628DBF
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610C00 4_2_01610C00
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01600CF2 4_2_01600CF2
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B0CB5 4_2_016B0CB5
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01684F40 4_2_01684F40
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01652F28 4_2_01652F28
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01630F30 4_2_01630F30
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B2F30 4_2_016B2F30
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161CFE0 4_2_0161CFE0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01602FC8 4_2_01602FC8
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168EFA0 4_2_0168EFA0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610E59 4_2_01610E59
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016CEE26 4_2_016CEE26
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016CEEDB 4_2_016CEEDB
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01622E90 4_2_01622E90
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016CCE93 4_2_016CCE93
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016DB16B 4_2_016DB16B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0164516C 4_2_0164516C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FF172 4_2_015FF172
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161B1B0 4_2_0161B1B0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C70E9 4_2_016C70E9
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016CF0E0 4_2_016CF0E0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016170C0 4_2_016170C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016BF0CC 4_2_016BF0CC
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FD34C 4_2_015FD34C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C132D 4_2_016C132D
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0165739A 4_2_0165739A
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B12ED 4_2_016B12ED
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162B2C0 4_2_0162B2C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016152A0 4_2_016152A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C7571 4_2_016C7571
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D95C3 4_2_016D95C3
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AD5B0 4_2_016AD5B0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01601460 4_2_01601460
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016CF43F 4_2_016CF43F
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016CF7B0 4_2_016CF7B0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01655630 4_2_01655630
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C16CC 4_2_016C16CC
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01619950 4_2_01619950
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162B950 4_2_0162B950
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A5910 4_2_016A5910
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167D800 4_2_0167D800
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016138E0 4_2_016138E0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016CFB76 4_2_016CFB76
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01685BF0 4_2_01685BF0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0164DBF9 4_2_0164DBF9
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162FB80 4_2_0162FB80
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01683A6C 4_2_01683A6C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016CFA49 4_2_016CFA49
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C7A46 4_2_016C7A46
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016BDAC6 4_2_016BDAC6
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01655AA0 4_2_01655AA0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016ADAAC 4_2_016ADAAC
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B1AA3 4_2_016B1AA3
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C7D73 4_2_016C7D73
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01613D40 4_2_01613D40
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C1D5A 4_2_016C1D5A
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162FDC0 4_2_0162FDC0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01689C32 4_2_01689C32
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016CFCF2 4_2_016CFCF2
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016CFF09 4_2_016CFF09
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015D3FD5 4_2_015D3FD5
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015D3FD2 4_2_015D3FD2
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016CFFB1 4_2_016CFFB1
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01611F92 4_2_01611F92
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01619EB0 4_2_01619EB0
Source: C:\Windows\explorer.exe Code function: 5_2_10659036 5_2_10659036
Source: C:\Windows\explorer.exe Code function: 5_2_10650082 5_2_10650082
Source: C:\Windows\explorer.exe Code function: 5_2_10651D02 5_2_10651D02
Source: C:\Windows\explorer.exe Code function: 5_2_10657912 5_2_10657912
Source: C:\Windows\explorer.exe Code function: 5_2_1065D5CD 5_2_1065D5CD
Source: C:\Windows\explorer.exe Code function: 5_2_1065A232 5_2_1065A232
Source: C:\Windows\explorer.exe Code function: 5_2_10654B30 5_2_10654B30
Source: C:\Windows\explorer.exe Code function: 5_2_10654B32 5_2_10654B32
Source: C:\Windows\explorer.exe Code function: 5_2_1169F232 5_2_1169F232
Source: C:\Windows\explorer.exe Code function: 5_2_11699B30 5_2_11699B30
Source: C:\Windows\explorer.exe Code function: 5_2_11699B32 5_2_11699B32
Source: C:\Windows\explorer.exe Code function: 5_2_11696D02 5_2_11696D02
Source: C:\Windows\explorer.exe Code function: 5_2_1169C912 5_2_1169C912
Source: C:\Windows\explorer.exe Code function: 5_2_116A25CD 5_2_116A25CD
Source: C:\Windows\explorer.exe Code function: 5_2_1169E036 5_2_1169E036
Source: C:\Windows\explorer.exe Code function: 5_2_11695082 5_2_11695082
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_00D439FE 6_2_00D439FE
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031DA352 6_2_031DA352
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0312E3F0 6_2_0312E3F0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031E03E6 6_2_031E03E6
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031C0274 6_2_031C0274
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031A02C0 6_2_031A02C0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031BA118 6_2_031BA118
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03110100 6_2_03110100
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031A8158 6_2_031A8158
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031E01AA 6_2_031E01AA
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031D81CC 6_2_031D81CC
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031B2000 6_2_031B2000
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03144750 6_2_03144750
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03120770 6_2_03120770
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0311C7C0 6_2_0311C7C0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0313C6E0 6_2_0313C6E0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03120535 6_2_03120535
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031E0591 6_2_031E0591
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031C4420 6_2_031C4420
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031D2446 6_2_031D2446
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031CE4F6 6_2_031CE4F6
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031DAB40 6_2_031DAB40
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031D6BD7 6_2_031D6BD7
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0311EA80 6_2_0311EA80
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03136962 6_2_03136962
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031229A0 6_2_031229A0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031EA9A6 6_2_031EA9A6
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03122840 6_2_03122840
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0312A840 6_2_0312A840
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031068B8 6_2_031068B8
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0314E8F0 6_2_0314E8F0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03140F30 6_2_03140F30
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031C2F30 6_2_031C2F30
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03162F28 6_2_03162F28
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03194F40 6_2_03194F40
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0319EFA0 6_2_0319EFA0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03112FC8 6_2_03112FC8
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0312CFE0 6_2_0312CFE0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031DEE26 6_2_031DEE26
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03120E59 6_2_03120E59
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03132E90 6_2_03132E90
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031DCE93 6_2_031DCE93
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031DEEDB 6_2_031DEEDB
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031BCD1F 6_2_031BCD1F
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0312AD00 6_2_0312AD00
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03138DBF 6_2_03138DBF
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0311ADE0 6_2_0311ADE0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03120C00 6_2_03120C00
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031C0CB5 6_2_031C0CB5
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03110CF2 6_2_03110CF2
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031D132D 6_2_031D132D
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0310D34C 6_2_0310D34C
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0316739A 6_2_0316739A
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031252A0 6_2_031252A0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0313B2C0 6_2_0313B2C0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031C12ED 6_2_031C12ED
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0310F172 6_2_0310F172
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031EB16B 6_2_031EB16B
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0315516C 6_2_0315516C
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0312B1B0 6_2_0312B1B0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031CF0CC 6_2_031CF0CC
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031270C0 6_2_031270C0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031D70E9 6_2_031D70E9
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031DF0E0 6_2_031DF0E0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031DF7B0 6_2_031DF7B0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031D16CC 6_2_031D16CC
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031D7571 6_2_031D7571
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031BD5B0 6_2_031BD5B0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031DF43F 6_2_031DF43F
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03111460 6_2_03111460
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031DFB76 6_2_031DFB76
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0313FB80 6_2_0313FB80
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03195BF0 6_2_03195BF0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0315DBF9 6_2_0315DBF9
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031DFA49 6_2_031DFA49
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031D7A46 6_2_031D7A46
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03193A6C 6_2_03193A6C
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03165AA0 6_2_03165AA0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031BDAAC 6_2_031BDAAC
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031C1AA3 6_2_031C1AA3
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031CDAC6 6_2_031CDAC6
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031B5910 6_2_031B5910
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03129950 6_2_03129950
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0313B950 6_2_0313B950
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0318D800 6_2_0318D800
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031238E0 6_2_031238E0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031DFF09 6_2_031DFF09
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03121F92 6_2_03121F92
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031DFFB1 6_2_031DFFB1
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03129EB0 6_2_03129EB0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031D1D5A 6_2_031D1D5A
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03123D40 6_2_03123D40
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031D7D73 6_2_031D7D73
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0313FDC0 6_2_0313FDC0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_03199C32 6_2_03199C32
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031DFCF2 6_2_031DFCF2
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0072E4B7 6_2_0072E4B7
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0072EA9E 6_2_0072EA9E
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0072ED69 6_2_0072ED69
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_00712D90 6_2_00712D90
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_00712D87 6_2_00712D87
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_00719E60 6_2_00719E60
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_00719E5C 6_2_00719E5C
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0072EE02 6_2_0072EE02
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_00712FB0 6_2_00712FB0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_02FDA036 6_2_02FDA036
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_02FDB232 6_2_02FDB232
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_02FD5B30 6_2_02FD5B30
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_02FD5B32 6_2_02FD5B32
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_02FD1082 6_2_02FD1082
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_02FD8912 6_2_02FD8912
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_02FDE5CD 6_2_02FDE5CD
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_02FD2D02 6_2_02FD2D02
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: String function: 03155130 appears 58 times
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: String function: 0319F290 appears 105 times
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: String function: 03167E54 appears 102 times
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: String function: 0310B970 appears 277 times
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: String function: 0318EA12 appears 86 times
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: String function: 0168F290 appears 105 times
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: String function: 015FB970 appears 277 times
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: String function: 01645130 appears 58 times
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: String function: 0167EA12 appears 86 times
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: String function: 01657E54 appears 111 times
Source: Ot7EdLwo881ajbV.exe, 00000000.00000000.1298250532.000000000019C000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameWovy.exe" vs Ot7EdLwo881ajbV.exe
Source: Ot7EdLwo881ajbV.exe, 00000000.00000002.1361586111.0000000003421000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameTyrone.dll8 vs Ot7EdLwo881ajbV.exe
Source: Ot7EdLwo881ajbV.exe, 00000000.00000002.1359322867.000000000072E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameclr.dllT vs Ot7EdLwo881ajbV.exe
Source: Ot7EdLwo881ajbV.exe, 00000000.00000002.1364380533.0000000006C80000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilenameTyrone.dll8 vs Ot7EdLwo881ajbV.exe
Source: Ot7EdLwo881ajbV.exe, 00000004.00000002.1419367496.00000000016FD000.00000040.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs Ot7EdLwo881ajbV.exe
Source: Ot7EdLwo881ajbV.exe, 00000004.00000002.1419016125.0000000001117000.00000040.10000000.00040000.00000000.sdmp Binary or memory string: OriginalFilenameipconfig.exej% vs Ot7EdLwo881ajbV.exe
Source: Ot7EdLwo881ajbV.exe, 00000004.00000002.1419170298.0000000001178000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameipconfig.exej% vs Ot7EdLwo881ajbV.exe
Source: Ot7EdLwo881ajbV.exe, 00000004.00000002.1419170298.0000000001193000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameipconfig.exej% vs Ot7EdLwo881ajbV.exe
Source: Ot7EdLwo881ajbV.exe Binary or memory string: OriginalFilenameWovy.exe" vs Ot7EdLwo881ajbV.exe
Source: Ot7EdLwo881ajbV.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0.2.Ot7EdLwo881ajbV.exe.343e790.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 0.2.Ot7EdLwo881ajbV.exe.343e790.1.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0.2.Ot7EdLwo881ajbV.exe.343e790.1.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000006.00000002.3768270082.0000000000710000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000006.00000002.3768270082.0000000000710000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000006.00000002.3768270082.0000000000710000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000004.00000002.1418673624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000004.00000002.1418673624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000004.00000002.1418673624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000006.00000002.3769161456.0000000002D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000006.00000002.3769161456.0000000002D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000006.00000002.3769161456.0000000002D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000006.00000002.3769205652.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000006.00000002.3769205652.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000006.00000002.3769205652.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000000.00000002.1361586111.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000000.00000002.1361586111.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000000.00000002.1361586111.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: Process Memory Space: Ot7EdLwo881ajbV.exe PID: 7572, type: MEMORYSTR Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: Process Memory Space: Ot7EdLwo881ajbV.exe PID: 7908, type: MEMORYSTR Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: Process Memory Space: ipconfig.exe PID: 7972, type: MEMORYSTR Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: Ot7EdLwo881ajbV.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 0.2.Ot7EdLwo881ajbV.exe.343e790.1.raw.unpack, at4ONG9F0NYCELN5Tj.cs Cryptographic APIs: 'CreateDecryptor'
Source: 0.2.Ot7EdLwo881ajbV.exe.4f00000.2.raw.unpack, at4ONG9F0NYCELN5Tj.cs Cryptographic APIs: 'CreateDecryptor'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, Y8eUIjTtRh0ojhpc7y.cs Security API names: _0020.SetAccessControl
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, Y8eUIjTtRh0ojhpc7y.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, Y8eUIjTtRh0ojhpc7y.cs Security API names: _0020.AddAccessRule
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, bBmgRN9tOgZyk6y8Ue.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, Y8eUIjTtRh0ojhpc7y.cs Security API names: _0020.SetAccessControl
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, Y8eUIjTtRh0ojhpc7y.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, Y8eUIjTtRh0ojhpc7y.cs Security API names: _0020.AddAccessRule
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, bBmgRN9tOgZyk6y8Ue.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: classification engine Classification label: mal100.troj.evad.winEXE@8/1@12/0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Ot7EdLwo881ajbV.exe.log Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Mutant created: NULL
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8040:120:WilError_03
Source: Ot7EdLwo881ajbV.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: Ot7EdLwo881ajbV.exe Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
Source: C:\Windows\explorer.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: Ot7EdLwo881ajbV.exe ReversingLabs: Detection: 28%
Source: unknown Process created: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe "C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe"
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process created: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe "C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe"
Source: C:\Windows\explorer.exe Process created: C:\Windows\SysWOW64\ipconfig.exe "C:\Windows\SysWOW64\ipconfig.exe"
Source: C:\Windows\SysWOW64\ipconfig.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process created: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe "C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe" Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Windows\SysWOW64\ipconfig.exe "C:\Windows\SysWOW64\ipconfig.exe" Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe" Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: dwrite.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Windows\explorer.exe Section loaded: windows.internal.shell.broker.dll Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32 Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll Jump to behavior
Source: Ot7EdLwo881ajbV.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Ot7EdLwo881ajbV.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Ot7EdLwo881ajbV.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: ipconfig.pdb source: Ot7EdLwo881ajbV.exe, 00000004.00000002.1419016125.0000000001110000.00000040.10000000.00040000.00000000.sdmp, Ot7EdLwo881ajbV.exe, 00000004.00000002.1419170298.0000000001178000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, ipconfig.exe, 00000006.00000002.3769037540.0000000000D40000.00000040.80000000.00040000.00000000.sdmp
Source: Binary string: ipconfig.pdbGCTL source: Ot7EdLwo881ajbV.exe, 00000004.00000002.1419016125.0000000001110000.00000040.10000000.00040000.00000000.sdmp, Ot7EdLwo881ajbV.exe, 00000004.00000002.1419170298.0000000001178000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, 00000006.00000002.3769037540.0000000000D40000.00000040.80000000.00040000.00000000.sdmp
Source: Binary string: Wovy.pdb source: Ot7EdLwo881ajbV.exe
Source: Binary string: wntdll.pdbUGP source: Ot7EdLwo881ajbV.exe, 00000004.00000002.1419367496.00000000015D0000.00000040.00001000.00020000.00000000.sdmp, ipconfig.exe, 00000006.00000003.1423548845.0000000002F36000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, 00000006.00000003.1418648965.0000000000B91000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, 00000006.00000002.3769604243.000000000327E000.00000040.00001000.00020000.00000000.sdmp, ipconfig.exe, 00000006.00000002.3769604243.00000000030E0000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: wntdll.pdb source: Ot7EdLwo881ajbV.exe, Ot7EdLwo881ajbV.exe, 00000004.00000002.1419367496.00000000015D0000.00000040.00001000.00020000.00000000.sdmp, ipconfig.exe, ipconfig.exe, 00000006.00000003.1423548845.0000000002F36000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, 00000006.00000003.1418648965.0000000000B91000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, 00000006.00000002.3769604243.000000000327E000.00000040.00001000.00020000.00000000.sdmp, ipconfig.exe, 00000006.00000002.3769604243.00000000030E0000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Wovy.pdbSHA256 source: Ot7EdLwo881ajbV.exe

Data Obfuscation

barindex
Source: 0.2.Ot7EdLwo881ajbV.exe.343e790.1.raw.unpack, at4ONG9F0NYCELN5Tj.cs .Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{cPRyvIfYviaTKciquO(typeof(IntPtr).TypeHandle),cPRyvIfYviaTKciquO(typeof(Type).TypeHandle)})
Source: 0.2.Ot7EdLwo881ajbV.exe.4f00000.2.raw.unpack, at4ONG9F0NYCELN5Tj.cs .Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{cPRyvIfYviaTKciquO(typeof(IntPtr).TypeHandle),cPRyvIfYviaTKciquO(typeof(Type).TypeHandle)})
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, Y8eUIjTtRh0ojhpc7y.cs .Net Code: kBGSsTrAB4 System.Reflection.Assembly.Load(byte[])
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, Y8eUIjTtRh0ojhpc7y.cs .Net Code: kBGSsTrAB4 System.Reflection.Assembly.Load(byte[])
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_00417913 pushfd ; iretd 4_2_00417914
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_00401408 pushad ; retf 4_2_0040140F
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0041D4D2 push eax; ret 4_2_0041D4D8
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0041D4DB push eax; ret 4_2_0041D542
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0041D485 push eax; ret 4_2_0041D4D8
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0041D53C push eax; ret 4_2_0041D542
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_004166A0 push ebp; retf 4_2_004166A7
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015D225F pushad ; ret 4_2_015D27F9
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015D27FA pushad ; ret 4_2_015D27F9
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016009AD push ecx; mov dword ptr [esp], ecx 4_2_016009B6
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015D283D push eax; iretd 4_2_015D2858
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015D135E push eax; iretd 4_2_015D1369
Source: C:\Windows\explorer.exe Code function: 5_2_1065D9B5 push esp; retn 0000h 5_2_1065DAE7
Source: C:\Windows\explorer.exe Code function: 5_2_1065DB02 push esp; retn 0000h 5_2_1065DB03
Source: C:\Windows\explorer.exe Code function: 5_2_1065DB1E push esp; retn 0000h 5_2_1065DB1F
Source: C:\Windows\explorer.exe Code function: 5_2_116A2B02 push esp; retn 0000h 5_2_116A2B03
Source: C:\Windows\explorer.exe Code function: 5_2_116A2B1E push esp; retn 0000h 5_2_116A2B1F
Source: C:\Windows\explorer.exe Code function: 5_2_116A29B5 push esp; retn 0000h 5_2_116A2AE7
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_00D4570D push ecx; ret 6_2_00D45720
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_031109AD push ecx; mov dword ptr [esp], ecx 6_2_031109B6
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0072E40D push FFFFFF84h; retf 6_2_0072E40F
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0072D4D2 push eax; ret 6_2_0072D4D8
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0072D4DB push eax; ret 6_2_0072D542
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0072D485 push eax; ret 6_2_0072D4D8
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_0072D53C push eax; ret 6_2_0072D542
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_007266A0 push ebp; retf 6_2_007266A7
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_00727913 pushfd ; iretd 6_2_00727914
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_02FDEB1E push esp; retn 0000h 6_2_02FDEB1F
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_02FDEB02 push esp; retn 0000h 6_2_02FDEB03
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_02FDE9B5 push esp; retn 0000h 6_2_02FDEAE7
Source: Ot7EdLwo881ajbV.exe Static PE information: section name: .text entropy: 7.971068803283514
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, dEiTkfA7SjxqL5QtnY.cs High entropy of concatenated method names: 'HjURFnHfSK', 'f6pRLsyd5X', 'LuDRs2O9ED', 'aDXRVyINKM', 'vKDR1Qpro4', 'UoHRmA7eZC', 'ah6RgMNJJj', 'Y0RR9uAcBK', 'knBRNFeuQk', 't9gREkYc1O'
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, rZ47qtdZj2uWTp5gk2p.cs High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'eJ8c0qXgEC', 'eIdcKMGmt8', 'UBLcwlIeP8', 'YVVcB43Zt1', 'yqsciRu0WM', 'r3yckJ8ShK', 'jJ5cUc177O'
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, ETWBZjjKotfhLVEG7B.cs High entropy of concatenated method names: 'YptRp1L3Bs', 'a0BRltrL3P', 'bbNRnQCEno', 'BYMnXQLX35', 'JFKnz4OmNH', 'bxARhFWv5t', 'xVYRdMY3XP', 'RoeRx9SbCw', 'qLGRZSDdVJ', 'p4yRStAmZE'
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, VWeTsrS9qZtWT4kUnv.cs High entropy of concatenated method names: 'KmxdRBmgRN', 'qOgdTZyk6y', 'VZ0dP07Xpw', 'GPZdqRyRvR', 'NRwd3VTQCN', 'zpvdeyJxmc', 'hmbFF8cnTQPmIs2IUq', 'B3Rm8Ky4yG8AXtMHcw', 'QMfddngfuW', 'AfAdZ5OBbU'
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, aIL3gwMwGPXcjJ23eD.cs High entropy of concatenated method names: 'UGStp89o4O', 'GR4tfI0TbG', 'T9VtlfBNJc', 'isxtIaxhDi', 'zt0tnWECTt', 'WORtRm4MII', 'PLTtTkmFU2', 'gC0tGjjdu6', 'iiutPEuFYx', 'VYMtq6aMUc'
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, JdeGBOXijk9k7Y9IR3.cs High entropy of concatenated method names: 'PTfQdd2rJG', 'jXeQZKl9rg', 'HZ6QSOUkLw', 'PJ7Qp7WQup', 'ImoQfxndSg', 'FN0QIXSRv6', 'D65QnbR73y', 'doBtU9cSsE', 'fkFtM0pS3s', 'gjKt4M1nH5'
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, LRvR6JEGRbXydARwVT.cs High entropy of concatenated method names: 'gEvI1LQ7vs', 'gZCIgWs6u2', 'yNxlbSWVYH', 'TFxlJMxtS6', 'dUFlOCSdqL', 'cgylC6VAe3', 'VQmljtcKiZ', 'lCJlyNuVr4', 'UlolAoKGme', 'sKilHZ4KKN'
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, AOhY9axNNS11tp0klk.cs High entropy of concatenated method names: 'PDRsZnXgD', 'HhtVTOGep', 'SeCm1isaB', 'UkQgkEOY6', 'D3yNp8T9b', 'yXgEBTfjb', 'pLeIcwd0VaCqSH6O86', 'FUhZxQpu2Ak4YVxf1e', 'VNfthhyqu', 'UqncruEXr'
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, tvaO05oJad3j4n7gqJ.cs High entropy of concatenated method names: 'aRg69MkI4v', 'i2o6NIVc59', 'qYY62OiV6D', 'Iii6vcK0qD', 'URy6J3xZ2G', 'Ke36OwHGjA', 'iYf6jF64fl', 'RwC6yDwQxc', 'eRa6HqxStD', 'GRk6WaC3yo'
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, klDtT3dhKBswoJIOH9u.cs High entropy of concatenated method names: 'im6QFAnNQN', 'AmSQLBlZVt', 'B6GQsYSSfX', 'oj6QV8TvO6', 'o8SQ1FA7cI', 'PxkQm56G95', 'wtJQgope4I', 'W60Q9hLGJm', 'r9jQNBmP5F', 'kNsQEXxWOA'
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, myDQcBkbVdiXfBQNBb.cs High entropy of concatenated method names: 'mNpYMHEisw', 'kFsYXeWhlj', 'hcbthvi5SS', 'TkatdlhwQu', 'D8GYWI05Mf', 'bxkYaiAWnl', 'ytKYo5sh3D', 'vdnY0oXBrZ', 'FrEYK8Cn8b', 'eZXYwLCHFT'
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, bBmgRN9tOgZyk6y8Ue.cs High entropy of concatenated method names: 'iKef0ZOtxx', 'GLyfK58QxG', 'ecKfwXduC8', 'IU5fBAWD99', 'Y8Rfi5rJm8', 'mYOfkkiwsU', 'TG5fUvVmWD', 'Tl5fMYbVPO', 'dT5f4eSsAC', 'd7NfXwhkZR'
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, rCNspv2yJxmcon2Zpo.cs High entropy of concatenated method names: 'Q1nnD7lMeI', 'KbSnfma68Y', 'xKHnIATFy3', 'V3mnRTfUsR', 'j7enTOg9d9', 'aVxIiotN92', 'SstIkkEjgL', 'HXJIUwLYS8', 'pd7IM6VNJf', 'YX2I4dTJpv'
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, kAapL4lNHIoSIyVmTl.cs High entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'ws7x4TIIha', 'TumxXIwTEw', 'g3SxzdFBqY', 'Ih9ZhNlijo', 'QtuZd4QrNQ', 'wV1Zx8E4rl', 'dCrZZquANm', 'tGtXn2WsiED5HZCss7L'
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, Y8eUIjTtRh0ojhpc7y.cs High entropy of concatenated method names: 'H0lZDVoUwt', 'kXlZpwnmkO', 'cLvZf1adbc', 'Y0kZloFRnr', 'W9BZI1VwYb', 'RmaZnRbuOA', 'uGyZRw6hjA', 'RrAZThI310', 'yDjZGngVUJ', 'sS4ZPLpjrL'
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, V5vd6UNZ007Xpw2PZR.cs High entropy of concatenated method names: 'qwtlV8NvTq', 'onZlmkbJDp', 'pSNl9b6PuH', 'yp5lN7OvZX', 'rLbl3gn73C', 'Kd2leMrMij', 'qv3lYKtuqL', 'aevltxGJ0y', 'VVrlQbRqwC', 'MOUlcCuKZ5'
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, F20XDS0MSLdluyfkZw.cs High entropy of concatenated method names: 'FcJ3HjAfB4', 'SHf3arpewM', 'irl30y7i2v', 'ofV3KIQc89', 'KwF3vcO23v', 'oNI3b6kXVd', 'aL53J9GrxR', 'qPd3OijQeV', 'hIP3CsvbpB', 'l9b3jdChjd'
Source: 0.2.Ot7EdLwo881ajbV.exe.6c80000.3.raw.unpack, TfS3Cqf1xxiXDtlKxn.cs High entropy of concatenated method names: 'Dispose', 'xGtd41gLbE', 'jgTxv0h3tu', 'opSuuedN5Z', 'yhIdXL3gww', 'lPXdzcjJ23', 'ProcessDialogKey', 'pDOxhidNmn', 'yW4xdAK6QJ', 'vkuxxOdeGB'
Source: 0.2.Ot7EdLwo881ajbV.exe.343e790.1.raw.unpack, MainForm.cs High entropy of concatenated method names: 'YgSHuitkd', 'aiP2N9Y7C', 'gHQx79i6W', 'AGv9PUWi3', 'QMsbTCblb', 'beIGikGSa', 'clTPOt4ON', 'fF0vNYCEL', 'C5TCjFvvv', 'ln3BTm5Rw'
Source: 0.2.Ot7EdLwo881ajbV.exe.343e790.1.raw.unpack, at4ONG9F0NYCELN5Tj.cs High entropy of concatenated method names: 'nVoxarmF975Urj2p8sJ', 'tIta6WmWAkGE6iVCWgt', 'Y8N2DklRel', 'hpreq0m6Xcu1pidWj9b', 'KFC0XvmT5N8D2LR210h', 'a5foommXYpDAHBV6LjL', 'd3wYgimbV84NAc2fo7p', 'ItvPp5mqvV1adE08UOg', 'KA7rbWmJ0EMRNxYE2Vd', 'PPtPBAmQMyT7QpfjJpI'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, dEiTkfA7SjxqL5QtnY.cs High entropy of concatenated method names: 'HjURFnHfSK', 'f6pRLsyd5X', 'LuDRs2O9ED', 'aDXRVyINKM', 'vKDR1Qpro4', 'UoHRmA7eZC', 'ah6RgMNJJj', 'Y0RR9uAcBK', 'knBRNFeuQk', 't9gREkYc1O'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, rZ47qtdZj2uWTp5gk2p.cs High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'eJ8c0qXgEC', 'eIdcKMGmt8', 'UBLcwlIeP8', 'YVVcB43Zt1', 'yqsciRu0WM', 'r3yckJ8ShK', 'jJ5cUc177O'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, ETWBZjjKotfhLVEG7B.cs High entropy of concatenated method names: 'YptRp1L3Bs', 'a0BRltrL3P', 'bbNRnQCEno', 'BYMnXQLX35', 'JFKnz4OmNH', 'bxARhFWv5t', 'xVYRdMY3XP', 'RoeRx9SbCw', 'qLGRZSDdVJ', 'p4yRStAmZE'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, VWeTsrS9qZtWT4kUnv.cs High entropy of concatenated method names: 'KmxdRBmgRN', 'qOgdTZyk6y', 'VZ0dP07Xpw', 'GPZdqRyRvR', 'NRwd3VTQCN', 'zpvdeyJxmc', 'hmbFF8cnTQPmIs2IUq', 'B3Rm8Ky4yG8AXtMHcw', 'QMfddngfuW', 'AfAdZ5OBbU'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, aIL3gwMwGPXcjJ23eD.cs High entropy of concatenated method names: 'UGStp89o4O', 'GR4tfI0TbG', 'T9VtlfBNJc', 'isxtIaxhDi', 'zt0tnWECTt', 'WORtRm4MII', 'PLTtTkmFU2', 'gC0tGjjdu6', 'iiutPEuFYx', 'VYMtq6aMUc'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, JdeGBOXijk9k7Y9IR3.cs High entropy of concatenated method names: 'PTfQdd2rJG', 'jXeQZKl9rg', 'HZ6QSOUkLw', 'PJ7Qp7WQup', 'ImoQfxndSg', 'FN0QIXSRv6', 'D65QnbR73y', 'doBtU9cSsE', 'fkFtM0pS3s', 'gjKt4M1nH5'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, LRvR6JEGRbXydARwVT.cs High entropy of concatenated method names: 'gEvI1LQ7vs', 'gZCIgWs6u2', 'yNxlbSWVYH', 'TFxlJMxtS6', 'dUFlOCSdqL', 'cgylC6VAe3', 'VQmljtcKiZ', 'lCJlyNuVr4', 'UlolAoKGme', 'sKilHZ4KKN'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, AOhY9axNNS11tp0klk.cs High entropy of concatenated method names: 'PDRsZnXgD', 'HhtVTOGep', 'SeCm1isaB', 'UkQgkEOY6', 'D3yNp8T9b', 'yXgEBTfjb', 'pLeIcwd0VaCqSH6O86', 'FUhZxQpu2Ak4YVxf1e', 'VNfthhyqu', 'UqncruEXr'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, tvaO05oJad3j4n7gqJ.cs High entropy of concatenated method names: 'aRg69MkI4v', 'i2o6NIVc59', 'qYY62OiV6D', 'Iii6vcK0qD', 'URy6J3xZ2G', 'Ke36OwHGjA', 'iYf6jF64fl', 'RwC6yDwQxc', 'eRa6HqxStD', 'GRk6WaC3yo'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, klDtT3dhKBswoJIOH9u.cs High entropy of concatenated method names: 'im6QFAnNQN', 'AmSQLBlZVt', 'B6GQsYSSfX', 'oj6QV8TvO6', 'o8SQ1FA7cI', 'PxkQm56G95', 'wtJQgope4I', 'W60Q9hLGJm', 'r9jQNBmP5F', 'kNsQEXxWOA'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, myDQcBkbVdiXfBQNBb.cs High entropy of concatenated method names: 'mNpYMHEisw', 'kFsYXeWhlj', 'hcbthvi5SS', 'TkatdlhwQu', 'D8GYWI05Mf', 'bxkYaiAWnl', 'ytKYo5sh3D', 'vdnY0oXBrZ', 'FrEYK8Cn8b', 'eZXYwLCHFT'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, bBmgRN9tOgZyk6y8Ue.cs High entropy of concatenated method names: 'iKef0ZOtxx', 'GLyfK58QxG', 'ecKfwXduC8', 'IU5fBAWD99', 'Y8Rfi5rJm8', 'mYOfkkiwsU', 'TG5fUvVmWD', 'Tl5fMYbVPO', 'dT5f4eSsAC', 'd7NfXwhkZR'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, rCNspv2yJxmcon2Zpo.cs High entropy of concatenated method names: 'Q1nnD7lMeI', 'KbSnfma68Y', 'xKHnIATFy3', 'V3mnRTfUsR', 'j7enTOg9d9', 'aVxIiotN92', 'SstIkkEjgL', 'HXJIUwLYS8', 'pd7IM6VNJf', 'YX2I4dTJpv'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, kAapL4lNHIoSIyVmTl.cs High entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'ws7x4TIIha', 'TumxXIwTEw', 'g3SxzdFBqY', 'Ih9ZhNlijo', 'QtuZd4QrNQ', 'wV1Zx8E4rl', 'dCrZZquANm', 'tGtXn2WsiED5HZCss7L'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, Y8eUIjTtRh0ojhpc7y.cs High entropy of concatenated method names: 'H0lZDVoUwt', 'kXlZpwnmkO', 'cLvZf1adbc', 'Y0kZloFRnr', 'W9BZI1VwYb', 'RmaZnRbuOA', 'uGyZRw6hjA', 'RrAZThI310', 'yDjZGngVUJ', 'sS4ZPLpjrL'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, V5vd6UNZ007Xpw2PZR.cs High entropy of concatenated method names: 'qwtlV8NvTq', 'onZlmkbJDp', 'pSNl9b6PuH', 'yp5lN7OvZX', 'rLbl3gn73C', 'Kd2leMrMij', 'qv3lYKtuqL', 'aevltxGJ0y', 'VVrlQbRqwC', 'MOUlcCuKZ5'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, F20XDS0MSLdluyfkZw.cs High entropy of concatenated method names: 'FcJ3HjAfB4', 'SHf3arpewM', 'irl30y7i2v', 'ofV3KIQc89', 'KwF3vcO23v', 'oNI3b6kXVd', 'aL53J9GrxR', 'qPd3OijQeV', 'hIP3CsvbpB', 'l9b3jdChjd'
Source: 0.2.Ot7EdLwo881ajbV.exe.3694f60.0.raw.unpack, TfS3Cqf1xxiXDtlKxn.cs High entropy of concatenated method names: 'Dispose', 'xGtd41gLbE', 'jgTxv0h3tu', 'opSuuedN5Z', 'yhIdXL3gww', 'lPXdzcjJ23', 'ProcessDialogKey', 'pDOxhidNmn', 'yW4xdAK6QJ', 'vkuxxOdeGB'
Source: 0.2.Ot7EdLwo881ajbV.exe.4f00000.2.raw.unpack, MainForm.cs High entropy of concatenated method names: 'YgSHuitkd', 'aiP2N9Y7C', 'gHQx79i6W', 'AGv9PUWi3', 'QMsbTCblb', 'beIGikGSa', 'clTPOt4ON', 'fF0vNYCEL', 'C5TCjFvvv', 'ln3BTm5Rw'
Source: 0.2.Ot7EdLwo881ajbV.exe.4f00000.2.raw.unpack, at4ONG9F0NYCELN5Tj.cs High entropy of concatenated method names: 'nVoxarmF975Urj2p8sJ', 'tIta6WmWAkGE6iVCWgt', 'Y8N2DklRel', 'hpreq0m6Xcu1pidWj9b', 'KFC0XvmT5N8D2LR210h', 'a5foommXYpDAHBV6LjL', 'd3wYgimbV84NAc2fo7p', 'ItvPp5mqvV1adE08UOg', 'KA7rbWmJ0EMRNxYE2Vd', 'PPtPBAmQMyT7QpfjJpI'

Persistence and Installation Behavior

barindex
Source: C:\Windows\explorer.exe Process created: C:\Windows\SysWOW64\ipconfig.exe "C:\Windows\SysWOW64\ipconfig.exe"
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: Yara match File source: Process Memory Space: Ot7EdLwo881ajbV.exe PID: 7572, type: MEMORYSTR
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_00D43872 DnsGetCacheDataTableEx,DnsFree,DnsFree, 6_2_00D43872
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe API/Special instruction interceptor: Address: 7FFB2CECD324
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe API/Special instruction interceptor: Address: 7FFB2CED0774
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe API/Special instruction interceptor: Address: 7FFB2CED0154
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe API/Special instruction interceptor: Address: 7FFB2CECD8A4
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe API/Special instruction interceptor: Address: 7FFB2CECDA44
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe API/Special instruction interceptor: Address: 7FFB2CECD1E4
Source: C:\Windows\SysWOW64\ipconfig.exe API/Special instruction interceptor: Address: 7FFB2CECD324
Source: C:\Windows\SysWOW64\ipconfig.exe API/Special instruction interceptor: Address: 7FFB2CED0774
Source: C:\Windows\SysWOW64\ipconfig.exe API/Special instruction interceptor: Address: 7FFB2CECD944
Source: C:\Windows\SysWOW64\ipconfig.exe API/Special instruction interceptor: Address: 7FFB2CECD504
Source: C:\Windows\SysWOW64\ipconfig.exe API/Special instruction interceptor: Address: 7FFB2CECD544
Source: C:\Windows\SysWOW64\ipconfig.exe API/Special instruction interceptor: Address: 7FFB2CECD1E4
Source: C:\Windows\SysWOW64\ipconfig.exe API/Special instruction interceptor: Address: 7FFB2CED0154
Source: C:\Windows\SysWOW64\ipconfig.exe API/Special instruction interceptor: Address: 7FFB2CECD8A4
Source: C:\Windows\SysWOW64\ipconfig.exe API/Special instruction interceptor: Address: 7FFB2CECDA44
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe RDTSC instruction interceptor: First address: 409904 second address: 40990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe RDTSC instruction interceptor: First address: 409B7E second address: 409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Windows\SysWOW64\ipconfig.exe RDTSC instruction interceptor: First address: 719904 second address: 71990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Windows\SysWOW64\ipconfig.exe RDTSC instruction interceptor: First address: 719B7E second address: 719B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Memory allocated: 2260000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Memory allocated: 2420000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Memory allocated: 4420000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Memory allocated: 6E30000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Memory allocated: 7E30000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Memory allocated: 7FD0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Memory allocated: 8FD0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_00409AB0 rdtsc 4_2_00409AB0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: threadDelayed 1909 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: threadDelayed 8029 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: foregroundWindowGot 870 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: foregroundWindowGot 879 Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe Window / User API: threadDelayed 9696 Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe API coverage: 1.6 %
Source: C:\Windows\SysWOW64\ipconfig.exe API coverage: 1.9 %
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe TID: 7596 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Windows\explorer.exe TID: 2172 Thread sleep count: 1909 > 30 Jump to behavior
Source: C:\Windows\explorer.exe TID: 2172 Thread sleep time: -3818000s >= -30000s Jump to behavior
Source: C:\Windows\explorer.exe TID: 2172 Thread sleep count: 8029 > 30 Jump to behavior
Source: C:\Windows\explorer.exe TID: 2172 Thread sleep time: -16058000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe TID: 8080 Thread sleep count: 275 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe TID: 8080 Thread sleep time: -550000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe TID: 8080 Thread sleep count: 9696 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe TID: 8080 Thread sleep time: -19392000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe Last function: Thread delayed
Source: C:\Windows\SysWOW64\ipconfig.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: explorer.exe, 00000005.00000000.1362200055.0000000000C74000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000I
Source: explorer.exe, 00000005.00000002.3769920724.000000000326A000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: VMware, Inc.
Source: explorer.exe, 00000005.00000000.1373593359.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: BBSCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
Source: explorer.exe, 00000005.00000000.1373593359.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3075191865.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2272963365.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3775588613.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: explorer.exe, 00000005.00000002.3769920724.000000000326A000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: VMware, Inc.NoneVMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9dVMware20,1
Source: explorer.exe, 00000005.00000002.3769920724.000000000326A000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: VMware, Inc.VMW201.00V.20829224.B64.221121184211/21/2022
Source: explorer.exe, 00000005.00000002.3769920724.000000000326A000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: VMware SVGA II
Source: explorer.exe, 00000005.00000003.3077308907.0000000007314000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: War&Prod_VMware_xU1
Source: explorer.exe, 00000005.00000000.1373593359.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e
Source: explorer.exe, 00000005.00000003.2271877116.0000000008F74000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000I}~"
Source: explorer.exe, 00000005.00000003.3073804902.0000000009052000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000}io
Source: explorer.exe, 00000005.00000002.3775588613.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: VMware SATA CD00
Source: explorer.exe, 00000005.00000002.3775588613.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3075191865.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2272963365.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1373593359.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWystem32\DriverStore\en-US\machine.inf_loc5
Source: explorer.exe, 00000005.00000002.3769920724.000000000326A000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: VMware20,1
Source: explorer.exe, 00000005.00000002.3769920724.000000000326A000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: VMware Virtual RAM00000001VMW-4096MBRAM slot #0RAM slot #0
Source: explorer.exe, 00000005.00000000.1373593359.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: VMWare
Source: explorer.exe, 00000005.00000003.3073804902.0000000009052000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000'
Source: explorer.exe, 00000005.00000003.3077308907.0000000007314000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: War&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: explorer.exe, 00000005.00000002.3775588613.0000000008F27000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1373593359.0000000008F27000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3075191865.0000000008F27000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2272963365.0000000008F27000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWT`
Source: explorer.exe, 00000005.00000002.3769920724.000000000326A000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: VMware SVGA IIES1371
Source: explorer.exe, 00000005.00000002.3769920724.000000000326A000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: VMware Virtual RAM
Source: explorer.exe, 00000005.00000002.3769920724.000000000326A000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
Source: explorer.exe, 00000005.00000000.1362200055.0000000000C74000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: explorer.exe, 00000005.00000000.1373593359.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000005.00000000.1362200055.0000000000C74000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_00409AB0 rdtsc 4_2_00409AB0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0040ACF0 LdrLoadDll, 4_2_0040ACF0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FC156 mov eax, dword ptr fs:[00000030h] 4_2_015FC156
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D4164 mov eax, dword ptr fs:[00000030h] 4_2_016D4164
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D4164 mov eax, dword ptr fs:[00000030h] 4_2_016D4164
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01694144 mov eax, dword ptr fs:[00000030h] 4_2_01694144
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01694144 mov eax, dword ptr fs:[00000030h] 4_2_01694144
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01694144 mov ecx, dword ptr fs:[00000030h] 4_2_01694144
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01694144 mov eax, dword ptr fs:[00000030h] 4_2_01694144
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01694144 mov eax, dword ptr fs:[00000030h] 4_2_01694144
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01698158 mov eax, dword ptr fs:[00000030h] 4_2_01698158
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01606154 mov eax, dword ptr fs:[00000030h] 4_2_01606154
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01606154 mov eax, dword ptr fs:[00000030h] 4_2_01606154
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01630124 mov eax, dword ptr fs:[00000030h] 4_2_01630124
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AE10E mov eax, dword ptr fs:[00000030h] 4_2_016AE10E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AE10E mov ecx, dword ptr fs:[00000030h] 4_2_016AE10E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AE10E mov eax, dword ptr fs:[00000030h] 4_2_016AE10E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AE10E mov eax, dword ptr fs:[00000030h] 4_2_016AE10E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AE10E mov ecx, dword ptr fs:[00000030h] 4_2_016AE10E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AE10E mov eax, dword ptr fs:[00000030h] 4_2_016AE10E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AE10E mov eax, dword ptr fs:[00000030h] 4_2_016AE10E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AE10E mov ecx, dword ptr fs:[00000030h] 4_2_016AE10E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AE10E mov eax, dword ptr fs:[00000030h] 4_2_016AE10E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AE10E mov ecx, dword ptr fs:[00000030h] 4_2_016AE10E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AA118 mov ecx, dword ptr fs:[00000030h] 4_2_016AA118
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AA118 mov eax, dword ptr fs:[00000030h] 4_2_016AA118
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AA118 mov eax, dword ptr fs:[00000030h] 4_2_016AA118
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AA118 mov eax, dword ptr fs:[00000030h] 4_2_016AA118
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C0115 mov eax, dword ptr fs:[00000030h] 4_2_016C0115
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D61E5 mov eax, dword ptr fs:[00000030h] 4_2_016D61E5
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016301F8 mov eax, dword ptr fs:[00000030h] 4_2_016301F8
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C61C3 mov eax, dword ptr fs:[00000030h] 4_2_016C61C3
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C61C3 mov eax, dword ptr fs:[00000030h] 4_2_016C61C3
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167E1D0 mov eax, dword ptr fs:[00000030h] 4_2_0167E1D0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167E1D0 mov eax, dword ptr fs:[00000030h] 4_2_0167E1D0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167E1D0 mov ecx, dword ptr fs:[00000030h] 4_2_0167E1D0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167E1D0 mov eax, dword ptr fs:[00000030h] 4_2_0167E1D0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167E1D0 mov eax, dword ptr fs:[00000030h] 4_2_0167E1D0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FA197 mov eax, dword ptr fs:[00000030h] 4_2_015FA197
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FA197 mov eax, dword ptr fs:[00000030h] 4_2_015FA197
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FA197 mov eax, dword ptr fs:[00000030h] 4_2_015FA197
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01640185 mov eax, dword ptr fs:[00000030h] 4_2_01640185
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016BC188 mov eax, dword ptr fs:[00000030h] 4_2_016BC188
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016BC188 mov eax, dword ptr fs:[00000030h] 4_2_016BC188
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A4180 mov eax, dword ptr fs:[00000030h] 4_2_016A4180
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A4180 mov eax, dword ptr fs:[00000030h] 4_2_016A4180
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168019F mov eax, dword ptr fs:[00000030h] 4_2_0168019F
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168019F mov eax, dword ptr fs:[00000030h] 4_2_0168019F
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168019F mov eax, dword ptr fs:[00000030h] 4_2_0168019F
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168019F mov eax, dword ptr fs:[00000030h] 4_2_0168019F
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162C073 mov eax, dword ptr fs:[00000030h] 4_2_0162C073
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01602050 mov eax, dword ptr fs:[00000030h] 4_2_01602050
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01686050 mov eax, dword ptr fs:[00000030h] 4_2_01686050
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01696030 mov eax, dword ptr fs:[00000030h] 4_2_01696030
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01684000 mov ecx, dword ptr fs:[00000030h] 4_2_01684000
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A2000 mov eax, dword ptr fs:[00000030h] 4_2_016A2000
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A2000 mov eax, dword ptr fs:[00000030h] 4_2_016A2000
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A2000 mov eax, dword ptr fs:[00000030h] 4_2_016A2000
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A2000 mov eax, dword ptr fs:[00000030h] 4_2_016A2000
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A2000 mov eax, dword ptr fs:[00000030h] 4_2_016A2000
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A2000 mov eax, dword ptr fs:[00000030h] 4_2_016A2000
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A2000 mov eax, dword ptr fs:[00000030h] 4_2_016A2000
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A2000 mov eax, dword ptr fs:[00000030h] 4_2_016A2000
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161E016 mov eax, dword ptr fs:[00000030h] 4_2_0161E016
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161E016 mov eax, dword ptr fs:[00000030h] 4_2_0161E016
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161E016 mov eax, dword ptr fs:[00000030h] 4_2_0161E016
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161E016 mov eax, dword ptr fs:[00000030h] 4_2_0161E016
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FA020 mov eax, dword ptr fs:[00000030h] 4_2_015FA020
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FC020 mov eax, dword ptr fs:[00000030h] 4_2_015FC020
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016860E0 mov eax, dword ptr fs:[00000030h] 4_2_016860E0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016080E9 mov eax, dword ptr fs:[00000030h] 4_2_016080E9
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016420F0 mov ecx, dword ptr fs:[00000030h] 4_2_016420F0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FC0F0 mov eax, dword ptr fs:[00000030h] 4_2_015FC0F0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016820DE mov eax, dword ptr fs:[00000030h] 4_2_016820DE
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FA0E3 mov ecx, dword ptr fs:[00000030h] 4_2_015FA0E3
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016980A8 mov eax, dword ptr fs:[00000030h] 4_2_016980A8
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C60B8 mov eax, dword ptr fs:[00000030h] 4_2_016C60B8
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C60B8 mov ecx, dword ptr fs:[00000030h] 4_2_016C60B8
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160208A mov eax, dword ptr fs:[00000030h] 4_2_0160208A
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015F80A0 mov eax, dword ptr fs:[00000030h] 4_2_015F80A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A437C mov eax, dword ptr fs:[00000030h] 4_2_016A437C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01682349 mov eax, dword ptr fs:[00000030h] 4_2_01682349
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01682349 mov eax, dword ptr fs:[00000030h] 4_2_01682349
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01682349 mov eax, dword ptr fs:[00000030h] 4_2_01682349
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01682349 mov eax, dword ptr fs:[00000030h] 4_2_01682349
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01682349 mov eax, dword ptr fs:[00000030h] 4_2_01682349
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01682349 mov eax, dword ptr fs:[00000030h] 4_2_01682349
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01682349 mov eax, dword ptr fs:[00000030h] 4_2_01682349
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01682349 mov eax, dword ptr fs:[00000030h] 4_2_01682349
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01682349 mov eax, dword ptr fs:[00000030h] 4_2_01682349
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01682349 mov eax, dword ptr fs:[00000030h] 4_2_01682349
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01682349 mov eax, dword ptr fs:[00000030h] 4_2_01682349
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01682349 mov eax, dword ptr fs:[00000030h] 4_2_01682349
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01682349 mov eax, dword ptr fs:[00000030h] 4_2_01682349
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01682349 mov eax, dword ptr fs:[00000030h] 4_2_01682349
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01682349 mov eax, dword ptr fs:[00000030h] 4_2_01682349
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D634F mov eax, dword ptr fs:[00000030h] 4_2_016D634F
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168035C mov eax, dword ptr fs:[00000030h] 4_2_0168035C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168035C mov eax, dword ptr fs:[00000030h] 4_2_0168035C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168035C mov eax, dword ptr fs:[00000030h] 4_2_0168035C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168035C mov ecx, dword ptr fs:[00000030h] 4_2_0168035C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168035C mov eax, dword ptr fs:[00000030h] 4_2_0168035C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168035C mov eax, dword ptr fs:[00000030h] 4_2_0168035C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A8350 mov ecx, dword ptr fs:[00000030h] 4_2_016A8350
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016CA352 mov eax, dword ptr fs:[00000030h] 4_2_016CA352
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D8324 mov eax, dword ptr fs:[00000030h] 4_2_016D8324
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D8324 mov ecx, dword ptr fs:[00000030h] 4_2_016D8324
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D8324 mov eax, dword ptr fs:[00000030h] 4_2_016D8324
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D8324 mov eax, dword ptr fs:[00000030h] 4_2_016D8324
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FC310 mov ecx, dword ptr fs:[00000030h] 4_2_015FC310
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163A30B mov eax, dword ptr fs:[00000030h] 4_2_0163A30B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163A30B mov eax, dword ptr fs:[00000030h] 4_2_0163A30B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163A30B mov eax, dword ptr fs:[00000030h] 4_2_0163A30B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01620310 mov ecx, dword ptr fs:[00000030h] 4_2_01620310
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016103E9 mov eax, dword ptr fs:[00000030h] 4_2_016103E9
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016103E9 mov eax, dword ptr fs:[00000030h] 4_2_016103E9
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016103E9 mov eax, dword ptr fs:[00000030h] 4_2_016103E9
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016103E9 mov eax, dword ptr fs:[00000030h] 4_2_016103E9
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016103E9 mov eax, dword ptr fs:[00000030h] 4_2_016103E9
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016103E9 mov eax, dword ptr fs:[00000030h] 4_2_016103E9
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016103E9 mov eax, dword ptr fs:[00000030h] 4_2_016103E9
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016103E9 mov eax, dword ptr fs:[00000030h] 4_2_016103E9
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161E3F0 mov eax, dword ptr fs:[00000030h] 4_2_0161E3F0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161E3F0 mov eax, dword ptr fs:[00000030h] 4_2_0161E3F0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161E3F0 mov eax, dword ptr fs:[00000030h] 4_2_0161E3F0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016363FF mov eax, dword ptr fs:[00000030h] 4_2_016363FF
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160A3C0 mov eax, dword ptr fs:[00000030h] 4_2_0160A3C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160A3C0 mov eax, dword ptr fs:[00000030h] 4_2_0160A3C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160A3C0 mov eax, dword ptr fs:[00000030h] 4_2_0160A3C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160A3C0 mov eax, dword ptr fs:[00000030h] 4_2_0160A3C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160A3C0 mov eax, dword ptr fs:[00000030h] 4_2_0160A3C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160A3C0 mov eax, dword ptr fs:[00000030h] 4_2_0160A3C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016083C0 mov eax, dword ptr fs:[00000030h] 4_2_016083C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016083C0 mov eax, dword ptr fs:[00000030h] 4_2_016083C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016083C0 mov eax, dword ptr fs:[00000030h] 4_2_016083C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016083C0 mov eax, dword ptr fs:[00000030h] 4_2_016083C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016BC3CD mov eax, dword ptr fs:[00000030h] 4_2_016BC3CD
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016863C0 mov eax, dword ptr fs:[00000030h] 4_2_016863C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AE3DB mov eax, dword ptr fs:[00000030h] 4_2_016AE3DB
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AE3DB mov eax, dword ptr fs:[00000030h] 4_2_016AE3DB
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AE3DB mov ecx, dword ptr fs:[00000030h] 4_2_016AE3DB
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AE3DB mov eax, dword ptr fs:[00000030h] 4_2_016AE3DB
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A43D4 mov eax, dword ptr fs:[00000030h] 4_2_016A43D4
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A43D4 mov eax, dword ptr fs:[00000030h] 4_2_016A43D4
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015F8397 mov eax, dword ptr fs:[00000030h] 4_2_015F8397
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015F8397 mov eax, dword ptr fs:[00000030h] 4_2_015F8397
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015F8397 mov eax, dword ptr fs:[00000030h] 4_2_015F8397
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FE388 mov eax, dword ptr fs:[00000030h] 4_2_015FE388
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FE388 mov eax, dword ptr fs:[00000030h] 4_2_015FE388
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FE388 mov eax, dword ptr fs:[00000030h] 4_2_015FE388
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162438F mov eax, dword ptr fs:[00000030h] 4_2_0162438F
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162438F mov eax, dword ptr fs:[00000030h] 4_2_0162438F
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01604260 mov eax, dword ptr fs:[00000030h] 4_2_01604260
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01604260 mov eax, dword ptr fs:[00000030h] 4_2_01604260
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01604260 mov eax, dword ptr fs:[00000030h] 4_2_01604260
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FA250 mov eax, dword ptr fs:[00000030h] 4_2_015FA250
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B0274 mov eax, dword ptr fs:[00000030h] 4_2_016B0274
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B0274 mov eax, dword ptr fs:[00000030h] 4_2_016B0274
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B0274 mov eax, dword ptr fs:[00000030h] 4_2_016B0274
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B0274 mov eax, dword ptr fs:[00000030h] 4_2_016B0274
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B0274 mov eax, dword ptr fs:[00000030h] 4_2_016B0274
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B0274 mov eax, dword ptr fs:[00000030h] 4_2_016B0274
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B0274 mov eax, dword ptr fs:[00000030h] 4_2_016B0274
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B0274 mov eax, dword ptr fs:[00000030h] 4_2_016B0274
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B0274 mov eax, dword ptr fs:[00000030h] 4_2_016B0274
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B0274 mov eax, dword ptr fs:[00000030h] 4_2_016B0274
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B0274 mov eax, dword ptr fs:[00000030h] 4_2_016B0274
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B0274 mov eax, dword ptr fs:[00000030h] 4_2_016B0274
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01688243 mov eax, dword ptr fs:[00000030h] 4_2_01688243
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01688243 mov ecx, dword ptr fs:[00000030h] 4_2_01688243
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D625D mov eax, dword ptr fs:[00000030h] 4_2_016D625D
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015F826B mov eax, dword ptr fs:[00000030h] 4_2_015F826B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01606259 mov eax, dword ptr fs:[00000030h] 4_2_01606259
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016BA250 mov eax, dword ptr fs:[00000030h] 4_2_016BA250
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016BA250 mov eax, dword ptr fs:[00000030h] 4_2_016BA250
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015F823B mov eax, dword ptr fs:[00000030h] 4_2_015F823B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016102E1 mov eax, dword ptr fs:[00000030h] 4_2_016102E1
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016102E1 mov eax, dword ptr fs:[00000030h] 4_2_016102E1
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016102E1 mov eax, dword ptr fs:[00000030h] 4_2_016102E1
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160A2C3 mov eax, dword ptr fs:[00000030h] 4_2_0160A2C3
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160A2C3 mov eax, dword ptr fs:[00000030h] 4_2_0160A2C3
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160A2C3 mov eax, dword ptr fs:[00000030h] 4_2_0160A2C3
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160A2C3 mov eax, dword ptr fs:[00000030h] 4_2_0160A2C3
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160A2C3 mov eax, dword ptr fs:[00000030h] 4_2_0160A2C3
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D62D6 mov eax, dword ptr fs:[00000030h] 4_2_016D62D6
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016102A0 mov eax, dword ptr fs:[00000030h] 4_2_016102A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016102A0 mov eax, dword ptr fs:[00000030h] 4_2_016102A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016962A0 mov eax, dword ptr fs:[00000030h] 4_2_016962A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016962A0 mov ecx, dword ptr fs:[00000030h] 4_2_016962A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016962A0 mov eax, dword ptr fs:[00000030h] 4_2_016962A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016962A0 mov eax, dword ptr fs:[00000030h] 4_2_016962A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016962A0 mov eax, dword ptr fs:[00000030h] 4_2_016962A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016962A0 mov eax, dword ptr fs:[00000030h] 4_2_016962A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163E284 mov eax, dword ptr fs:[00000030h] 4_2_0163E284
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163E284 mov eax, dword ptr fs:[00000030h] 4_2_0163E284
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01680283 mov eax, dword ptr fs:[00000030h] 4_2_01680283
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01680283 mov eax, dword ptr fs:[00000030h] 4_2_01680283
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01680283 mov eax, dword ptr fs:[00000030h] 4_2_01680283
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163656A mov eax, dword ptr fs:[00000030h] 4_2_0163656A
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163656A mov eax, dword ptr fs:[00000030h] 4_2_0163656A
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163656A mov eax, dword ptr fs:[00000030h] 4_2_0163656A
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01608550 mov eax, dword ptr fs:[00000030h] 4_2_01608550
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01608550 mov eax, dword ptr fs:[00000030h] 4_2_01608550
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610535 mov eax, dword ptr fs:[00000030h] 4_2_01610535
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610535 mov eax, dword ptr fs:[00000030h] 4_2_01610535
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610535 mov eax, dword ptr fs:[00000030h] 4_2_01610535
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610535 mov eax, dword ptr fs:[00000030h] 4_2_01610535
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610535 mov eax, dword ptr fs:[00000030h] 4_2_01610535
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610535 mov eax, dword ptr fs:[00000030h] 4_2_01610535
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162E53E mov eax, dword ptr fs:[00000030h] 4_2_0162E53E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162E53E mov eax, dword ptr fs:[00000030h] 4_2_0162E53E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162E53E mov eax, dword ptr fs:[00000030h] 4_2_0162E53E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162E53E mov eax, dword ptr fs:[00000030h] 4_2_0162E53E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162E53E mov eax, dword ptr fs:[00000030h] 4_2_0162E53E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01696500 mov eax, dword ptr fs:[00000030h] 4_2_01696500
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D4500 mov eax, dword ptr fs:[00000030h] 4_2_016D4500
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D4500 mov eax, dword ptr fs:[00000030h] 4_2_016D4500
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D4500 mov eax, dword ptr fs:[00000030h] 4_2_016D4500
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D4500 mov eax, dword ptr fs:[00000030h] 4_2_016D4500
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D4500 mov eax, dword ptr fs:[00000030h] 4_2_016D4500
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D4500 mov eax, dword ptr fs:[00000030h] 4_2_016D4500
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D4500 mov eax, dword ptr fs:[00000030h] 4_2_016D4500
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016025E0 mov eax, dword ptr fs:[00000030h] 4_2_016025E0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162E5E7 mov eax, dword ptr fs:[00000030h] 4_2_0162E5E7
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162E5E7 mov eax, dword ptr fs:[00000030h] 4_2_0162E5E7
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162E5E7 mov eax, dword ptr fs:[00000030h] 4_2_0162E5E7
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162E5E7 mov eax, dword ptr fs:[00000030h] 4_2_0162E5E7
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162E5E7 mov eax, dword ptr fs:[00000030h] 4_2_0162E5E7
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162E5E7 mov eax, dword ptr fs:[00000030h] 4_2_0162E5E7
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162E5E7 mov eax, dword ptr fs:[00000030h] 4_2_0162E5E7
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162E5E7 mov eax, dword ptr fs:[00000030h] 4_2_0162E5E7
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163C5ED mov eax, dword ptr fs:[00000030h] 4_2_0163C5ED
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163C5ED mov eax, dword ptr fs:[00000030h] 4_2_0163C5ED
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163E5CF mov eax, dword ptr fs:[00000030h] 4_2_0163E5CF
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163E5CF mov eax, dword ptr fs:[00000030h] 4_2_0163E5CF
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016065D0 mov eax, dword ptr fs:[00000030h] 4_2_016065D0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163A5D0 mov eax, dword ptr fs:[00000030h] 4_2_0163A5D0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163A5D0 mov eax, dword ptr fs:[00000030h] 4_2_0163A5D0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016805A7 mov eax, dword ptr fs:[00000030h] 4_2_016805A7
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016805A7 mov eax, dword ptr fs:[00000030h] 4_2_016805A7
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016805A7 mov eax, dword ptr fs:[00000030h] 4_2_016805A7
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016245B1 mov eax, dword ptr fs:[00000030h] 4_2_016245B1
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016245B1 mov eax, dword ptr fs:[00000030h] 4_2_016245B1
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01602582 mov eax, dword ptr fs:[00000030h] 4_2_01602582
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01602582 mov ecx, dword ptr fs:[00000030h] 4_2_01602582
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01634588 mov eax, dword ptr fs:[00000030h] 4_2_01634588
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163E59C mov eax, dword ptr fs:[00000030h] 4_2_0163E59C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015F645D mov eax, dword ptr fs:[00000030h] 4_2_015F645D
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168C460 mov ecx, dword ptr fs:[00000030h] 4_2_0168C460
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162A470 mov eax, dword ptr fs:[00000030h] 4_2_0162A470
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162A470 mov eax, dword ptr fs:[00000030h] 4_2_0162A470
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162A470 mov eax, dword ptr fs:[00000030h] 4_2_0162A470
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163E443 mov eax, dword ptr fs:[00000030h] 4_2_0163E443
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163E443 mov eax, dword ptr fs:[00000030h] 4_2_0163E443
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163E443 mov eax, dword ptr fs:[00000030h] 4_2_0163E443
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163E443 mov eax, dword ptr fs:[00000030h] 4_2_0163E443
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163E443 mov eax, dword ptr fs:[00000030h] 4_2_0163E443
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163E443 mov eax, dword ptr fs:[00000030h] 4_2_0163E443
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163E443 mov eax, dword ptr fs:[00000030h] 4_2_0163E443
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163E443 mov eax, dword ptr fs:[00000030h] 4_2_0163E443
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162245A mov eax, dword ptr fs:[00000030h] 4_2_0162245A
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016BA456 mov eax, dword ptr fs:[00000030h] 4_2_016BA456
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01686420 mov eax, dword ptr fs:[00000030h] 4_2_01686420
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01686420 mov eax, dword ptr fs:[00000030h] 4_2_01686420
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01686420 mov eax, dword ptr fs:[00000030h] 4_2_01686420
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01686420 mov eax, dword ptr fs:[00000030h] 4_2_01686420
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01686420 mov eax, dword ptr fs:[00000030h] 4_2_01686420
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01686420 mov eax, dword ptr fs:[00000030h] 4_2_01686420
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01686420 mov eax, dword ptr fs:[00000030h] 4_2_01686420
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163A430 mov eax, dword ptr fs:[00000030h] 4_2_0163A430
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01638402 mov eax, dword ptr fs:[00000030h] 4_2_01638402
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01638402 mov eax, dword ptr fs:[00000030h] 4_2_01638402
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01638402 mov eax, dword ptr fs:[00000030h] 4_2_01638402
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FC427 mov eax, dword ptr fs:[00000030h] 4_2_015FC427
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FE420 mov eax, dword ptr fs:[00000030h] 4_2_015FE420
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FE420 mov eax, dword ptr fs:[00000030h] 4_2_015FE420
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FE420 mov eax, dword ptr fs:[00000030h] 4_2_015FE420
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016004E5 mov ecx, dword ptr fs:[00000030h] 4_2_016004E5
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016064AB mov eax, dword ptr fs:[00000030h] 4_2_016064AB
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016344B0 mov ecx, dword ptr fs:[00000030h] 4_2_016344B0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168A4B0 mov eax, dword ptr fs:[00000030h] 4_2_0168A4B0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016BA49A mov eax, dword ptr fs:[00000030h] 4_2_016BA49A
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01608770 mov eax, dword ptr fs:[00000030h] 4_2_01608770
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610770 mov eax, dword ptr fs:[00000030h] 4_2_01610770
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610770 mov eax, dword ptr fs:[00000030h] 4_2_01610770
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610770 mov eax, dword ptr fs:[00000030h] 4_2_01610770
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610770 mov eax, dword ptr fs:[00000030h] 4_2_01610770
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610770 mov eax, dword ptr fs:[00000030h] 4_2_01610770
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610770 mov eax, dword ptr fs:[00000030h] 4_2_01610770
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610770 mov eax, dword ptr fs:[00000030h] 4_2_01610770
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610770 mov eax, dword ptr fs:[00000030h] 4_2_01610770
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610770 mov eax, dword ptr fs:[00000030h] 4_2_01610770
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610770 mov eax, dword ptr fs:[00000030h] 4_2_01610770
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610770 mov eax, dword ptr fs:[00000030h] 4_2_01610770
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610770 mov eax, dword ptr fs:[00000030h] 4_2_01610770
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163674D mov esi, dword ptr fs:[00000030h] 4_2_0163674D
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163674D mov eax, dword ptr fs:[00000030h] 4_2_0163674D
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163674D mov eax, dword ptr fs:[00000030h] 4_2_0163674D
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01600750 mov eax, dword ptr fs:[00000030h] 4_2_01600750
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642750 mov eax, dword ptr fs:[00000030h] 4_2_01642750
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642750 mov eax, dword ptr fs:[00000030h] 4_2_01642750
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168E75D mov eax, dword ptr fs:[00000030h] 4_2_0168E75D
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01684755 mov eax, dword ptr fs:[00000030h] 4_2_01684755
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163C720 mov eax, dword ptr fs:[00000030h] 4_2_0163C720
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163C720 mov eax, dword ptr fs:[00000030h] 4_2_0163C720
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167C730 mov eax, dword ptr fs:[00000030h] 4_2_0167C730
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163273C mov eax, dword ptr fs:[00000030h] 4_2_0163273C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163273C mov ecx, dword ptr fs:[00000030h] 4_2_0163273C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163273C mov eax, dword ptr fs:[00000030h] 4_2_0163273C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163C700 mov eax, dword ptr fs:[00000030h] 4_2_0163C700
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01600710 mov eax, dword ptr fs:[00000030h] 4_2_01600710
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01630710 mov eax, dword ptr fs:[00000030h] 4_2_01630710
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168E7E1 mov eax, dword ptr fs:[00000030h] 4_2_0168E7E1
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016227ED mov eax, dword ptr fs:[00000030h] 4_2_016227ED
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016227ED mov eax, dword ptr fs:[00000030h] 4_2_016227ED
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016227ED mov eax, dword ptr fs:[00000030h] 4_2_016227ED
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016047FB mov eax, dword ptr fs:[00000030h] 4_2_016047FB
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016047FB mov eax, dword ptr fs:[00000030h] 4_2_016047FB
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160C7C0 mov eax, dword ptr fs:[00000030h] 4_2_0160C7C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016807C3 mov eax, dword ptr fs:[00000030h] 4_2_016807C3
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B47A0 mov eax, dword ptr fs:[00000030h] 4_2_016B47A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016007AF mov eax, dword ptr fs:[00000030h] 4_2_016007AF
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A678E mov eax, dword ptr fs:[00000030h] 4_2_016A678E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C866E mov eax, dword ptr fs:[00000030h] 4_2_016C866E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C866E mov eax, dword ptr fs:[00000030h] 4_2_016C866E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163A660 mov eax, dword ptr fs:[00000030h] 4_2_0163A660
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163A660 mov eax, dword ptr fs:[00000030h] 4_2_0163A660
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01632674 mov eax, dword ptr fs:[00000030h] 4_2_01632674
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161C640 mov eax, dword ptr fs:[00000030h] 4_2_0161C640
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01636620 mov eax, dword ptr fs:[00000030h] 4_2_01636620
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01638620 mov eax, dword ptr fs:[00000030h] 4_2_01638620
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161E627 mov eax, dword ptr fs:[00000030h] 4_2_0161E627
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160262C mov eax, dword ptr fs:[00000030h] 4_2_0160262C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161260B mov eax, dword ptr fs:[00000030h] 4_2_0161260B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161260B mov eax, dword ptr fs:[00000030h] 4_2_0161260B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161260B mov eax, dword ptr fs:[00000030h] 4_2_0161260B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161260B mov eax, dword ptr fs:[00000030h] 4_2_0161260B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161260B mov eax, dword ptr fs:[00000030h] 4_2_0161260B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161260B mov eax, dword ptr fs:[00000030h] 4_2_0161260B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0161260B mov eax, dword ptr fs:[00000030h] 4_2_0161260B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167E609 mov eax, dword ptr fs:[00000030h] 4_2_0167E609
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01642619 mov eax, dword ptr fs:[00000030h] 4_2_01642619
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167E6F2 mov eax, dword ptr fs:[00000030h] 4_2_0167E6F2
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167E6F2 mov eax, dword ptr fs:[00000030h] 4_2_0167E6F2
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167E6F2 mov eax, dword ptr fs:[00000030h] 4_2_0167E6F2
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167E6F2 mov eax, dword ptr fs:[00000030h] 4_2_0167E6F2
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016806F1 mov eax, dword ptr fs:[00000030h] 4_2_016806F1
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016806F1 mov eax, dword ptr fs:[00000030h] 4_2_016806F1
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163A6C7 mov ebx, dword ptr fs:[00000030h] 4_2_0163A6C7
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163A6C7 mov eax, dword ptr fs:[00000030h] 4_2_0163A6C7
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163C6A6 mov eax, dword ptr fs:[00000030h] 4_2_0163C6A6
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016366B0 mov eax, dword ptr fs:[00000030h] 4_2_016366B0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01604690 mov eax, dword ptr fs:[00000030h] 4_2_01604690
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01604690 mov eax, dword ptr fs:[00000030h] 4_2_01604690
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01626962 mov eax, dword ptr fs:[00000030h] 4_2_01626962
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01626962 mov eax, dword ptr fs:[00000030h] 4_2_01626962
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01626962 mov eax, dword ptr fs:[00000030h] 4_2_01626962
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0164096E mov eax, dword ptr fs:[00000030h] 4_2_0164096E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0164096E mov edx, dword ptr fs:[00000030h] 4_2_0164096E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0164096E mov eax, dword ptr fs:[00000030h] 4_2_0164096E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A4978 mov eax, dword ptr fs:[00000030h] 4_2_016A4978
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A4978 mov eax, dword ptr fs:[00000030h] 4_2_016A4978
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168C97C mov eax, dword ptr fs:[00000030h] 4_2_0168C97C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D4940 mov eax, dword ptr fs:[00000030h] 4_2_016D4940
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01680946 mov eax, dword ptr fs:[00000030h] 4_2_01680946
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168892A mov eax, dword ptr fs:[00000030h] 4_2_0168892A
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0169892B mov eax, dword ptr fs:[00000030h] 4_2_0169892B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015F8918 mov eax, dword ptr fs:[00000030h] 4_2_015F8918
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015F8918 mov eax, dword ptr fs:[00000030h] 4_2_015F8918
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167E908 mov eax, dword ptr fs:[00000030h] 4_2_0167E908
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167E908 mov eax, dword ptr fs:[00000030h] 4_2_0167E908
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168C912 mov eax, dword ptr fs:[00000030h] 4_2_0168C912
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168E9E0 mov eax, dword ptr fs:[00000030h] 4_2_0168E9E0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016329F9 mov eax, dword ptr fs:[00000030h] 4_2_016329F9
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016329F9 mov eax, dword ptr fs:[00000030h] 4_2_016329F9
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016969C0 mov eax, dword ptr fs:[00000030h] 4_2_016969C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160A9D0 mov eax, dword ptr fs:[00000030h] 4_2_0160A9D0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160A9D0 mov eax, dword ptr fs:[00000030h] 4_2_0160A9D0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160A9D0 mov eax, dword ptr fs:[00000030h] 4_2_0160A9D0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160A9D0 mov eax, dword ptr fs:[00000030h] 4_2_0160A9D0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160A9D0 mov eax, dword ptr fs:[00000030h] 4_2_0160A9D0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0160A9D0 mov eax, dword ptr fs:[00000030h] 4_2_0160A9D0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016349D0 mov eax, dword ptr fs:[00000030h] 4_2_016349D0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016CA9D3 mov eax, dword ptr fs:[00000030h] 4_2_016CA9D3
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016129A0 mov eax, dword ptr fs:[00000030h] 4_2_016129A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016129A0 mov eax, dword ptr fs:[00000030h] 4_2_016129A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016129A0 mov eax, dword ptr fs:[00000030h] 4_2_016129A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016129A0 mov eax, dword ptr fs:[00000030h] 4_2_016129A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016129A0 mov eax, dword ptr fs:[00000030h] 4_2_016129A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016129A0 mov eax, dword ptr fs:[00000030h] 4_2_016129A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016129A0 mov eax, dword ptr fs:[00000030h] 4_2_016129A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016129A0 mov eax, dword ptr fs:[00000030h] 4_2_016129A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016129A0 mov eax, dword ptr fs:[00000030h] 4_2_016129A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016129A0 mov eax, dword ptr fs:[00000030h] 4_2_016129A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016129A0 mov eax, dword ptr fs:[00000030h] 4_2_016129A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016129A0 mov eax, dword ptr fs:[00000030h] 4_2_016129A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016129A0 mov eax, dword ptr fs:[00000030h] 4_2_016129A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016009AD mov eax, dword ptr fs:[00000030h] 4_2_016009AD
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016009AD mov eax, dword ptr fs:[00000030h] 4_2_016009AD
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016889B3 mov esi, dword ptr fs:[00000030h] 4_2_016889B3
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016889B3 mov eax, dword ptr fs:[00000030h] 4_2_016889B3
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016889B3 mov eax, dword ptr fs:[00000030h] 4_2_016889B3
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01696870 mov eax, dword ptr fs:[00000030h] 4_2_01696870
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01696870 mov eax, dword ptr fs:[00000030h] 4_2_01696870
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168E872 mov eax, dword ptr fs:[00000030h] 4_2_0168E872
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168E872 mov eax, dword ptr fs:[00000030h] 4_2_0168E872
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01612840 mov ecx, dword ptr fs:[00000030h] 4_2_01612840
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01630854 mov eax, dword ptr fs:[00000030h] 4_2_01630854
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01604859 mov eax, dword ptr fs:[00000030h] 4_2_01604859
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01604859 mov eax, dword ptr fs:[00000030h] 4_2_01604859
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A483A mov eax, dword ptr fs:[00000030h] 4_2_016A483A
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A483A mov eax, dword ptr fs:[00000030h] 4_2_016A483A
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163A830 mov eax, dword ptr fs:[00000030h] 4_2_0163A830
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01622835 mov eax, dword ptr fs:[00000030h] 4_2_01622835
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01622835 mov eax, dword ptr fs:[00000030h] 4_2_01622835
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01622835 mov eax, dword ptr fs:[00000030h] 4_2_01622835
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01622835 mov ecx, dword ptr fs:[00000030h] 4_2_01622835
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01622835 mov eax, dword ptr fs:[00000030h] 4_2_01622835
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01622835 mov eax, dword ptr fs:[00000030h] 4_2_01622835
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168C810 mov eax, dword ptr fs:[00000030h] 4_2_0168C810
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016CA8E4 mov eax, dword ptr fs:[00000030h] 4_2_016CA8E4
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163C8F9 mov eax, dword ptr fs:[00000030h] 4_2_0163C8F9
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163C8F9 mov eax, dword ptr fs:[00000030h] 4_2_0163C8F9
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162E8C0 mov eax, dword ptr fs:[00000030h] 4_2_0162E8C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D08C0 mov eax, dword ptr fs:[00000030h] 4_2_016D08C0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01600887 mov eax, dword ptr fs:[00000030h] 4_2_01600887
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168C89D mov eax, dword ptr fs:[00000030h] 4_2_0168C89D
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015F8B50 mov eax, dword ptr fs:[00000030h] 4_2_015F8B50
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B4B4B mov eax, dword ptr fs:[00000030h] 4_2_016B4B4B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B4B4B mov eax, dword ptr fs:[00000030h] 4_2_016B4B4B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_015FCB7E mov eax, dword ptr fs:[00000030h] 4_2_015FCB7E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016A8B42 mov eax, dword ptr fs:[00000030h] 4_2_016A8B42
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01696B40 mov eax, dword ptr fs:[00000030h] 4_2_01696B40
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01696B40 mov eax, dword ptr fs:[00000030h] 4_2_01696B40
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016CAB40 mov eax, dword ptr fs:[00000030h] 4_2_016CAB40
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AEB50 mov eax, dword ptr fs:[00000030h] 4_2_016AEB50
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D2B57 mov eax, dword ptr fs:[00000030h] 4_2_016D2B57
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D2B57 mov eax, dword ptr fs:[00000030h] 4_2_016D2B57
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D2B57 mov eax, dword ptr fs:[00000030h] 4_2_016D2B57
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D2B57 mov eax, dword ptr fs:[00000030h] 4_2_016D2B57
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162EB20 mov eax, dword ptr fs:[00000030h] 4_2_0162EB20
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162EB20 mov eax, dword ptr fs:[00000030h] 4_2_0162EB20
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C8B28 mov eax, dword ptr fs:[00000030h] 4_2_016C8B28
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016C8B28 mov eax, dword ptr fs:[00000030h] 4_2_016C8B28
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016D4B00 mov eax, dword ptr fs:[00000030h] 4_2_016D4B00
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167EB1D mov eax, dword ptr fs:[00000030h] 4_2_0167EB1D
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167EB1D mov eax, dword ptr fs:[00000030h] 4_2_0167EB1D
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167EB1D mov eax, dword ptr fs:[00000030h] 4_2_0167EB1D
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167EB1D mov eax, dword ptr fs:[00000030h] 4_2_0167EB1D
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167EB1D mov eax, dword ptr fs:[00000030h] 4_2_0167EB1D
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167EB1D mov eax, dword ptr fs:[00000030h] 4_2_0167EB1D
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167EB1D mov eax, dword ptr fs:[00000030h] 4_2_0167EB1D
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167EB1D mov eax, dword ptr fs:[00000030h] 4_2_0167EB1D
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167EB1D mov eax, dword ptr fs:[00000030h] 4_2_0167EB1D
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01608BF0 mov eax, dword ptr fs:[00000030h] 4_2_01608BF0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01608BF0 mov eax, dword ptr fs:[00000030h] 4_2_01608BF0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01608BF0 mov eax, dword ptr fs:[00000030h] 4_2_01608BF0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168CBF0 mov eax, dword ptr fs:[00000030h] 4_2_0168CBF0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162EBFC mov eax, dword ptr fs:[00000030h] 4_2_0162EBFC
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01620BCB mov eax, dword ptr fs:[00000030h] 4_2_01620BCB
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01620BCB mov eax, dword ptr fs:[00000030h] 4_2_01620BCB
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01620BCB mov eax, dword ptr fs:[00000030h] 4_2_01620BCB
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01600BCD mov eax, dword ptr fs:[00000030h] 4_2_01600BCD
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01600BCD mov eax, dword ptr fs:[00000030h] 4_2_01600BCD
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01600BCD mov eax, dword ptr fs:[00000030h] 4_2_01600BCD
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AEBD0 mov eax, dword ptr fs:[00000030h] 4_2_016AEBD0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B4BB0 mov eax, dword ptr fs:[00000030h] 4_2_016B4BB0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016B4BB0 mov eax, dword ptr fs:[00000030h] 4_2_016B4BB0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610BBE mov eax, dword ptr fs:[00000030h] 4_2_01610BBE
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610BBE mov eax, dword ptr fs:[00000030h] 4_2_01610BBE
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_016AEA60 mov eax, dword ptr fs:[00000030h] 4_2_016AEA60
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163CA6F mov eax, dword ptr fs:[00000030h] 4_2_0163CA6F
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163CA6F mov eax, dword ptr fs:[00000030h] 4_2_0163CA6F
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163CA6F mov eax, dword ptr fs:[00000030h] 4_2_0163CA6F
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167CA72 mov eax, dword ptr fs:[00000030h] 4_2_0167CA72
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0167CA72 mov eax, dword ptr fs:[00000030h] 4_2_0167CA72
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01606A50 mov eax, dword ptr fs:[00000030h] 4_2_01606A50
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01606A50 mov eax, dword ptr fs:[00000030h] 4_2_01606A50
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01606A50 mov eax, dword ptr fs:[00000030h] 4_2_01606A50
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01606A50 mov eax, dword ptr fs:[00000030h] 4_2_01606A50
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01606A50 mov eax, dword ptr fs:[00000030h] 4_2_01606A50
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01606A50 mov eax, dword ptr fs:[00000030h] 4_2_01606A50
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01606A50 mov eax, dword ptr fs:[00000030h] 4_2_01606A50
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610A5B mov eax, dword ptr fs:[00000030h] 4_2_01610A5B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01610A5B mov eax, dword ptr fs:[00000030h] 4_2_01610A5B
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163CA24 mov eax, dword ptr fs:[00000030h] 4_2_0163CA24
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0162EA2E mov eax, dword ptr fs:[00000030h] 4_2_0162EA2E
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01624A35 mov eax, dword ptr fs:[00000030h] 4_2_01624A35
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01624A35 mov eax, dword ptr fs:[00000030h] 4_2_01624A35
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163CA38 mov eax, dword ptr fs:[00000030h] 4_2_0163CA38
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0168CA11 mov eax, dword ptr fs:[00000030h] 4_2_0168CA11
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163AAEE mov eax, dword ptr fs:[00000030h] 4_2_0163AAEE
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_0163AAEE mov eax, dword ptr fs:[00000030h] 4_2_0163AAEE
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01656ACC mov eax, dword ptr fs:[00000030h] 4_2_01656ACC
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01656ACC mov eax, dword ptr fs:[00000030h] 4_2_01656ACC
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01656ACC mov eax, dword ptr fs:[00000030h] 4_2_01656ACC
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01600AD0 mov eax, dword ptr fs:[00000030h] 4_2_01600AD0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01634AD0 mov eax, dword ptr fs:[00000030h] 4_2_01634AD0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01634AD0 mov eax, dword ptr fs:[00000030h] 4_2_01634AD0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01608AA0 mov eax, dword ptr fs:[00000030h] 4_2_01608AA0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01608AA0 mov eax, dword ptr fs:[00000030h] 4_2_01608AA0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Code function: 4_2_01656AA4 mov eax, dword ptr fs:[00000030h] 4_2_01656AA4
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_00D439FE FormatMessageW,ConvertLengthToIpv4Mask,InetNtopW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,LocalFree,LocalAlloc,GetAdaptersAddresses,LocalFree, 6_2_00D439FE
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_00D453F0 SetUnhandledExceptionFilter, 6_2_00D453F0
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_00D451A0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 6_2_00D451A0
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe NtQueueApcThread: Indirect: 0x147A4F2 Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe NtClose: Indirect: 0x147A56C
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Memory written: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: NULL target: C:\Windows\SysWOW64\ipconfig.exe protection: execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section loaded: NULL target: C:\Windows\SysWOW64\ipconfig.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe Section loaded: NULL target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe Section loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Thread register set: target process: 4056 Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe Thread register set: target process: 4056 Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Thread APC queued: target process: C:\Windows\explorer.exe Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Section unmapped: C:\Windows\SysWOW64\ipconfig.exe base address: D40000 Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Process created: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe "C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe" Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe" Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_00D44ACA AllocateAndInitializeSid,CheckTokenMembership,FreeSid, 6_2_00D44ACA
Source: explorer.exe, 00000005.00000003.2271877116.0000000009013000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1373593359.0000000009013000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1364980306.0000000004880000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: Shell_TrayWnd
Source: explorer.exe, 00000005.00000002.3769493228.0000000001440000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.1363002118.0000000001440000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: Progman
Source: explorer.exe, 00000005.00000002.3769493228.0000000001440000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.1363002118.0000000001440000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: ?Program Manager
Source: explorer.exe, 00000005.00000000.1362200055.0000000000C59000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3768749661.0000000000C59000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: 1Progman
Source: explorer.exe, 00000005.00000002.3769493228.0000000001440000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.1363002118.0000000001440000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: Progmanlock
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Queries volume information: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\ipconfig.exe Code function: 6_2_00D426AE GetSystemTimeAsFileTime, 6_2_00D426AE
Source: C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Ot7EdLwo881ajbV.exe.343e790.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000006.00000002.3768270082.0000000000710000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.1418673624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.3769161456.0000000002D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.3769205652.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1361586111.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0.2.Ot7EdLwo881ajbV.exe.4f00000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Ot7EdLwo881ajbV.exe.343e790.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Ot7EdLwo881ajbV.exe.4f00000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Ot7EdLwo881ajbV.exe.343e790.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000002.1363752343.0000000004F00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1361586111.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

Remote Access Functionality

barindex
Source: Yara match File source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.Ot7EdLwo881ajbV.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Ot7EdLwo881ajbV.exe.343e790.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000006.00000002.3768270082.0000000000710000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.1418673624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.3769161456.0000000002D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.3769205652.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1361586111.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0.2.Ot7EdLwo881ajbV.exe.4f00000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Ot7EdLwo881ajbV.exe.343e790.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Ot7EdLwo881ajbV.exe.4f00000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Ot7EdLwo881ajbV.exe.343e790.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000002.1363752343.0000000004F00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1361586111.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
No contacted IP infos