Click to jump to signature section
Source: | Binary string: ntdll.pdb source: 66WXq58R0I.exe, 00000000.00000002.2953785596.0000025EAE862000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2953608194.0000025EAE66B000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2954347645.0000025EAEE60000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2953426997.0000025EAE461000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2953957081.0000025EAEA6A000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2954143232.0000025EAEC62000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2954414520.00000153C3475000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2954582314.00000153C3676000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2954890486.00000153C3A7A000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2955163767.00000153C3E74000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2955027560.00000153C3C70000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2954752934.00000153C387F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: E:\Git\PwnPowershell\RunSpace\obj\Release\RunSpace.pdb source: 66WXq58R0I.exe, 00000002.00000002.2954223462.00000153C3270000.00000004.08000000.00040000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2953479298.00000153C1803000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdbUGP source: 66WXq58R0I.exe, 00000000.00000002.2953785596.0000025EAE862000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2953608194.0000025EAE66B000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2954347645.0000025EAEE60000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2953426997.0000025EAE461000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2953957081.0000025EAEA6A000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2954143232.0000025EAEC62000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2954414520.00000153C3475000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2954582314.00000153C3676000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2954890486.00000153C3A7A000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2955163767.00000153C3E74000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2955027560.00000153C3C70000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2954752934.00000153C387F000.00000004.00000020.00020000.00000000.sdmp |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\PowerShell | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E41C240 RtlGetVersion,memcpy,GetProcessHeap,GetProcessHeap,exit,exit,memcpy,GetTickCount,Sleep,SleepEx,exit,memcpy,memcpy,GetFileAttributesW,GetFileAttributesW,OpenProcess,GetModuleHandleA,GetProcAddress,memcpy,memcpy,GetFileAttributesW,memcpy,memcpy,HeapCreate,VirtualProtect,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,CreateProcessW,LoadLibraryA,GetProcAddress,NtAllocateVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,fwrite,fflush,NtWriteVirtualMemory,NtProtectVirtualMemory,ResumeThread,exit,memcpy,memcpy,fwrite,fflush,fwrite,fflush, | 0_2_00007FF78E41C240 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00007FF78E41BF80 GetThreadContext,NtTraceEvent,SetThreadContext,BaseThreadInitThunk,BaseThreadInitThunk, | 2_2_00007FF78E41BF80 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00007FF78E41D570 RtlAddVectoredExceptionHandler,memset,CreateToolhelp32Snapshot,Thread32First,Thread32Next,GetCurrentProcessId,CloseHandle,OpenThread,GetThreadContext,NtTraceEvent,SetThreadContext,CloseHandle,GetModuleHandleA,BaseThreadInitThunk,GetModuleHandleA,GetProcAddress,RtlInitUnicodeString,LdrLoadDll,BaseThreadInitThunk, | 2_2_00007FF78E41D570 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00007FF78E41BEE0 NtTraceEvent, | 2_2_00007FF78E41BEE0 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00000153C16D1B10 NtProtectVirtualMemory,NtCreateSection, | 2_2_00000153C16D1B10 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00000153C16D1BA8 NtCreateSection, | 2_2_00000153C16D1BA8 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E41C240 | 0_2_00007FF78E41C240 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E41F6D0 | 0_2_00007FF78E41F6D0 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E416760 | 0_2_00007FF78E416760 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E41E7F0 | 0_2_00007FF78E41E7F0 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E420460 | 0_2_00007FF78E420460 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E41B420 | 0_2_00007FF78E41B420 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E422CA0 | 0_2_00007FF78E422CA0 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E416970 | 0_2_00007FF78E416970 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E414A80 | 0_2_00007FF78E414A80 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E42A61A | 0_2_00007FF78E42A61A |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00007FF78E420460 | 2_2_00007FF78E420460 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00007FF78E41B420 | 2_2_00007FF78E41B420 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00007FF78E422CA0 | 2_2_00007FF78E422CA0 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00007FF78E41C240 | 2_2_00007FF78E41C240 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00007FF78E41F6D0 | 2_2_00007FF78E41F6D0 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00007FF78E416760 | 2_2_00007FF78E416760 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00007FF78E41E7F0 | 2_2_00007FF78E41E7F0 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00007FF78E416970 | 2_2_00007FF78E416970 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00007FF78E414A80 | 2_2_00007FF78E414A80 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00007FF78E42A61A | 2_2_00007FF78E42A61A |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00000153C16D0B36 | 2_2_00000153C16D0B36 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00000153C16D0730 | 2_2_00000153C16D0730 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00000153C16D0BAD | 2_2_00000153C16D0BAD |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00000153C16D0AB3 | 2_2_00000153C16D0AB3 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00000153C16D0999 | 2_2_00000153C16D0999 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: String function: 00007FF78E4161C0 appears 86 times | |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: String function: 00007FF78E4120F0 appears 78 times | |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: String function: 00007FF78E41E170 appears 48 times | |
Source: 66WXq58R0I.exe, 00000000.00000002.2954143232.0000025EAEDDA000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamentdll.dllj% vs 66WXq58R0I.exe |
Source: 66WXq58R0I.exe, 00000002.00000002.2954414520.00000153C35ED000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamentdll.dllj% vs 66WXq58R0I.exe |
Source: 66WXq58R0I.exe, 00000002.00000002.2954223462.00000153C3270000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameRunSpace.exe2 vs 66WXq58R0I.exe |
Source: 66WXq58R0I.exe, 00000002.00000002.2955303730.00000153C40EC000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFileName vs 66WXq58R0I.exe |
Source: 66WXq58R0I.exe, 00000002.00000002.2953479298.00000153C1803000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameRunSpace.exe2 vs 66WXq58R0I.exe |
Source: 66WXq58R0I.exe, 00000002.00000002.2955303730.00000153C4071000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilename vs 66WXq58R0I.exe |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E41D570 RtlAddVectoredExceptionHandler,memset,CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,CloseHandle,OpenThread,GetThreadContext,SetThreadContext,CloseHandle,GetModuleHandleA,BaseThreadInitThunk,GetModuleHandleA,GetProcAddress,RtlInitUnicodeString,LdrLoadDll,BaseThreadInitThunk, | 0_2_00007FF78E41D570 |
Source: 66WXq58R0I.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: unknown | Process created: C:\Users\user\Desktop\66WXq58R0I.exe "C:\Users\user\Desktop\66WXq58R0I.exe" | |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process created: C:\Users\user\Desktop\66WXq58R0I.exe C:\Users\user\Desktop\66wxq58r0i.exe 2580 | |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process created: C:\Users\user\Desktop\66WXq58R0I.exe C:\Users\user\Desktop\66wxq58r0i.exe 2580 | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: | Binary string: ntdll.pdb source: 66WXq58R0I.exe, 00000000.00000002.2953785596.0000025EAE862000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2953608194.0000025EAE66B000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2954347645.0000025EAEE60000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2953426997.0000025EAE461000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2953957081.0000025EAEA6A000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2954143232.0000025EAEC62000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2954414520.00000153C3475000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2954582314.00000153C3676000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2954890486.00000153C3A7A000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2955163767.00000153C3E74000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2955027560.00000153C3C70000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2954752934.00000153C387F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: E:\Git\PwnPowershell\RunSpace\obj\Release\RunSpace.pdb source: 66WXq58R0I.exe, 00000002.00000002.2954223462.00000153C3270000.00000004.08000000.00040000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2953479298.00000153C1803000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdbUGP source: 66WXq58R0I.exe, 00000000.00000002.2953785596.0000025EAE862000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2953608194.0000025EAE66B000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2954347645.0000025EAEE60000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2953426997.0000025EAE461000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2953957081.0000025EAEA6A000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000000.00000002.2954143232.0000025EAEC62000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2954414520.00000153C3475000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2954582314.00000153C3676000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2954890486.00000153C3A7A000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2955163767.00000153C3E74000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2955027560.00000153C3C70000.00000004.00000020.00020000.00000000.sdmp, 66WXq58R0I.exe, 00000002.00000002.2954752934.00000153C387F000.00000004.00000020.00020000.00000000.sdmp |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E418C30 _fileno,_fileno,_setmode,_setmode,_fileno,_setmode,_fileno,_setmode,SetConsoleOutputCP,SetConsoleCP,LoadLibraryA,GetProcAddress,CoInitialize,CoInitializeEx, | 0_2_00007FF78E418C30 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E41D570 RtlAddVectoredExceptionHandler,memset,CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,CloseHandle,OpenThread,GetThreadContext,SetThreadContext,CloseHandle,GetModuleHandleA,BaseThreadInitThunk,GetModuleHandleA,GetProcAddress,RtlInitUnicodeString,LdrLoadDll,BaseThreadInitThunk, | 0_2_00007FF78E41D570 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E41D570 RtlAddVectoredExceptionHandler,memset,CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,CloseHandle,OpenThread,GetThreadContext,SetThreadContext,CloseHandle,GetModuleHandleA,BaseThreadInitThunk,GetModuleHandleA,GetProcAddress,RtlInitUnicodeString,LdrLoadDll,BaseThreadInitThunk, | 0_2_00007FF78E41D570 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E41D570 RtlAddVectoredExceptionHandler,memset,CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,CloseHandle,OpenThread,GetThreadContext,SetThreadContext,CloseHandle,GetModuleHandleA,BaseThreadInitThunk,GetModuleHandleA,GetProcAddress,RtlInitUnicodeString,LdrLoadDll,BaseThreadInitThunk, | 0_2_00007FF78E41D570 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E418C30 _fileno,_fileno,_setmode,_setmode,_fileno,_setmode,_fileno,_setmode,SetConsoleOutputCP,SetConsoleCP,LoadLibraryA,GetProcAddress,CoInitialize,CoInitializeEx, | 0_2_00007FF78E418C30 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E41C240 RtlGetVersion,memcpy,GetProcessHeap,GetProcessHeap,exit,exit,memcpy,GetTickCount,Sleep,SleepEx,exit,memcpy,memcpy,GetFileAttributesW,GetFileAttributesW,OpenProcess,GetModuleHandleA,GetProcAddress,memcpy,memcpy,GetFileAttributesW,memcpy,memcpy,HeapCreate,VirtualProtect,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,CreateProcessW,LoadLibraryA,GetProcAddress,NtAllocateVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,fwrite,fflush,NtWriteVirtualMemory,NtProtectVirtualMemory,ResumeThread,exit,memcpy,memcpy,fwrite,fflush,fwrite,fflush, | 0_2_00007FF78E41C240 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E411154 GetStartupInfoA,Sleep,_amsg_exit,_initterm,_initterm,SetUnhandledExceptionFilter,exit,_cexit, | 0_2_00007FF78E411154 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E41D570 RtlAddVectoredExceptionHandler,memset,CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,CloseHandle,OpenThread,GetThreadContext,SetThreadContext,CloseHandle,GetModuleHandleA,BaseThreadInitThunk,GetModuleHandleA,GetProcAddress,RtlInitUnicodeString,LdrLoadDll,BaseThreadInitThunk, | 0_2_00007FF78E41D570 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E45CF08 RtlAddVectoredExceptionHandler, | 0_2_00007FF78E45CF08 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00007FF78E41D570 RtlAddVectoredExceptionHandler,memset,CreateToolhelp32Snapshot,Thread32First,Thread32Next,GetCurrentProcessId,CloseHandle,OpenThread,GetThreadContext,NtTraceEvent,SetThreadContext,CloseHandle,GetModuleHandleA,BaseThreadInitThunk,GetModuleHandleA,GetProcAddress,RtlInitUnicodeString,LdrLoadDll,BaseThreadInitThunk, | 2_2_00007FF78E41D570 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00007FF78E411154 GetStartupInfoA,Sleep,_amsg_exit,_initterm,_initterm,SetUnhandledExceptionFilter,exit,_cexit, | 2_2_00007FF78E411154 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 2_2_00007FF78E45CF08 RtlAddVectoredExceptionHandler, | 2_2_00007FF78E45CF08 |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | NtAllocateVirtualMemory: Indirect: 0x7FF78E424BD1 | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | NtWriteVirtualMemory: Indirect: 0x7FF78E424D2B | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | NtProtectVirtualMemory: Indirect: 0x7FF78E425018 | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | NtProtectVirtualMemory: Indirect: 0x7FF78E424D80 | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | NtProtectVirtualMemory: Indirect: 0x7FF78E424D00 | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | NtWriteVirtualMemory: Indirect: 0x7FF78E424FDF | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\66WXq58R0I.exe | Code function: 0_2_00007FF78E41C240 RtlGetVersion,memcpy,GetProcessHeap,GetProcessHeap,exit,exit,memcpy,GetTickCount,Sleep,SleepEx,exit,memcpy,memcpy,GetFileAttributesW,GetFileAttributesW,OpenProcess,GetModuleHandleA,GetProcAddress,memcpy,memcpy,GetFileAttributesW,memcpy,memcpy,HeapCreate,VirtualProtect,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,CreateProcessW,LoadLibraryA,GetProcAddress,NtAllocateVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,fwrite,fflush,NtWriteVirtualMemory,NtProtectVirtualMemory,ResumeThread,exit,memcpy,memcpy,fwrite,fflush,fwrite,fflush, | 0_2_00007FF78E41C240 |