One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
Performs some HTTP requests
(6 个事件)
request |
GET http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
request |
GET http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D |
request |
GET http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D |
request |
GET http://fallback.playtech-installer.com/playtech_compressed_assets/poker_william_hill/index.7ze |
request |
GET http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECEHSfdSPcp6pyLdnEz5lZ6ec%3D |
request |
GET https://t8u4n6u7.ssl.hwcdn.net/stats.gif?data=zjlGIypRvym8g88V6lgw0p6Ho2FjTIldrTzFnhCm7n90X%2BvJHcEm9FGWYHX1dqkLUYmuwBVMofjpvViskOC%2BAOWRxqXKQNeYSg5pzc5W%2Bv7puJMBQ2IySm%2BPc37kFrLp%2FWYCU6%2FzJANZFT21s31QT4%2F9I2Z22k7%2FPSseozNi0mdgzhneS4AVx1TTw3SAM96OTkgI7%2Fx0kEerrptVu4hm2MAqjHqeAsJ3bu8x9I5D2C0EPvnGDQ2sChADnBMnIEb3D1p3ZRMF%2FcCH41hVPr9z9IBu2ot7vX7Fyuz44tav0x3QpYUNJWRMloTbqOonSq8W8ugFkln6Fu4zKmeQNY6tAyPvLD%2BwZHKz%2F96d6RfprgFjyhlXs2qAldSBWlgkUTyWhE5s1xf%2Fkc8e114BHmZI2VIkDLI7HdOMtEa06lDd85AOnHEL%2FjNu%2BbGD7exNsda%2FtoIDLkf8rMFbSbhPEZvu79gWE35ZC4acRVnBK%2BH5%2BN5BDySrW2uDg9x22oBqIko75uFHdIb5kSl%2BuE%2B5fbo7k7NDSGXu3SmjCJWqcvFjD8K%2BEDuyifVWdiRsMhiCMjZ312uyH0jx51U97%2B0DwwX6NLjlgzJ%2FfH1b4Dd8K1Ft3YE%2FSEb%2FsKfR2fvpWaKEg7LpJ21qCcqdn5NswC9NWAvZ4t8AV6%2FgEB1xIcVxrnA52lg%3D |
Allocates read-write-execute memory (usually to unpack itself)
(2 个事件)
Time & API |
Arguments |
Status |
Return |
Repeated |
1620993521.164374
NtAllocateVirtualMemory
|
process_identifier:
880
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x02ad0000
|
success
|
0 |
0
|
1620993589.102249
NtAllocateVirtualMemory
|
process_identifier:
1424
region_size:
65536
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffffffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x0000000004140000
|
success
|
0 |
0
|
Checks whether any human activity is being performed by constantly checking whether the foreground window changed
Steals private information from local Internet browsers
(2 个事件)
registry |
HKEY_LOCAL_MACHINE\Software\Mozilla\Mozilla Firefox |
registry |
HKEY_CURRENT_USER\Software\Mozilla\Mozilla Firefox |
Creates executable files on the filesystem
(1 个事件)
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsp5E59.tmp\internalb84d1b2cd87d5b6b243eba515015a6a7.exe |
Drops an executable to the user AppData folder
(1 个事件)
file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\nsp5E59.tmp\internalb84d1b2cd87d5b6b243eba515015a6a7.exe |
Checks adapter addresses which can be used to detect virtual network interfaces
(1 个事件)
Time & API |
Arguments |
Status |
Return |
Repeated |
1620993523.773374
GetAdaptersAddresses
|
flags:
0
family:
0
|
failed
|
111 |
0
|
Queries for potentially installed applications
(2 个事件)
Time & API |
Arguments |
Status |
Return |
Repeated |
1620993519.492374
RegOpenKeyExW
|
access:
0x00000001
base_handle:
0x80000001
key_handle:
0x00000000
regkey:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
regkey_r:
Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
options:
0
|
failed
|
2 |
0
|
1620993519.492374
RegOpenKeyExW
|
access:
0x00000001
base_handle:
0x80000002
key_handle:
0x000000e0
regkey:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
regkey_r:
Software\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome
options:
0
|
success
|
0 |
0
|